MarM15 / js-transformationsLinks
JavaScript Transformation Techniques Detection
☆11Updated 4 years ago
Alternatives and similar repositories for js-transformations
Users that are interested in js-transformations are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆75Updated 4 years ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆47Updated 3 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆22Updated 9 months ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆136Updated 3 years ago
- ☆36Updated last year
- ☆50Updated 5 years ago
- A deep learning-based vulnerability detection framework☆76Updated last year
- This repository contains a list of papers about software supply chain☆29Updated last year
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- ☆60Updated last year
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆15Updated last year
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆12Updated 2 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 3 years ago
- ☆12Updated 3 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆29Updated 6 years ago
- ☆28Updated 3 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆101Updated 2 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆349Updated 4 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆113Updated 3 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆62Updated last year
- A Transformer-based Line-Level Vulnerability Prediction☆158Updated last year
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆74Updated 3 years ago
- ☆102Updated last year
- ☆220Updated last year
- ☆24Updated 2 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆28Updated 3 years ago
- ☆16Updated last year
- ☆26Updated 2 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Updated 2 years ago
- ☆32Updated 2 years ago