Finding the potential null pointer exception
☆29Dec 1, 2020Updated 5 years ago
Alternatives and similar repositories for NPEDetector
Users that are interested in NPEDetector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CrashTuner(SOSP2019)☆30Aug 28, 2019Updated 6 years ago
- ☆11Sep 6, 2024Updated last year
- A benchmark suite (under construction) for smart contract vulnerability tools☆17Jul 13, 2021Updated 4 years ago
- A data dependence analyzer for C program☆20Jan 23, 2022Updated 4 years ago
- some notes for how to build projects into a single LLVM bitcode file.☆18Jan 16, 2019Updated 7 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- DAI: Demanded Abstract Interpretation☆16Sep 23, 2024Updated last year
- Securibench Micro is a benchmark for static analysis tools for security.☆26Jul 26, 2018Updated 7 years ago
- IDE/AL - Alias-Aware Framework for Interprocedural Dataflow Analysis☆10Mar 10, 2018Updated 8 years ago
- PL/SE conference deadline countdowns☆19Nov 23, 2020Updated 5 years ago
- outline and links for PLDI 2022 tutorial☆17Jun 13, 2022Updated 3 years ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 4 months ago
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆16Aug 24, 2020Updated 5 years ago
- Interprocedural Distributive Environment algorithm implementation☆16Jul 16, 2015Updated 10 years ago
- Tool to measure code coverage of Android applications when their source code is not available☆12Apr 1, 2023Updated 2 years ago
- ☆20Dec 19, 2025Updated 3 months ago
- A fuzzer for SMT solvers☆21Aug 22, 2025Updated 7 months ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 4 years ago
- Available for legacy purposes. New users please see Jalangi2 https://github.com/Samsung/jalangi2☆123May 29, 2015Updated 10 years ago
- A benchmark suite for evaluating the precision of EVM code analysis tools.☆42Aug 31, 2018Updated 7 years ago
- A formalization of the textbook Elements of Set Theory☆61Sep 30, 2021Updated 4 years ago
- ☆28May 6, 2024Updated last year
- AntiTaintDroid - Escaping Taint Analysis (and stealing private information) on Android for Fun and Profit☆42Feb 18, 2018Updated 8 years ago
- LLVM Kaleidoscope Compiler☆11Aug 19, 2019Updated 6 years ago
- An external project example using SVF as a library☆24Mar 7, 2026Updated 2 weeks ago
- a CIL-based dynamic symbolic execution (DSE) engine for C language☆10Jan 23, 2015Updated 11 years ago
- ☆23Apr 28, 2023Updated 2 years ago
- System using the Analysis Query Language☆14Jun 20, 2022Updated 3 years ago
- A benchmark to evaluate taint analysis☆29Jun 20, 2022Updated 3 years ago
- ☆74Mar 11, 2026Updated 2 weeks ago
- Pointer Analysis with Tunable Precision☆28Mar 23, 2016Updated 10 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- A dockerized droidbox instance☆25Apr 7, 2016Updated 9 years ago
- a dataflow analysis framework implemented in Go, like soot☆39Sep 22, 2022Updated 3 years ago
- Here is a common vulnerability when Kubernetes Controller designed.☆10Dec 11, 2023Updated 2 years ago
- Nsolv - A front-end that allows multiple SMTLIBv2 compliant solvers to executed in parallel.☆11Dec 7, 2012Updated 13 years ago
- A stateless model checker powered by maximal causality reduction☆38Oct 13, 2020Updated 5 years ago
- Track Kubernetes CVEs by native GitHub notifications!☆13May 7, 2024Updated last year