MarM15 / js-transformationsLinks
JavaScript Transformation Techniques Detection
☆10Updated 4 years ago
Alternatives and similar repositories for js-transformations
Users that are interested in js-transformations are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆45Updated 3 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆20Updated 5 months ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆17Updated last year
- ☆33Updated 10 months ago
- This repository contains a list of papers about software supply chain☆29Updated last year
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆135Updated 2 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆28Updated 3 years ago
- A deep learning-based vulnerability detection framework☆76Updated last year
- ☆31Updated 2 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆13Updated 11 months ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆74Updated 3 years ago
- ☆16Updated last year
- Labeled vulnerable functions statistics analysis and neural network training☆27Updated 6 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Updated 6 years ago
- ☆50Updated 4 years ago
- ☆58Updated last year
- A vulnerability patch gathering tool☆43Updated 6 years ago
- ☆76Updated 2 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆17Updated last year
- ☆101Updated 10 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆95Updated last year
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Updated last year
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 8 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆110Updated 3 years ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆12Updated 2 years ago
- ☆23Updated 6 years ago
- ☆23Updated 2 years ago
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆20Updated 4 months ago