This is a companion repository made available to support experimental claims of the paper "Adversarial Reachability for Program-level Security Analysis" (read the paper).
You will find installation guidelines and a first-step tutorial in the getting started guide. The release contains a Docker image, it can also be found along with a Virtual Machine on Zenodo.
The entrypoint for further documentation is in the step-by-step guide. In particular, it details how to replay experiments present in the paper, or a shorter version of them when they are quite long to run.
This artifact is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License. It is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.