Software Security Analysis Course
-
Updated
May 31, 2024 - C++
Software Security Analysis Course
PASTIS: Collaborative Fuzzing Framework
Automatic verification of LLVM optimizations
OSS-Sydr-Fuzz - OSS-Fuzz fork for hybrid fuzzing (fuzzer+DSE) open source software.
Tool that generates unit test by C/C++ source code, trying to reach all branches and maximize code coverage
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Katamaran is a semi-automated separation logic verifier for the Sail specification language. It works on an embedded version of Sail called μSail and verifies separation logic-based contracts of functions by generating (succinct) first-order verification conditions.
ToolChain using Symbolic Execution for Malware Analysis.
Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model
A platform for analysis of Java bytecode
A symbolic execution engine for EVM smart contract binaries.
A Multi Back-end Front-end for SMT Solvers in OCaml
Teaching and Learning Software Verification via SVF
Automated unit test generation and precise code analysis for Java
DIG is a numerical invariant generation tool. It infers program invariants or properties over (i) program execution traces or (ii) program source code. DIG supports many forms of numerical invariants, including nonlinear equalities, octagonal and interval properties, min/max-plus relations, and congruence relations.
A unit test-like interface for fuzzing and symbolic execution
Add a description, image, and links to the symbolic-execution topic page so that developers can more easily learn about it.
To associate your repository with the symbolic-execution topic, visit your repo's landing page and select "manage topics."