fatimahkj / EBF
A Hybrid Verification Tool for Finding Software Vulnerabilities in IoT Cryptographic Protocols
☆16Updated 9 months ago
Alternatives and similar repositories for EBF:
Users that are interested in EBF are comparing it to the libraries listed below
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- DIG is a numerical invariant generation tool. It infers program invariants or properties over (i) program execution traces or (ii) progra…☆40Updated 5 months ago
- ☆25Updated 3 years ago
- ☆39Updated 2 years ago
- ☆39Updated last year
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Updated 2 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆53Updated 11 months ago
- ☆22Updated 3 years ago
- KLEE / CSE Project☆43Updated 4 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- Map2Check: Finding Software Vulnerabilities☆28Updated 4 years ago
- User Guided API Misuse Detection☆28Updated 2 years ago
- A data dependence analyzer for C program☆20Updated 3 years ago
- ☆17Updated 3 months ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆73Updated this week
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 3 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆88Updated 3 years ago
- ☆39Updated 4 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Updated 3 years ago
- Symbolic Program Slicing with LLVM☆79Updated 4 years ago
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆16Updated 4 years ago
- Mutation-guided mutation-based fuzz testing☆44Updated 7 months ago
- An approximate solver for concolic execution☆17Updated 3 years ago
- ☆11Updated 3 years ago
- ☆37Updated 6 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 4 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- K-Miner☆75Updated 5 years ago
- Automatic detection of speculative information flows☆67Updated 3 years ago