CryptoGuardOSS / cryptoapi-benchLinks
☆12Updated 3 years ago
Alternatives and similar repositories for cryptoapi-bench
Users that are interested in cryptoapi-bench are comparing it to the libraries listed below
Sorting:
- ☆57Updated last year
- ☆74Updated 2 years ago
- Recent Paper About Bug Detection☆31Updated 5 years ago
- User Guided API Misuse Detection☆29Updated 2 years ago
- ☆100Updated 7 months ago
- ☆26Updated 8 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆73Updated 3 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 6 years ago
- ☆99Updated 7 months ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- ☆31Updated last year
- ☆44Updated 2 years ago
- ☆50Updated 4 years ago
- ☆35Updated 2 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 4 years ago
- ☆24Updated last year
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆44Updated 5 years ago
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆36Updated 2 years ago
- ☆57Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆17Updated 3 weeks ago
- ☆40Updated last year
- An Automated Vulnerability Detection System☆60Updated 8 years ago
- ☆84Updated last year