secure-software-engineering / BoomerangLinks
Demand-Driven Pointer Analysis
☆13Updated this week
Alternatives and similar repositories for Boomerang
Users that are interested in Boomerang are comparing it to the libraries listed below
Sorting:
- Indexing reachability for context-sensitive data flow analysis.☆13Updated 3 years ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆41Updated 4 years ago
- ☆16Updated last year
- Qilin: A New Framework for Supporting Fine-Grained Context-Sensitivity in Java Pointer Analysis☆145Updated 3 weeks ago
- A data dependence analyzer for C program☆21Updated 3 years ago
- A high-performance, parallel, compilation-based symbolic execution engine☆140Updated this week
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Updated 3 weeks ago
- CodeHawk Abstract Interpretation Engine and Analyzers☆70Updated last week
- A new context, field, and array-sensitive heap analysis for LLVM bitcode based on DSA.☆165Updated last month
- cclyzer++ is a precise and scalable pointer analysis for LLVM code.☆147Updated 8 months ago
- A curated list of Grammar based fuzzing research papers, codes, tutorials☆126Updated 3 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆84Updated last month
- Recent symbolic execution papers and tools.☆177Updated 5 months ago
- ☆25Updated 4 years ago
- Symbolic Program Slicing with LLVM☆84Updated 5 years ago
- LLVM pass☆24Updated 5 years ago
- ☆70Updated this week
- COVA - A static analysis tool to compute path conditions☆37Updated 3 months ago
- GrayC: Greybox Fuzzing of Compilers and Analysers for C☆60Updated last year
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆36Updated 2 years ago
- LLVM dataflow analysis framework; Reaching Definition Analysis; Liveness Analysis, May-point-to Definition Analysis ; inter-procedural m…☆26Updated 5 years ago
- LLVM meets Code Property Graphs☆94Updated 4 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Updated 5 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆135Updated 4 years ago
- Software Analysis and Verification Group☆14Updated 2 months ago
- A LLVM Sanitizer for Symbolic Tracing☆225Updated 3 months ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 3 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- Concolic analysis tool for Java☆21Updated 2 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆49Updated last year