tracer-x / TRACERLinks
TRACER Symbolic Execution Tool
☆28Updated 5 years ago
Alternatives and similar repositories for TRACER
Users that are interested in TRACER are comparing it to the libraries listed below
Sorting:
- TracerX Symbolic Virtual Machine☆33Updated 3 weeks ago
- Measure branching along code paths☆20Updated 8 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Updated 12 years ago
- A framework for control-flow recovery in binary programs.☆10Updated 6 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆18Updated 6 years ago
- Vine: The BitBlaze Static Analysis Component☆25Updated 10 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26Updated 4 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- Configurable instrumentation of LLVM bitcode☆34Updated 2 months ago
- libs2e.so☆20Updated 4 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 9 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- Scalable Validator for Binary Lifters☆56Updated 4 years ago
- Pretty printer from GTIRB to assembly code☆48Updated 3 months ago
- LLVM-based, flexible, live coverage instrumentation for C/C++ code☆43Updated 9 years ago
- A blanked execution framework based on the Unicorn engine☆19Updated 8 years ago
- KLEE / CSE Project☆45Updated 5 years ago
- Experimental translation of llvm to smt.☆56Updated 5 years ago
- A(nother) Binary Analysis Framework☆30Updated 11 years ago
- Tutorial for Building Program Reasoning Tools using LLVM and Z3☆19Updated 5 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- ☆12Updated 8 years ago
- ☆17Updated 4 years ago
- Map2Check: Finding Software Vulnerabilities☆29Updated 4 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Updated 3 years ago
- VTable Hijacking Protection for Binaries☆12Updated 8 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- The Chef symbolic execution platform, based off S2E☆13Updated 2 years ago
- ☆20Updated 3 years ago