CGCL-codes / FIRELinks
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
☆13Updated last year
Alternatives and similar repositories for FIRE
Users that are interested in FIRE are comparing it to the libraries listed below
Sorting:
- [ICSE 2024 Industry Challenge Track] Official implementation of "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆77Updated 10 months ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆110Updated 3 years ago
- ☆102Updated 11 months ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Updated last year
- VulnerabilityDetectionResearch☆90Updated 3 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆74Updated 3 years ago
- ☆11Updated last year
- ☆216Updated last year
- A Transformer-based Line-Level Vulnerability Prediction☆147Updated last year
- ☆85Updated 4 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆331Updated 4 years ago
- ☆21Updated last year
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆41Updated last year
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆236Updated last year
- [ISSTA 2024] PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software☆22Updated 3 weeks ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆67Updated last year
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆25Updated last year
- Repository for PrimeVul Vulnerability Detection Dataset☆184Updated last year
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆85Updated last year
- ☆76Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆47Updated 2 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆73Updated 10 months ago
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆39Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- ☆49Updated 2 years ago
- The code and dataset of the paper.☆14Updated 6 months ago
- ☆27Updated 2 years ago
- tool of llm-based indirect-call analyzer☆31Updated 7 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆96Updated 2 years ago
- ☆13Updated last year