sola-st / wasm-type-predictionLinks
☆11Updated 3 years ago
Alternatives and similar repositories for wasm-type-prediction
Users that are interested in wasm-type-prediction are comparing it to the libraries listed below
Sorting:
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 3 years ago
- ☆46Updated 3 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆64Updated last year
- An external project example using SVF as a library☆23Updated 2 months ago
- ☆42Updated 2 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆30Updated 4 years ago
- ☆74Updated 3 weeks ago
- Lifting network implementation to precise format specification☆24Updated 3 months ago
- Detect missing check bugs in OS kernels☆110Updated last year
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 5 years ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆38Updated 10 months ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆25Updated last year
- ☆34Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆80Updated last month
- User Guided API Misuse Detection☆29Updated 2 years ago
- GitHub Cloner & Compiler☆72Updated 3 years ago
- ☆83Updated 4 months ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆64Updated 3 years ago
- Pre-built bitcode files for the Linux kernel☆22Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 6 months ago
- ☆44Updated 3 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- An llvm pass to perform taint analysis on your code.☆38Updated 5 years ago
- ☆68Updated 3 years ago
- Recent Paper About Bug Detection☆31Updated 5 years ago
- ☆72Updated 3 years ago
- ☆11Updated last month
- ☆32Updated last year