Data-Driven Software Vulnerability Discovery (SVD)
☆13May 27, 2020Updated 5 years ago
Alternatives and similar repositories for Data-Driven_Software_Vulnerability_Discovery
Users that are interested in Data-Driven_Software_Vulnerability_Discovery are comparing it to the libraries listed below
Sorting:
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Feb 27, 2019Updated 7 years ago
- To learn function representations from multi-domain knowledge bases for software vulnerability detection.☆15Aug 15, 2020Updated 5 years ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Jan 30, 2019Updated 7 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Feb 23, 2024Updated 2 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- ☆14Jul 21, 2020Updated 5 years ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆16Jan 19, 2026Updated last month
- ☆21Dec 4, 2020Updated 5 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆72May 27, 2022Updated 3 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Feb 25, 2023Updated 3 years ago
- ☆21Feb 15, 2022Updated 4 years ago
- Software vulnerability detection using machine learning through source codes (Exp-1). Replication of https://arxiv.org/abs/1807.04320.☆51Nov 24, 2021Updated 4 years ago
- ☆23Jul 19, 2019Updated 6 years ago
- VulnerabilityDetectionResearch☆93Mar 22, 2022Updated 3 years ago
- ☆223Jul 25, 2024Updated last year
- ☆23Nov 10, 2023Updated 2 years ago
- Sensitive and Collaborative Fuzzing with AFL☆27Jul 29, 2019Updated 6 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Sep 10, 2019Updated 6 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆29Jul 25, 2019Updated 6 years ago
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 6 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆33Feb 15, 2022Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- ☆82Jul 11, 2023Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- ☆10Mar 16, 2023Updated 2 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- ☆350Oct 24, 2024Updated last year
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆256Jan 19, 2024Updated 2 years ago
- A PyTorch implementation of `code2vec: Learning Distributed Representations of Code` (Alon et al., 2018)☆36Feb 26, 2019Updated 7 years ago