nettrino / IntFlowLinks
IntFlow is an LLVM-based arithmetic error detection tool that combines static information flow tracking and dynamic program analysis
☆16Updated 10 years ago
Alternatives and similar repositories for IntFlow
Users that are interested in IntFlow are comparing it to the libraries listed below
Sorting:
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Updated 8 years ago
- CRETE under development☆60Updated 5 years ago
- ☆55Updated 5 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 6 years ago
- MCFI/PICFI tool chain☆44Updated last year
- ☆26Updated 10 years ago
- Seeding fuzzers with symbolic execution☆203Updated 8 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Updated 4 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- Utilities for generating dynamic traces☆93Updated 9 months ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- ☆64Updated 4 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆64Updated 4 years ago
- Tool for detecting error handling bugs☆23Updated 9 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago
- ☆24Updated 7 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆64Updated 3 years ago
- FuzzBALL: Vine-based Binary Symbolic Execution☆215Updated 4 months ago
- ☆74Updated 6 years ago
- A survey by the SEASON lab on symbolic execution tools and techniques. The survey has appeared in ACM CSUR in 2018.☆84Updated 7 years ago
- ☆56Updated 3 years ago
- Official repository for ASAP: High System-code Security at Low Overhead☆26Updated 10 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago
- KLEE / CSE Project☆46Updated 5 years ago
- ☆37Updated 3 years ago
- Differential fuzzing for the masses!☆153Updated 8 years ago
- Recover mutation graph from an AFL seed☆59Updated 5 years ago