s3team / DeepTypeLinks
☆24Updated 2 months ago
Alternatives and similar repositories for DeepType
Users that are interested in DeepType are comparing it to the libraries listed below
Sorting:
- Pre-built bitcode files for the Linux kernel☆22Updated 5 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last year
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆79Updated 2 weeks ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆55Updated 4 months ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆20Updated 8 months ago
- ☆24Updated 2 months ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆44Updated 5 years ago
- ☆36Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆38Updated 9 months ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- Source code release for the KRace project☆28Updated 3 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆94Updated last year
- ☆34Updated 2 years ago
- ☆68Updated 11 months ago
- 20 benchmark programs☆47Updated 4 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated 6 months ago
- ☆27Updated 2 years ago
- ☆46Updated 3 years ago
- ☆35Updated last year
- A use-after-free checker based on SVF.☆21Updated 7 years ago
- ☆39Updated 2 years ago
- ☆42Updated 7 months ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- Bug detection framework for finding Finger tracable bugs in Linux☆21Updated 3 months ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆118Updated 2 years ago
- ☆31Updated last year
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 2 years ago
- ☆34Updated 4 years ago
- DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing☆11Updated 2 years ago