rainoftime / smtfuzzLinks
A fuzzer for SMT solvers
☆21Updated last month
Alternatives and similar repositories for smtfuzz
Users that are interested in smtfuzz are comparing it to the libraries listed below
Sorting:
- LLVM pass☆24Updated 5 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Updated 3 years ago
- ☆16Updated last year
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated last year
- SanRazor is a sanitizer check reduction tool aiming to incur little overhead while retaining all important sanitizer checks.☆53Updated 4 years ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Updated last week
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆83Updated 2 weeks ago
- A data dependence analyzer for C program☆21Updated 3 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆54Updated last year
- GrayC: Greybox Fuzzing of Compilers and Analysers for C☆60Updated last year
- cclyzer++ is a precise and scalable pointer analysis for LLVM code.☆146Updated 8 months ago
- Static range analysis for the LLVM compiler infrastructure.☆56Updated 5 years ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆61Updated 4 months ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- some notes for how to build projects into a single LLVM bitcode file.☆18Updated 6 years ago
- Concurrency Paper☆110Updated 2 years ago
- ☆61Updated 3 years ago
- Program analysis and verification framework☆30Updated this week
- A new context, field, and array-sensitive heap analysis for LLVM bitcode based on DSA.☆165Updated 2 weeks ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Updated 2 years ago
- A Pointer Analysis Framework for Rust☆57Updated 3 months ago
- Teaching and Learning Software Verification via SVF☆34Updated 2 months ago
- Symbolic Program Slicing with LLVM☆84Updated 5 years ago
- ☆40Updated last year
- Software Analysis and Verification Group☆14Updated last month
- ☆28Updated 4 months ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Updated 5 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 8 months ago
- ☆36Updated 2 years ago
- Lifting network implementation to precise format specification☆24Updated 5 months ago