Hustcw / VulBench
This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), deep learning methods and static analyzers
☆66Updated 2 months ago
Alternatives and similar repositories for VulBench:
Users that are interested in VulBench are comparing it to the libraries listed below
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆42Updated last year
- This is the official repository for VulHawk.☆68Updated last year
- ☆24Updated 4 months ago
- ☆39Updated 11 months ago
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆44Updated 11 months ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆59Updated last month
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆152Updated 2 months ago
- A collection of security papers on top-tier publications☆39Updated last week
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆94Updated 2 years ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆143Updated last year
- ☆78Updated last year
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆42Updated 11 months ago
- A curated list of malware-related papers.☆23Updated 11 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆31Updated last year
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated last year
- FirmSec Dataset☆33Updated 2 years ago
- Recent Paper About Bug Detection☆30Updated 5 years ago
- ☆34Updated 2 years ago
- ☆14Updated 5 months ago
- Academic Papers about LLM Application on Security☆118Updated last week
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆41Updated 2 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆62Updated 2 months ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆24Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆46Updated 3 months ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆53Updated 5 years ago
- ☆95Updated 3 months ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision☆54Updated 4 months ago