srcML / srcSliceLinks
Lightweight tool for slicing
☆35Updated last week
Alternatives and similar repositories for srcSlice
Users that are interested in srcSlice are comparing it to the libraries listed below
Sorting:
- ☆24Updated 4 years ago
- ☆20Updated 4 years ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆84Updated last week
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆64Updated 4 years ago
- User Guided API Misuse Detection☆29Updated 2 years ago
- Deep learning code semantic similarity☆65Updated 6 years ago
- DBGBench Website:☆19Updated 4 years ago
- ☆22Updated 4 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Updated 5 years ago
- Symbolic Program Slicing with LLVM☆85Updated 5 years ago
- ☆42Updated 2 years ago
- ☆42Updated 3 years ago
- An empirical study on patch correctness☆15Updated 3 years ago
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- CPR: A new automated program repair technique based on concolic execution which works on patch abstraction with the sub-optimal goal of r…☆33Updated 3 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆47Updated 2 years ago
- Semantic program repair system for C programs☆101Updated 3 years ago
- Indexing reachability for context-sensitive data flow analysis.☆13Updated 3 years ago
- Keep your bugs contained. A platform for studying historical software bugs.☆69Updated 10 months ago
- ☆16Updated 4 months ago
- ☆59Updated last year
- KLEE / CSE Project☆46Updated 5 years ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆233Updated 3 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 5 years ago
- ☆49Updated 4 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- ☆95Updated 7 months ago
- ☆36Updated 5 months ago
- ☆32Updated 2 years ago
- Software vulnerabilities data set☆24Updated 5 years ago