SAP-samples / cross-language-detection-artifacts
This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment, the list of identified malicious packages, and the scripts necessary to replicate and verify our results.
☆11Updated 6 months ago
Related projects: ⓘ
- FUNDED is a novel learning framework for building vulnerability detection models.☆121Updated 9 months ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆227Updated 3 years ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆187Updated last month
- Public version of CNEPS☆16Updated 7 months ago
- A C/C++ dependency scanner☆36Updated 9 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆35Updated 2 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆115Updated last year
- This repository contains a list of papers about software supply chain☆25Updated 3 months ago
- ☆43Updated last year
- The repository has collected about 9500 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of M…☆47Updated this week
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆80Updated last year
- ☆22Updated 2 years ago
- A deep learning-based vulnerability detection framework☆72Updated 6 months ago
- ☆50Updated 8 months ago
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆10Updated 8 months ago
- vulnerability detection in python source code with LSTM networks☆108Updated 4 years ago
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆23Updated 4 months ago
- Labeled vulnerable functions statistics analysis and neural network training☆24Updated 5 years ago
- ☆21Updated 3 weeks ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆38Updated last year
- ☆75Updated 3 years ago
- [ICSE 2024 Industry Challenge Track] Official implementation of "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆36Updated 4 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆23Updated 8 months ago
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆49Updated 7 months ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆75Updated last year
- ☆22Updated last year
- ☆22Updated last year
- A Transformer-based Line-Level Vulnerability Prediction☆100Updated last month
- MiDas: Multi-granularity Detector for Vulnerability Fixes (IEEE TSE)☆10Updated 9 months ago
- Automated Storyboard Generation for Android Apps☆31Updated 5 months ago