fengjixuchui / BugDetectionPaperLinks
Recent Paper About Bug Detection
☆32Updated 6 years ago
Alternatives and similar repositories for BugDetectionPaper
Users that are interested in BugDetectionPaper are comparing it to the libraries listed below
Sorting:
- ☆50Updated 5 years ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆41Updated 2 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆56Updated 11 months ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆52Updated 7 months ago
- The released code of FuzzGuard in USENIX Security 2020.☆32Updated 5 years ago
- FirmSec Dataset☆46Updated 3 months ago
- 20 benchmark programs☆52Updated 4 years ago
- ☆73Updated last year
- ☆68Updated 4 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 3 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated 2 years ago
- ☆53Updated 5 years ago
- The scalable bug search for binaries☆71Updated 9 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆89Updated 4 months ago
- ☆36Updated 3 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- This is the official repository for VulHawk.☆74Updated 2 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆98Updated 2 years ago
- ☆34Updated 4 years ago
- User Guided API Misuse Detection☆30Updated 3 years ago
- ☆43Updated 3 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆15Updated 3 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Updated 2 years ago
- ☆21Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 3 years ago
- ☆47Updated 4 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 7 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆120Updated 2 years ago
- ☆97Updated 4 months ago