MarM15 / js-transformations
JavaScript Transformation Techniques Detection
☆10Updated 3 years ago
Alternatives and similar repositories for js-transformations:
Users that are interested in js-transformations are comparing it to the libraries listed below
- Modular static malicious JavaScript detection system☆69Updated 4 years ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆13Updated 8 months ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆18Updated last month
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆25Updated 3 years ago
- ☆31Updated 6 months ago
- Labeled vulnerable functions statistics analysis and neural network training☆26Updated 5 years ago
- This repository contains a list of papers about software supply chain☆27Updated 10 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆43Updated 3 years ago
- ☆49Updated 4 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆81Updated 5 years ago
- A deep learning-based vulnerability detection framework☆76Updated last year
- PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software (ISSTA 2024)☆19Updated 3 weeks ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- ☆96Updated 5 months ago
- A vulnerability patch gathering tool☆42Updated 6 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆130Updated 2 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Updated 2 years ago
- ☆22Updated 5 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆62Updated last year
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆10Updated 2 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆128Updated last year
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆69Updated 2 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆103Updated 2 years ago
- ☆28Updated 3 years ago
- ☆12Updated 2 years ago
- ☆22Updated last year
- ☆11Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year