suminb / winnowing
A Python implementation of the Winnowing (local algorithms for document fingerprinting)
☆52Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for winnowing
- statistical similarity of binaries (Esh)☆73Updated 8 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆36Updated last year
- ☆50Updated 6 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 7 years ago
- Eclipse plugin that synthesizes real Java code☆26Updated 10 years ago
- A survey by the SEASON lab on symbolic execution tools and techniques. The survey has appeared in ACM CSUR in 2018.☆81Updated 6 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆42Updated 3 years ago
- A System for Debloating C/C++ Programs☆31Updated 3 years ago
- A dynamic analysis framework for C and C++ programs☆26Updated 5 months ago
- The Cloud9 main repository☆52Updated 11 years ago
- KLEE's version of uClibc☆47Updated 5 months ago
- A set of templates for different academic venues.☆26Updated 5 years ago
- Symbolic Program Slicing with LLVM☆76Updated 4 years ago
- ☆28Updated 2 years ago
- Collection of syzkaller bug reproducers for Linux☆44Updated 2 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆91Updated 6 years ago
- Programmer De-anonymization via Code Stylometry☆73Updated 7 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆63Updated 4 years ago
- Identifying the compiler family, version and compiler flags that generated a binary☆17Updated 4 years ago
- ☆9Updated 10 years ago
- Hierarchical Delta Debugging Framework☆57Updated 2 weeks ago
- Tree-based Autofolding Software Summarization Algorithm☆42Updated 8 years ago
- Home page for this github organization☆22Updated 6 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- A Z3-Based String Constraint Solver☆87Updated 4 years ago
- An Automated Vulnerability Detection System☆56Updated 8 years ago
- ☆20Updated 5 years ago
- ☆73Updated last year
- My little fuzzing framework inspired by grinder☆99Updated 7 years ago
- A protocol reverse engineer tool written in java.☆29Updated 8 years ago