SAP-samples / cross-language-detection-artifacts
This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment, the list of identified malicious packages, and the scripts necessary to replicate and verify our results.
☆15Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for cross-language-detection-artifacts
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆62Updated last month
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆241Updated 3 years ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆204Updated 3 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆39Updated 2 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆122Updated 2 years ago
- This repository contains a list of papers about software supply chain☆25Updated 5 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆82Updated last year
- [ICSE 2024 Industry Challenge Track] Official implementation of "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆45Updated last month
- A C/C++ dependency scanner☆37Updated 11 months ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆127Updated 11 months ago
- ☆23Updated last year
- ☆76Updated 3 years ago
- Public version of CNEPS☆17Updated 9 months ago
- ☆43Updated last year
- ☆50Updated 10 months ago
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆11Updated 10 months ago
- A curated list of malware-related papers.☆22Updated 8 months ago
- ☆23Updated 2 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆27Updated last year
- ☆24Updated 2 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆40Updated 2 years ago
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆23Updated 6 months ago
- ☆187Updated 3 months ago
- A Transformer-based Line-Level Vulnerability Prediction☆111Updated 3 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆27Updated 10 months ago
- ☆66Updated last year
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆51Updated last week
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆60Updated this week
- Repository for PrimeVul Vulnerability Detection Dataset☆76Updated 2 months ago
- A deep learning-based vulnerability detection framework☆74Updated 8 months ago