s3team / DeepType
☆23Updated 2 weeks ago
Alternatives and similar repositories for DeepType:
Users that are interested in DeepType are comparing it to the libraries listed below
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆93Updated last year
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆20Updated 6 months ago
- Pre-built bitcode files for the Linux kernel☆22Updated 5 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆53Updated 2 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆77Updated 2 years ago
- ☆23Updated 3 weeks ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆37Updated 7 months ago
- ☆69Updated 10 months ago
- ☆46Updated 3 years ago
- ☆33Updated last year
- ☆41Updated 6 months ago
- 20 benchmark programs☆47Updated 4 years ago
- ☆35Updated 11 months ago
- Source code release for the KRace project☆28Updated 3 years ago
- ☆26Updated last year
- ☆34Updated 4 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆59Updated 5 months ago
- ☆39Updated 2 years ago
- ☆71Updated 2 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆93Updated last year
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆11Updated last year
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆68Updated 11 months ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- Bug detection framework for finding Finger tracable bugs in Linux☆20Updated last month
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆29Updated 4 years ago
- A use-after-free checker based on SVF.☆21Updated 7 years ago
- ☆54Updated 11 months ago