TruX-DTF / findbugs-violationsView external linksLinks
☆14Sep 1, 2022Updated 3 years ago
Alternatives and similar repositories for findbugs-violations
Users that are interested in findbugs-violations are comparing it to the libraries listed below
Sorting:
- A reimplementation of LastPyMile: A Python-based library to Identify the differences between build artifacts of PyPI packages and the res…☆15Jan 8, 2022Updated 4 years ago
- Defects4J Dissection presents data to help researchers and practitioners to better understand the Defects4J bug dataset☆68Sep 18, 2023Updated 2 years ago
- ☆15Sep 20, 2019Updated 6 years ago
- ☆16Jul 8, 2024Updated last year
- AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations☆26Apr 26, 2021Updated 4 years ago
- DeepLocalize: Fault Localization for Deep NeuralNetworks☆27Feb 23, 2021Updated 4 years ago
- COM S 413/513 and CPR E 513 Program Analysis @ Iowa State University☆30Nov 3, 2023Updated 2 years ago
- ☆15Aug 16, 2021Updated 4 years ago
- Fault localization and automated program repair techniques☆34Aug 26, 2025Updated 5 months ago
- A Java version of the automatic program repair described by RSRepair and GenProg.☆11Jan 6, 2016Updated 10 years ago
- src2abs is a tool that abstracts Java source code☆35Apr 10, 2019Updated 6 years ago
- MLonCode community effort to implement Learning Distributed Representations of Code (https://arxiv.org/pdf/1803.09473.pdf)☆39Oct 18, 2018Updated 7 years ago
- ☆13Mar 19, 2022Updated 3 years ago
- Exploring Methods of Protecting Confidential Erlang Workloads with Intel SGX☆12Jun 19, 2020Updated 5 years ago
- Mini-project based on activity detection dataset at UCIML. Checkout branches for latest push.☆12Sep 20, 2017Updated 8 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆10Jun 1, 2017Updated 8 years ago
- Learning Coccinelle☆11Nov 2, 2017Updated 8 years ago
- Occlum's fork of Intel SGX SDK for Linux☆13Jul 31, 2024Updated last year
- ruby Bugzilla access library☆18Nov 15, 2019Updated 6 years ago
- ☆10May 26, 2019Updated 6 years ago
- Trusted in-memory key-value store based on ShieldStore which is published in EuroSys 2019☆39Nov 16, 2022Updated 3 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- Bilateral Neural Network implementation in Tensorflow☆51Mar 23, 2019Updated 6 years ago
- ☆15Mar 19, 2022Updated 3 years ago
- Project Usus Eclipse Plugins☆13Jan 4, 2018Updated 8 years ago
- Yuca: A light-weight, in-memory, fast and simple to use search engine library.☆13Apr 3, 2019Updated 6 years ago
- Fast and Precise On-the-fly Patch Validation for All☆10Feb 24, 2023Updated 2 years ago
- ☆10Feb 9, 2019Updated 7 years ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated last week
- Source code and data about our large scale study about Java annotaion in practice☆12Apr 14, 2023Updated 2 years ago
- ☆11Mar 20, 2017Updated 8 years ago
- A hybrid analysis framework to aid in uncovering deserialization vulnerabilities☆15Oct 13, 2024Updated last year
- Collection of scripts for Linux kernel development☆13Jun 6, 2024Updated last year
- Performing C&W attack on Recurrent Neural Network☆12Sep 26, 2018Updated 7 years ago
- Intel® Software Guard Extensions (Intel® SGX) Samples☆11Dec 2, 2016Updated 9 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- ☆12Jun 13, 2022Updated 3 years ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Jun 30, 2023Updated 2 years ago