parasol-aser / UFO
UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities
☆32Updated 5 years ago
Alternatives and similar repositories for UFO:
Users that are interested in UFO are comparing it to the libraries listed below
- KLEE / CSE Project☆43Updated 4 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 5 years ago
- ☆39Updated 2 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 4 years ago
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆66Updated 3 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- An external project example using SVF as a library☆20Updated this week
- ☆39Updated 4 years ago
- Scalable Validator for Binary Lifters☆55Updated 4 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Updated 3 years ago
- ☆25Updated 3 years ago
- Symbolic Program Slicing with LLVM☆79Updated 4 years ago
- Concolic analysis tool for Java☆21Updated last year
- The Use of Likely Invariants as Feedback for Fuzzers☆88Updated 3 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated 9 months ago
- ☆39Updated last year
- ☆46Updated 3 years ago
- ☆50Updated 7 years ago
- User Guided API Misuse Detection☆28Updated 2 years ago
- An approximate solver for concolic execution☆17Updated 3 years ago
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆73Updated this week
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)