gaoxiang9430 / Fix2FitLinks
☆20Updated 4 years ago
Alternatives and similar repositories for Fix2Fit
Users that are interested in Fix2Fit are comparing it to the libraries listed below
Sorting:
- ☆20Updated 6 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Updated 5 years ago
- Lightweight tool for slicing☆35Updated this week
- KLEE / CSE Project☆46Updated 5 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆64Updated 3 years ago
- CoREBench: Errors in Find, Grep, Make☆13Updated 9 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆78Updated this week
- DBGBench Website:☆19Updated 4 years ago
- ☆25Updated 4 years ago
- ☆41Updated 2 years ago
- Symbolic Program Slicing with LLVM☆82Updated 5 years ago
- Replication package for Mining Input Grammars From Dynamic Control Flow☆25Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Updated 3 years ago
- Static Slicer for LLVM☆67Updated 9 years ago
- ☆22Updated 4 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- Semantic program repair system for C programs☆100Updated 2 years ago
- ☆14Updated 7 years ago
- ☆33Updated 6 years ago
- ☆53Updated 7 years ago
- This repository contains several examples of logic bomb.☆112Updated last year
- ☆42Updated 2 years ago
- ☆39Updated 4 years ago
- Configurable instrumentation of LLVM bitcode☆34Updated 4 months ago
- Concolic analysis tool for Java☆21Updated 2 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago