MarM15 / js-transformationsLinks
JavaScript Transformation Techniques Detection
☆10Updated 4 years ago
Alternatives and similar repositories for js-transformations
Users that are interested in js-transformations are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆70Updated 4 years ago
- MPHunter can detect malicious packages without explicit knowledge.☆5Updated last year
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆20Updated 3 months ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆15Updated 10 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆45Updated 3 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆26Updated 3 years ago
- This repository contains a list of papers about software supply chain☆29Updated last year
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆11Updated 2 years ago
- A deep learning-based vulnerability detection framework☆76Updated last year
- ☆12Updated 2 years ago
- ☆31Updated 8 months ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Updated 2 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆82Updated 5 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆64Updated last year
- Labeled vulnerable functions statistics analysis and neural network training☆26Updated 5 years ago
- ☆74Updated last year
- ☆57Updated last year
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆30Updated last year
- PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software (ISSTA 2024)☆19Updated 3 months ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆108Updated 2 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Updated 6 years ago
- ☆100Updated 8 months ago
- ☆26Updated 2 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- ☆26Updated 2 years ago
- A vulnerability patch gathering tool☆42Updated 6 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆17Updated last year
- ☆31Updated last year