secure-software-engineering / BoomerangLinks
Demand-Driven Pointer Analysis
☆13Updated last week
Alternatives and similar repositories for Boomerang
Users that are interested in Boomerang are comparing it to the libraries listed below
Sorting:
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago
- ☆14Updated 11 months ago
- A data dependence analyzer for C program☆21Updated 3 years ago
- A high-performance, parallel, compilation-based symbolic execution engine☆130Updated last week
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆40Updated 3 years ago
- CodeHawk Abstract Interpretation Engine and Analyzers☆68Updated last week
- Qilin: A New Framework for Supporting Fine-Grained Context-Sensitivity in Java Pointer Analysis☆135Updated last month
- A Pointer Analysis Framework for Rust☆52Updated 4 months ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆17Updated 4 months ago
- ☆25Updated 3 years ago
- ☆11Updated 6 years ago
- ☆60Updated last week
- A Cross-Language Dynamic Information Flow Analysis.☆24Updated 2 years ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆35Updated last month
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- Sys, but no longer in Haskell☆18Updated 3 years ago
- A curated list of Grammar based fuzzing research papers, codes, tutorials☆121Updated 2 years ago
- KLEE / CSE Project☆45Updated 5 years ago
- A fuzzer for SMT solvers☆19Updated last week
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 2 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- Interprocedural Distributive Environment algorithm implementation☆16Updated 9 years ago
- MagpieBridge LSP Framework --- A simple solution for your analysis IDE integration☆80Updated last week
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆46Updated 8 months ago
- ☆27Updated 2 years ago
- SLOT: SMT-LLVM Optimizing Translation☆56Updated last month
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆78Updated 2 years ago
- LLVM dataflow analysis framework; Reaching Definition Analysis; Liveness Analysis, May-point-to Definition Analysis ; inter-procedural m…☆25Updated 5 years ago
- cclyzer++ is a precise and scalable pointer analysis for LLVM code.☆144Updated 4 months ago
- ☆77Updated 3 years ago