程序分析大作业:使用 SOOT 框架,实现 Java 上的静态指针分析
☆37Aug 8, 2018Updated 7 years ago
Alternatives and similar repositories for ucas-hwk-pointer-analysis
Users that are interested in ucas-hwk-pointer-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JAVA指针分析☆13Jul 23, 2019Updated 6 years ago
- A points-to and alias analysis benchmark suite☆41Sep 24, 2018Updated 7 years ago
- Code similarity checker using clang.(AST approach)☆17Feb 17, 2017Updated 9 years ago
- ☆28Feb 21, 2026Updated last month
- Lifting Reduction Semantics through Syntactic Sugar☆13May 13, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- TongASDP漏洞测试环境☆35Mar 22, 2023Updated 3 years ago
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet☆54Sep 11, 2021Updated 4 years ago
- Flow analysis using Soot☆52Jun 12, 2020Updated 5 years ago
- Enables the extraction of Java AST nodes with plain JDT☆18Nov 10, 2017Updated 8 years ago
- ☆41Mar 10, 2021Updated 5 years ago
- IDE/AL - Alias-Aware Framework for Interprocedural Dataflow Analysis☆10Mar 10, 2018Updated 8 years ago
- Fault Localization via Efficient Probabilistic Modeling of Program Semantics☆17Dec 15, 2025Updated 3 months ago
- 西安电子科技大学本科生毕业设计(论文)LaTeX模板☆11Jun 7, 2016Updated 9 years ago
- Bidirectional transformation for Relational view update Datalog-based Strategies☆22Jul 5, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- solution to buggyLoader of 0CTF/TCTF 2021 Finals☆20Sep 27, 2021Updated 4 years ago
- ☆14Jul 21, 2015Updated 10 years ago
- ☆18Mar 9, 2025Updated last year
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Sep 20, 2019Updated 6 years ago
- Repo for the talk "Monad Transformers For The Easily Confused", for LambdaConf 2018☆19Jun 4, 2018Updated 7 years ago
- Defending against malicious USB firmware in the Linux kernel☆17Mar 8, 2016Updated 10 years ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆68Dec 10, 2024Updated last year
- ☆78Updated this week
- ☆18Sep 18, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ctf challenges by salt☆16Jul 8, 2019Updated 6 years ago
- ☆84Oct 23, 2020Updated 5 years ago
- A step-by-step tutorial for Soot (a Java static analysis framework)☆448Dec 23, 2022Updated 3 years ago
- Literate Computing with Webstrates☆26Oct 6, 2018Updated 7 years ago
- A benchmark to evaluate taint analysis☆29Jun 20, 2022Updated 3 years ago
- Java After-Deserialization Attack☆79Apr 26, 2021Updated 4 years ago
- bypass JEP290 RaspHook code☆63Sep 21, 2020Updated 5 years ago
- Interprocedural Distributive Environment algorithm implementation☆16Jul 16, 2015Updated 10 years ago
- Benchmark Intel TSX (Transactional Synchronization Extension) Hardware Transactional Memory on my sandbox☆24Jun 7, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆12Jul 7, 2024Updated last year
- ☆14Oct 11, 2017Updated 8 years ago
- Java library used to upload files following the security steps described by OWASP☆10Jun 7, 2021Updated 4 years ago
- XCLAIM(BTC,ETH): Solidity implementation for Bitcoin backed tokens on Ethereum☆22Mar 25, 2024Updated 2 years ago
- ☆12Nov 16, 2020Updated 5 years ago
- A curated list of resources around BitVM☆26Apr 3, 2024Updated last year