n132 / ARVO-MetaLinks
☆79Updated last week
Alternatives and similar repositories for ARVO-Meta
Users that are interested in ARVO-Meta are comparing it to the libraries listed below
Sorting:
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆38Updated 11 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆55Updated 6 months ago
- ☆45Updated 9 months ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆25Updated last year
- MTFuzz: Fuzzing with a Multi-Task Neural Network☆35Updated 4 years ago
- ☆86Updated 4 months ago
- ☆103Updated 10 months ago
- 20 benchmark programs☆48Updated 4 years ago
- ☆34Updated 4 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last month
- ☆31Updated 2 months ago
- ☆32Updated last year
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- GitHub Cloner & Compiler☆72Updated 3 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆120Updated 2 years ago
- No description yet☆11Updated 2 years ago
- ☆70Updated last year
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆81Updated 2 months ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆107Updated 4 months ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆152Updated 2 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆25Updated last year
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- UT based automated fuzz driver generation☆169Updated 4 months ago
- ☆68Updated 3 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆48Updated 11 months ago
- ☆21Updated last year
- ☆42Updated 2 years ago
- ☆72Updated 3 years ago
- ☆22Updated 2 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆106Updated last week