TQRG / secbench
🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)
☆38Updated 2 years ago
Alternatives and similar repositories for secbench:
Users that are interested in secbench are comparing it to the libraries listed below
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆88Updated last year
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆37Updated this week
- ☆36Updated 5 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆65Updated last year
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆39Updated 11 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- ☆26Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆42Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆78Updated last month
- ☆26Updated last year
- ☆19Updated 2 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆53Updated 4 months ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆61Updated last year
- Resources for our ICSE'24 poster: Prompt-Enhanced Software Vulnerability Detection Using ChatGPT.☆23Updated 10 months ago
- A collection of test cases in the Java language. It contains examples for 112 different CWEs.☆53Updated 3 years ago
- Replication code for the paper "On using distributed representations of source code for the detection of C security vulnerabilities"☆9Updated 2 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 4 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 4 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆68Updated 2 years ago
- ☆25Updated 6 months ago
- Cyber Code Intelligence (CyberCI)☆14Updated 4 years ago
- ☆95Updated 5 months ago
- This repository contains a list of papers about software supply chain☆27Updated 10 months ago
- ☆106Updated 8 months ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆26Updated last year
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆17Updated last month
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 4 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆43Updated 3 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆114Updated 3 years ago