PSUCyberSecurityLab / AIforCybersecurityLinks
Code for Book "AI for Cybersecurity: A Handbook of Use Case"
☆21Updated 2 years ago
Alternatives and similar repositories for AIforCybersecurity
Users that are interested in AIforCybersecurity are comparing it to the libraries listed below
Sorting:
- ☆31Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆14Updated 2 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- ☆25Updated last year
- ☆10Updated 5 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆35Updated 2 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 3 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆62Updated 5 months ago
- ☆33Updated 2 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆47Updated 2 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- ☆13Updated last year
- ☆29Updated 2 years ago
- ☆44Updated 3 years ago
- Hey folks, this is a repository for papers on LLM for Vuln. Detection area☆61Updated 5 months ago
- This repository is used to store recording about papers and presentations readed.☆17Updated last year
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆87Updated 5 months ago
- ☆31Updated 3 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆31Updated 5 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆57Updated 6 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- Codee☆17Updated 4 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆28Updated last year
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆64Updated last month
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 5 years ago
- The scalable bug search for binaries☆69Updated 8 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆72Updated 10 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated 4 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆43Updated last year