FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
☆16Sep 27, 2024Updated last year
Alternatives and similar repositories for FIRE
Users that are interested in FIRE are comparing it to the libraries listed below
Sorting:
- ☆12Oct 14, 2025Updated 5 months ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆16Jan 19, 2026Updated 2 months ago
- ☆18Mar 18, 2024Updated 2 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- Artifact for TOSEM Submission: GiantRepair☆13Jun 26, 2024Updated last year
- 一款信息泄漏利用工具,适用于.git/.svn/.DS_Store泄漏和目录列出(dumpall Golang重构版)☆21Apr 8, 2025Updated 11 months ago
- The code and dataset of the paper.☆15Mar 27, 2025Updated 11 months ago
- ☆20Aug 30, 2024Updated last year
- ☆21Nov 14, 2024Updated last year
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Dec 1, 2023Updated 2 years ago
- ☆39Jun 23, 2025Updated 8 months ago
- This project provides several implementations for commit untangling and proposes a new representation of git patches by projecting the pa…☆12Jul 28, 2025Updated 7 months ago
- YASA-UAST is an intermediate representation structure for multi-language program analysis. The UAST-Parser parses code from different pro…☆74Updated this week
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- Winnowing fingerprint extractor☆18Sep 12, 2025Updated 6 months ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆42Nov 4, 2023Updated 2 years ago
- ☆14May 28, 2024Updated last year
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs - DIMVA '24☆16Aug 20, 2024Updated last year
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 10 months ago
- ☆11Jul 8, 2024Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- 华中科技大学-网络空间安全学院-操作系统课程设计-2022春☆11Aug 28, 2022Updated 3 years ago
- 华中科技大学网络安全课程设计-Linux下的状态检测防火墙☆11Oct 17, 2022Updated 3 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- 《2021医学健康数据分析与挖掘》课程论文 -- 基于BERT的20NewsGroups数据集新闻分类实验☆10Jun 22, 2021Updated 4 years ago
- ML models often mispredict, and it is hard to tell when and why. We present a data mining based approach to discover whether there is a c…☆17Jun 6, 2022Updated 3 years ago
- ☆17Jul 25, 2024Updated last year
- ☆11Sep 6, 2024Updated last year
- Applies ROME and MEMIT on Mamba-S4 models☆14Apr 5, 2024Updated last year
- ☆13May 28, 2023Updated 2 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- ☆18Aug 21, 2025Updated 7 months ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago