xlab-uiuc / open-cevo
configuration evolution dataset
☆16Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for open-cevo
- Configuration dependency analysis for cloud software☆22Updated 2 years ago
- Testing Configuration Changes in Context to Prevent Production Failures☆29Updated 11 months ago
- Flow-based configuration analysis☆9Updated 3 years ago
- A Reading List of System Configuration Management☆54Updated 2 months ago
- Concurrency Paper☆96Updated last year
- Test-Case Prioritization for Configuration Testing☆15Updated 3 years ago
- A JIT Compiler Fuzzer for JVMs via CSE/JoNM in "Validating JIT Compilers via Compilation Space Exploration" (SOSP'23)☆49Updated last year
- Violet: Selective Symbolic Execution to Detect Bad Performance Misconfiguration☆17Updated 4 years ago
- Mining Error-Handling Bugs without Error Specification Input☆14Updated 4 years ago
- Coveraged-based fuzzer for finding DBMS logical bugs☆48Updated 2 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆75Updated 2 years ago
- CrashTuner(SOSP2019)☆26Updated 5 years ago
- This repository contains the artifact for the SOSP'23 paper: Sishuai Gong, Dinglan Peng, Deniz Altınbüken, Pedro Fonseca, Petros Maniati…☆11Updated last year
- ☆58Updated 2 years ago
- This repository contains the artifact for the SOSP'21 paper: Sishuai Gong, Deniz Altınbüken, Pedro Fonseca, Petros Maniatis, "Snowboard:…☆23Updated 2 years ago
- ☆12Updated 3 years ago
- some notes for how to build projects into a single LLVM bitcode file.☆18Updated 5 years ago
- ☆23Updated 3 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆71Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆85Updated 7 months ago
- Movec: A Tool for the Monitoring and Verification of C Programs☆21Updated 8 months ago
- This repository is used to analysis the shared resources of different containers☆28Updated 3 weeks ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated last year
- [ICSE 2022] Controlled Concurrency Testing via Periodical Scheduling☆29Updated 2 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- ☆26Updated 3 weeks ago
- ☆48Updated 3 years ago
- Lifting network implementation to precise format specification☆22Updated last week
- ☆36Updated 10 months ago