A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.
β12Dec 1, 2022Updated 3 years ago
Alternatives and similar repositories for VDET-for-Java
Users that are interested in VDET-for-Java are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- πͺ A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)β44Apr 14, 2025Updated last year
- βοΈ Program slicer based on the Mozilla Lithium Tool for Java (also dubbed as Tandem-FL).β11Oct 21, 2024Updated last year
- Probing pre-trained source code modelsβ15Apr 27, 2022Updated 4 years ago
- β16Aug 16, 2023Updated 2 years ago
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicingβ14Aug 21, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- β οΈ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)β¦β106Apr 22, 2026Updated 3 weeks ago
- β14Feb 5, 2024Updated 2 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/ACβ¦β10Jul 31, 2022Updated 3 years ago
- β48Jan 6, 2025Updated last year
- Finetuning large language models (LLMs) for vulnerability detectionβ55Apr 2, 2025Updated last year
- [ASE2024] Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Trainingβ11Sep 13, 2024Updated last year
- A First Look at Conventional Commits Classificationβ13Nov 18, 2024Updated last year
- VulnerabilityDetectionResearchβ94Mar 22, 2022Updated 4 years ago
- software defect predictionβ11Jan 2, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ΞΌSBS: Static Binary Sanitization of Bare-metal Embedded Devicesβ33Jul 14, 2022Updated 3 years ago
- A paper list of vulnerability detection using deep learning (updating)β14Apr 26, 2024Updated 2 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysisβ13Jul 16, 2024Updated last year
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfactβ¦β34Jun 6, 2025Updated 11 months ago
- Energy measurement framework for Mobile Appsβ12May 22, 2020Updated 5 years ago
- β10Dec 9, 2024Updated last year
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projectsβ38May 10, 2018Updated 8 years ago
- Fork from https://github.com/joxeankoret/mynav, works with IDA 7.0β11Jan 24, 2018Updated 8 years ago
- A library of assemblers and disassemblers derived from LLVM TableGen dataβ26May 5, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- LLM-Powered Code Security Scanningβ22Apr 2, 2025Updated last year
- FUNDED is a novel learning framework for building vulnerability detection models.β130Dec 6, 2023Updated 2 years ago
- Leveraging revolutionary Agent and Phi-2 technology, Graph Detective uncovers concealed linkages and discerns patterns, enabling pinpointβ¦β10Apr 21, 2024Updated 2 years ago
- β16Aug 26, 2023Updated 2 years ago
- β13Feb 29, 2024Updated 2 years ago
- This repository contains information related to the Root Cause Mapping Working Group and its activities. CVE Numbering Authority (CNA) reβ¦β17Jan 29, 2025Updated last year
- Data-Driven Software Vulnerability Discovery (SVD)β13May 27, 2020Updated 5 years ago
- ADD extracts features from patches such as repair patterns.β13Oct 2, 2023Updated 2 years ago
- ιη¨δΊζ·±ζΎ4Kζ ‘εη½ηθ½»ιεθͺε¨η»ε½θζ¬γεθͺζ ‘εη½ιͺθ―ιθΏγβ12Jun 17, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- TSED with Flexible Parserβ20Jan 22, 2026Updated 3 months ago
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thibaβ¦β41Nov 13, 2023Updated 2 years ago
- Source Code for ICML 2022 paper "Boosting Graph Structure Learning with Dummy Nodes"β19Apr 24, 2023Updated 3 years ago
- A deep learning-based vulnerability detection frameworkβ76Feb 29, 2024Updated 2 years ago
- Code for ICSE'24 Paperβ14Apr 21, 2024Updated 2 years ago
- A tool for finding instruction-level equivalence between two functions.β13Aug 26, 2025Updated 8 months ago
- β13Oct 31, 2022Updated 3 years ago