rshariffdeen / FixMorph
FixMorph is a morphing tool for C source codes which supports automated code-transfer
☆32Updated 5 months ago
Alternatives and similar repositories for FixMorph:
Users that are interested in FixMorph are comparing it to the libraries listed below
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- ☆39Updated 2 years ago
- CPR: A new automated program repair technique based on concolic execution which works on patch abstraction with the sub-optimal goal of r…☆30Updated 2 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- ☆28Updated last year
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated last month
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆53Updated 11 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- ☆39Updated last year
- GrayC: Greybox Fuzzing of Compilers and Analysers for C☆57Updated last year
- Sys, but no longer in Haskell☆18Updated 2 years ago
- ☆51Updated 6 months ago
- Program Vulnerability Repair via Inductive Inference☆18Updated last year
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆49Updated 3 weeks ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- ☆33Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆35Updated 5 months ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated 9 months ago
- Program analysis tools built on tree-sitter (https://github.com/tree-sitter/tree-sitter).☆38Updated last year
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆30Updated 2 years ago
- GitHub Cloner & Compiler☆67Updated 3 years ago
- Mutation-guided mutation-based fuzz testing☆44Updated 8 months ago
- ☆22Updated 6 months ago
- ☆25Updated 3 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆60Updated last year
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆34Updated last year
- ☆19Updated 3 years ago
- Recent Paper About Bug Detection☆30Updated 5 years ago
- Program dependence graph in LLVM☆34Updated 8 months ago