ispras / juliet-dynamicLinks
Juliet C/C++ Dynamic Test Suite
☆30Updated 2 years ago
Alternatives and similar repositories for juliet-dynamic
Users that are interested in juliet-dynamic are comparing it to the libraries listed below
Sorting:
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 9 months ago
- A LLVM Sanitizer for Symbolic Tracing☆226Updated 3 months ago
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated last year
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Updated 4 years ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆61Updated 5 months ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Updated 4 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆56Updated last year
- Symbolic Program Slicing with LLVM☆85Updated 5 years ago
- Static range analysis for the LLVM compiler infrastructure.☆56Updated 6 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆90Updated 3 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆160Updated 3 years ago
- ☆42Updated 3 years ago
- Source code of ASAN--☆100Updated last year
- Symbolic Execution Over Processor Traces☆124Updated last year
- SanRazor is a sanitizer check reduction tool aiming to incur little overhead while retaining all important sanitizer checks.☆54Updated 4 years ago
- autofz: Automated Fuzzer Composition at Runtime☆82Updated 2 years ago
- Library for manipulating gdb in batch mode☆20Updated last year
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 3 years ago
- ☆95Updated 7 months ago
- ☆146Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last month
- ☆39Updated 4 years ago
- source code for savior fuzzer☆127Updated 5 years ago
- KLEE / CSE Project☆46Updated 5 years ago
- BinTuner☆62Updated 3 years ago
- ☆36Updated 2 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Updated 2 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated 10 months ago
- afl/afl++ with a hierarchical seed scheduler☆56Updated 3 years ago