MarM15 / js-transformations
JavaScript Transformation Techniques Detection
☆10Updated 3 years ago
Alternatives and similar repositories for js-transformations:
Users that are interested in js-transformations are comparing it to the libraries listed below
- Modular static malicious JavaScript detection system☆69Updated 4 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆18Updated 11 months ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆24Updated 3 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆25Updated 5 years ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆43Updated 3 years ago
- ☆71Updated last year
- A deep learning-based vulnerability detection framework☆75Updated last year
- A vulnerability patch gathering tool☆41Updated 6 years ago
- PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software (ISSTA 2024)☆19Updated 2 months ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆16Updated last year
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆11Updated last year
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆95Updated 2 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆17Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆59Updated last year
- VulnerabilityDetectionResearch☆81Updated 2 years ago
- ☆50Updated 4 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆41Updated 2 years ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆13Updated last week
- ☆22Updated 5 years ago
- ☆14Updated last year
- ☆95Updated 4 months ago
- ☆22Updated 3 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆81Updated 5 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆128Updated 2 years ago
- ☆31Updated 5 months ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆278Updated 3 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆128Updated 6 months ago
- ☆26Updated last year