CGCL-codes / FIRELinks
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
☆15Updated last year
Alternatives and similar repositories for FIRE
Users that are interested in FIRE are comparing it to the libraries listed below
Sorting:
- [ICSE'24 Industry Challenge Track] "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆90Updated last year
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆43Updated 2 years ago
- ☆21Updated last year
- ☆15Updated last year
- A Transformer-based Line-Level Vulnerability Prediction☆159Updated last year
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆114Updated 3 years ago
- ☆102Updated last year
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆352Updated 4 years ago
- ☆222Updated last year
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Updated 2 years ago
- Repository for PrimeVul Vulnerability Detection Dataset☆209Updated last year
- ☆88Updated 4 years ago
- A paper list of vulnerability detection using deep learning (updating)☆13Updated last year
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆253Updated 2 years ago
- VulnerabilityDetectionResearch☆94Updated 3 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆95Updated last year
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆71Updated last year
- SecVulEval is a dataset of C/C++ vulnerabilities.☆18Updated last month
- ☆12Updated 3 months ago
- ☆14Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 3 years ago
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆41Updated 2 years ago
- ☆47Updated 10 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year
- ☆80Updated 2 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆73Updated 3 years ago
- [ISSTA 2024] PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software☆26Updated 4 months ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆27Updated 2 years ago
- ☆90Updated 2 years ago
- tool of llm-based indirect-call analyzer☆31Updated 11 months ago