ispras / juliet-dynamicLinks
Juliet C/C++ Dynamic Test Suite
☆31Updated 2 years ago
Alternatives and similar repositories for juliet-dynamic
Users that are interested in juliet-dynamic are comparing it to the libraries listed below
Sorting:
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 11 months ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆61Updated 7 months ago
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated last year
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Updated 4 years ago
- A LLVM Sanitizer for Symbolic Tracing☆227Updated 5 months ago
- autofz: Automated Fuzzer Composition at Runtime☆84Updated 2 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆56Updated last year
- Source code of ASAN--☆103Updated last year
- The Use of Likely Invariants as Feedback for Fuzzers☆93Updated 3 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆160Updated 3 years ago
- GrayC: Greybox Fuzzing of Compilers and Analysers for C☆61Updated 2 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 3 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Updated 4 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated last year
- Static range analysis for the LLVM compiler infrastructure.☆56Updated 6 years ago
- ☆75Updated last week
- KLEE / CSE Project☆46Updated 5 years ago
- ☆36Updated 2 years ago
- SanRazor is a sanitizer check reduction tool aiming to incur little overhead while retaining all important sanitizer checks.☆55Updated 4 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- ☆42Updated 3 years ago
- Symbolic Program Slicing with LLVM☆84Updated 5 years ago
- ☆24Updated 4 months ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Updated 2 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Updated 3 years ago
- ☆28Updated 4 months ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆32Updated last year
- Produce code coverage results with gcov from afl-fuzz test cases☆89Updated last year