BEESLab / ArcanumLinks
Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX Security Symposium 2024
☆14Updated 9 months ago
Alternatives and similar repositories for Arcanum
Users that are interested in Arcanum are comparing it to the libraries listed below
Sorting:
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆26Updated 3 years ago
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆18Updated last month
- Modular static malicious JavaScript detection system☆70Updated 4 years ago
- ODGen is a JavaScript Static Analysis tool to detect multiple types of vulnerabilities in Node.js packages.☆153Updated last year
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- JavaScript Transformation Techniques Detection☆10Updated 3 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆74Updated 3 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆24Updated 3 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆39Updated 2 years ago
- ☆31Updated 8 months ago
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆52Updated last year
- ☆38Updated 2 years ago
- TensorFlow API analysis tool and malicious model detection tool☆29Updated last week
- ☆29Updated last month
- A collection of client-side libraries with HTML injection vulnerabilities and DOM clobbering gadgets.☆16Updated 2 months ago
- ☆48Updated 2 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆11Updated 8 months ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- ☆28Updated 2 years ago
- ☆26Updated 8 months ago
- A collection of security papers on top-tier publications☆43Updated 3 weeks ago
- FirmSec Dataset☆34Updated 2 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆133Updated 2 years ago
- ☆29Updated 3 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆30Updated last year
- JAW: A Graph-based Security Analysis Framework for Client-side JavaScript☆107Updated 5 months ago
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆12Updated 8 months ago
- This repository contains a list of papers about software supply chain☆29Updated last year
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆34Updated last year