MarM15 / js-transformationsLinks
JavaScript Transformation Techniques Detection
☆10Updated 4 years ago
Alternatives and similar repositories for js-transformations
Users that are interested in js-transformations are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆46Updated 3 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆20Updated 7 months ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆135Updated 3 years ago
- This repository contains a list of papers about software supply chain☆29Updated last year
- ☆34Updated last year
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆12Updated 2 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆332Updated 4 years ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆17Updated last year
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆28Updated 3 years ago
- ☆102Updated 11 months ago
- ☆50Updated 4 years ago
- ☆12Updated 2 years ago
- A vulnerability patch gathering tool☆43Updated 6 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆28Updated 6 years ago
- A deep learning-based vulnerability detection framework☆76Updated last year
- ☆35Updated 3 years ago
- ☆16Updated last year
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆96Updated 2 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆74Updated 3 years ago
- ☆29Updated 3 years ago
- [ISSTA 2024] PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software☆22Updated 3 weeks ago
- A Transformer-based Line-Level Vulnerability Prediction☆147Updated last year
- ☆24Updated last year
- ☆342Updated 11 months ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆110Updated 3 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆237Updated last year
- ☆76Updated 2 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Updated last year