sdasgup3 / validating-binary-decompilationLinks
Scalable Validator for Binary Lifters
☆56Updated 4 years ago
Alternatives and similar repositories for validating-binary-decompilation
Users that are interested in validating-binary-decompilation are comparing it to the libraries listed below
Sorting:
- KLEE / CSE Project☆45Updated 5 years ago
- Pretty printer from GTIRB to assembly code☆48Updated 3 months ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- An approximate solver for concolic execution☆18Updated last month
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆29Updated 4 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- LLVM meets Code Property Graphs☆91Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- Challenging testcases for fuzzers☆71Updated last year
- ☆25Updated 2 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆67Updated 3 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ☆38Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 4 months ago
- ☆96Updated 6 years ago
- The parser-directed Fuzzer☆38Updated 5 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Flex 'em lexers☆40Updated 4 years ago
- ☆71Updated last year
- The Use of Likely Invariants as Feedback for Fuzzers☆89Updated 3 years ago
- Utilities for generating dynamic traces☆92Updated 2 months ago
- AIL: The angr Intermediate Language.☆32Updated 3 weeks ago
- JIGSAW is a fuzzing-based path constraint solver.☆68Updated last year
- FunSeeker: Binary Function Identification Tool☆25Updated last year
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Updated 5 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆30Updated 3 years ago
- Signedness-Agnostic Strided-Interval☆37Updated 5 years ago