Aurore54F / HideNoSeek
Static data flow-based analysis of JavaScript files to detect syntactic clones
☆22Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for HideNoSeek
- ReDeBug Source Code.☆24Updated 10 months ago
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 4 years ago
- ☆44Updated 2 years ago
- ☆70Updated 3 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆36Updated last year
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 4 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆39Updated 2 years ago
- ☆50Updated 6 years ago
- ☆28Updated 2 years ago
- ☆14Updated 7 years ago
- Modular static malicious JavaScript detection system☆65Updated 3 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆22Updated 2 years ago
- Python library for CPGQL server☆21Updated 5 months ago
- ☆59Updated 7 years ago
- Recent Paper About Bug Detection☆30Updated 5 years ago
- Source code of MEUZZ fuzzer☆43Updated 2 years ago
- Codee☆17Updated 3 years ago
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆84Updated 6 months ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- Home page for this github organization☆22Updated 6 years ago
- ☆50Updated 3 years ago
- Run fuzzing experiments in Docker☆98Updated 3 years ago
- ☆10Updated 4 years ago
- Research papers on ML for security☆33Updated 4 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆34Updated 3 years ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆16Updated 7 months ago
- ☆9Updated 6 years ago
- ☆26Updated 2 years ago
- An Automated Vulnerability Detection System☆56Updated 8 years ago
- The Tangled Genealogy of IoT Malware☆10Updated 3 years ago