MarM15 / js-transformationsLinks
JavaScript Transformation Techniques Detection
☆10Updated 4 years ago
Alternatives and similar repositories for js-transformations
Users that are interested in js-transformations are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- MPHunter can detect malicious packages without explicit knowledge.☆5Updated last year
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆20Updated 4 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆45Updated 3 years ago
- ☆32Updated 9 months ago
- ☆29Updated 3 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- ☆24Updated last year
- A deep learning-based vulnerability detection framework☆76Updated last year
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆133Updated 2 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆310Updated 4 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆26Updated 5 years ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆15Updated 11 months ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- ☆57Updated last year
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆110Updated 2 years ago
- ☆50Updated 4 years ago
- ☆31Updated 2 years ago
- ☆101Updated 8 months ago
- vulnerability detection in python source code with LSTM networks☆145Updated 5 years ago
- Automated Storyboard Generation for Android Apps☆34Updated 8 months ago
- ☆12Updated 2 years ago
- This repository contains a list of papers about software supply chain☆29Updated last year
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆12Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆88Updated 2 years ago
- Home page of project "KB"☆127Updated 3 months ago
- A Transformer-based Line-Level Vulnerability Prediction☆142Updated 11 months ago
- Discovered Data and Source Code☆10Updated 2 months ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆263Updated 11 months ago
- ☆22Updated 5 years ago