petablox / arbitrarLinks
User Guided API Misuse Detection
☆29Updated 2 years ago
Alternatives and similar repositories for arbitrar
Users that are interested in arbitrar are comparing it to the libraries listed below
Sorting:
- ☆50Updated 4 years ago
- ☆44Updated 3 years ago
- ☆41Updated 2 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆43Updated last year
- ☆32Updated last year
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 5 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- 20 benchmark programs☆48Updated 4 years ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆38Updated 11 months ago
- ☆102Updated 10 months ago
- ☆41Updated 2 years ago
- Pre-built bitcode files for the Linux kernel☆22Updated 5 years ago
- ☆87Updated 5 months ago
- ☆68Updated 3 years ago
- Lifting network implementation to precise format specification☆24Updated 4 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆55Updated 6 months ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- ☆79Updated 2 weeks ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- Recent Paper About Bug Detection☆31Updated 5 years ago
- ☆46Updated 3 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆31Updated 5 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- ☆61Updated last year
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 3 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆120Updated 2 years ago
- ☆51Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 7 months ago
- ☆58Updated 3 years ago
- Detect missing check bugs in OS kernels☆110Updated last year