CGCL-codes / FIRE
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
☆11Updated 6 months ago
Alternatives and similar repositories for FIRE:
Users that are interested in FIRE are comparing it to the libraries listed below
- ☆11Updated 10 months ago
- [ICSE 2024 Industry Challenge Track] Official implementation of "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆55Updated 4 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆32Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 4 months ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆22Updated last year
- PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software (ISSTA 2024)☆19Updated last week
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆64Updated 2 months ago
- A manually vetted dataset for security vulnerability detection in Java projects☆44Updated last month
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆103Updated 2 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆66Updated 11 months ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated last year
- ☆82Updated 4 years ago
- ☆17Updated 7 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- VulnerabilityDetectionResearch☆84Updated 3 years ago
- A paper list of vulnerability detection using deep learning (updating)☆13Updated 11 months ago
- ☆25Updated 6 months ago
- ☆22Updated 2 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆42Updated 2 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆58Updated 6 months ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆68Updated 2 years ago
- ☆72Updated last year
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆34Updated last year
- ☆14Updated last year
- tool of llm-based indirect-call analyzer☆15Updated last month
- ☆22Updated 3 years ago
- ☆10Updated 2 years ago
- ☆29Updated 3 weeks ago
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆25Updated 10 months ago
- ☆11Updated last year