Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-symbolic-execution
A curated list of awesome symbolic execution resources including essential research papers, lectures, videos, and tools.
https://github.com/ksluckow/awesome-symbolic-execution
Last synced: 4 days ago
JSON representation
-
Papers
- Symbolic Execution and Program Testing
- Symbolic Execution and Program Testing
- A system to generate test data and symbolically execute programs
- All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
- Symbolic Execution for Software Testing: Three Decades Later
- A Survey of Symbolic Execution Techniques
- A system to generate test data and symbolically execute programs
- All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
- A Survey of Symbolic Execution Techniques
- XMUsuny/symbolic-execution-papers
- All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
- Symbolic Execution for Software Testing: Three Decades Later
- Symbolic Execution and Program Testing
-
Courses
-
Videos
- Symbolic Execution Lecture at MIT
- Symbolic Execution Lecture (part of Software Security course on Coursera)
- Symbolic and Concolic Testing (Part 1, Symbolic)
- Symbolic and Concolic Testing (Part 2, Challenges)
- Symbolic and Concolic Testing (Part 3, Concolic)
- Symbolic and Concolic Testing (Part 4, Applications)
- Symbolic and Concolic Testing (Part 1, Symbolic)
- Symbolic and Concolic Testing (Part 2, Challenges)
- Symbolic and Concolic Testing (Part 3, Concolic)
- Symbolic and Concolic Testing (Part 4, Applications)
-
Tools
-
Java
- Symbolic PathFinder (SPF) - Symbolic execution tool built on [Java PathFinder](https://babelfish.arc.nasa.gov/trac/jpf/). Supports multiple constraint solvers, lazy initialization, etc.
- Acteve - Concolic execution tool that uses [Soot](https://sable.github.io/soot/) for instrumentation. Originally for Android analysis. Supports [Z3](https://github.com/Z3Prover/z3).
- jCUTE - Concolic execution tool that uses [Soot](https://github.com/soot-oss/soot) for instrumentation. Supports [lp_solve](http://lpsolve.sourceforge.net/).
- JFuzz - Concolic execution tool built on [Java PathFinder](https://github.com/javapathfinder).
- Key - Theorem Prover that uses specifications written in Java Modeling Language (JML).
- Symbolic PathFinder (SPF) - Symbolic execution tool built on [Java PathFinder](https://github.com/javapathfinder). Supports multiple constraint solvers, lazy initialization, etc.
- JDart - Dynamic symbolic execution tool built on [Java PathFinder](https://github.com/javapathfinder). Supports multiple constraint solvers using [JConstraints](https://github.com/psycopaths/jconstraints).
- CATG - Concolic execution tool that uses [ASM](http://asm.ow2.org/) for instrumentation. Uses CVC4.
- LimeTB - Concolic execution tool that uses [Soot](https://github.com/soot-oss/soot) for instrumentation. Supports [Yices](http://yices.csl.sri.com/) and [Boolector](http://fmv.jku.at/boolector/). Concolic execution can be distributed.
-
LLVM
-
.NET
- PEX - Dynamic symbolic execution tool for .NET.
-
C
-
JavaScript
-
Ruby
- Rubyx - Symbolic execution tool for Ruby on Rails web apps.
-
Android
- SymDroid - A Symbolic Executor to Identify Activity Permission in Android Application.
-
Binaries
- Mayhem
- SAGE - Whitebox file fuzzing tool for X86 Windows applications.
- DART - is the first concolic testing tool that combines dynamic test generation.
- BitBlaze - Binary Analysis for Computer Security.
- FuzzBALL - Symbolic execution tool built on the BitBlaze Vine component.
- S2E - Symbolic execution platform supporting x86, x86-64, or ARM software stacks.
- angr - Python framework for analyzing binaries. Includes a symbolic execution tool.
- Triton - Dynamic binary analysis platform that includes a dynamic symbolic execution tool.
- Sydr-Fuzz - Continuous Hybrid Fuzzing and Dynamic Analysis for Security Development Lifecycle.
- Mayhem
-
Rust
- Owi - Parallel (dynamic) symbolic execution engine built on WebAssembly (Wasm) that can run Rust code.
-
Sub Categories