MarkLee131 / PatchFinder
PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software (ISSTA 2024)
☆19Updated last month
Alternatives and similar repositories for PatchFinder:
Users that are interested in PatchFinder are comparing it to the libraries listed below
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆82Updated 2 months ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆70Updated 3 months ago
- [ICSE 2024 Industry Challenge Track] Official implementation of "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆61Updated 5 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆33Updated last year
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆71Updated 2 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆105Updated 2 years ago
- ☆9Updated last year
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆12Updated 7 months ago
- ☆99Updated 6 months ago
- ☆83Updated 4 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆16Updated last year
- ☆22Updated 3 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆135Updated 9 months ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆73Updated last year
- ☆32Updated last month
- This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Languag…☆31Updated last month
- Labeled vulnerable functions statistics analysis and neural network training☆26Updated 5 years ago
- ☆16Updated 10 months ago
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆35Updated 2 years ago
- ☆14Updated last year
- VulnerabilityDetectionResearch☆84Updated 3 years ago
- ☆12Updated last year
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆90Updated last year
- ☆13Updated 2 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆23Updated last year
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆36Updated last year
- ☆74Updated last year
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆63Updated 7 months ago