kisslune / POCR
☆14Updated 7 months ago
Alternatives and similar repositories for POCR:
Users that are interested in POCR are comparing it to the libraries listed below
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago
- A use-after-free checker based on SVF.☆20Updated 7 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- A fuzzer for SMT solvers☆19Updated last week
- A data dependence analyzer for C program☆20Updated 3 years ago
- [ICSE 2022] Controlled Concurrency Testing via Periodical Scheduling☆29Updated 2 years ago
- A unification-based alias analysis and related tools☆31Updated 3 months ago
- some notes for how to build projects into a single LLVM bitcode file.☆18Updated 6 years ago
- Software Security Analysis Course☆47Updated last week
- Pointer Analysis with Tunable Precision☆26Updated 8 years ago
- Concurrency Paper☆101Updated last year
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆47Updated 8 months ago
- 软件工 程与形式化方法相关前沿工作阅读与分享☆30Updated last week
- Software Analysis and Verification Group☆13Updated 3 weeks ago
- The source code of project "LLift" (Enhancing static analysis with LLM)☆59Updated 10 months ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆57Updated 9 months ago
- ☆36Updated 3 months ago
- Teaching and Learning Software Verification via SVF☆33Updated this week
- A Pointer Analysis Framework for Rust☆46Updated last month
- An external project example using SVF as a library☆20Updated 3 months ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- A unification-based alias analysis and related tools☆9Updated last month
- A JIT Compiler Fuzzer for JVMs via CSE/JoNM in "Validating JIT Compilers via Compilation Space Exploration" (SOSP'23)☆52Updated last month
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆90Updated 10 months ago
- ☆40Updated 2 years ago
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆10Updated last year
- Anderson points-to analysis implementation based on LLVM☆12Updated 4 years ago
- ☆22Updated 2 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- Mutation-guided mutation-based fuzz testing☆41Updated 6 months ago