eth-sri / learchLinks
☆40Updated last year
Alternatives and similar repositories for learch
Users that are interested in learch are comparing it to the libraries listed below
Sorting:
- Lifting network implementation to precise format specification☆24Updated 2 months ago
- Recent Paper About Bug Detection☆31Updated 5 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆79Updated 2 weeks ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- ☆31Updated last year
- ☆62Updated last week
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆55Updated 4 months ago
- ☆50Updated 4 years ago
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆12Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆41Updated last year
- ☆44Updated 3 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆25Updated last year
- ☆39Updated 2 years ago
- User Guided API Misuse Detection☆29Updated 2 years ago
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆61Updated 7 months ago
- ☆22Updated 2 years ago
- ☆42Updated 7 months ago
- ☆39Updated 4 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆54Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆38Updated 8 months ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 2 years ago
- ☆50Updated 4 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Updated 2 years ago
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- 20 benchmark programs☆47Updated 4 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last year
- ☆68Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 4 months ago