MarM15 / js-transformations
JavaScript Transformation Techniques Detection
☆10Updated 3 years ago
Alternatives and similar repositories for js-transformations:
Users that are interested in js-transformations are comparing it to the libraries listed below
- Modular static malicious JavaScript detection system☆66Updated 4 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆23Updated 2 years ago
- ☆29Updated 3 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆30Updated last year
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆11Updated 2 years ago
- ☆68Updated last year
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆127Updated 2 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆17Updated last year
- A deep learning-based vulnerability detection framework☆74Updated 11 months ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆16Updated 10 months ago
- Labeled vulnerable functions statistics analysis and neural network training☆25Updated 5 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆41Updated 2 years ago
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆74Updated 4 months ago
- Public version of CNEPS☆20Updated last month
- Automated Storyboard Generation for Android Apps☆32Updated 3 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆42Updated 3 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆64Updated 2 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆93Updated 2 years ago
- ☆51Updated 4 years ago
- ☆19Updated last year
- This repository contains a list of papers about software supply chain☆26Updated 8 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆42Updated last year
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆34Updated 6 years ago
- ☆23Updated 2 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆122Updated 5 months ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆58Updated 11 months ago
- ☆29Updated last year
- ☆54Updated last year
- ☆14Updated last year