☆22Mar 21, 2024Updated 2 years ago
Alternatives and similar repositories for TRACED_ICSE_24
Users that are interested in TRACED_ICSE_24 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆75Sep 24, 2024Updated last year
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- ☆16Nov 20, 2022Updated 3 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆76Jun 24, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- ☆54Nov 19, 2022Updated 3 years ago
- ☆16Aug 26, 2023Updated 2 years ago
- ☆10Jul 19, 2023Updated 2 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- ☆12Aug 9, 2020Updated 5 years ago
- ☆89Feb 1, 2021Updated 5 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [NeurIPS'24] SemCoder: Training Code Language Models with Comprehensive Semantics Reasoning☆27Nov 19, 2024Updated last year
- A Transformer-based Line-Level Vulnerability Prediction☆161Aug 5, 2024Updated last year
- ☆226Jul 25, 2024Updated last year
- ☆16Mar 22, 2024Updated 2 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- ☆21May 10, 2022Updated 3 years ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆24May 1, 2025Updated 10 months ago
- Mining Relevant Fix Patterns for Automated Program Repair☆31Dec 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Probing pre-trained source code models☆15Apr 27, 2022Updated 3 years ago
- We propose a novel DL-based mutation technique (LEAM), which adapts the syntax-guided encoder-decoder architecture to build two sub-model…☆29Jun 16, 2024Updated last year
- ☆11Mar 22, 2022Updated 4 years ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆115Dec 4, 2025Updated 3 months ago
- ☆22Nov 17, 2021Updated 4 years ago
- EvoEval: Evolving Coding Benchmarks via LLM☆81Apr 6, 2024Updated last year
- ☆102Oct 25, 2024Updated last year
- Labeled vulnerable functions statistics analysis and neural network training