WOOSEUNGHOON / Centris-publicLinks
☆57Updated last year
Alternatives and similar repositories for Centris-public
Users that are interested in Centris-public are comparing it to the libraries listed below
Sorting:
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆30Updated last year
- A C/C++ dependency scanner☆39Updated last year
- ☆34Updated 2 years ago
- ☆26Updated 2 years ago
- Public version of CNEPS☆21Updated 6 months ago
- ☆50Updated 4 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆56Updated 5 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆149Updated 2 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆93Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆41Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 7 months ago
- This repository contains a list of papers about software supply chain☆29Updated last year
- ☆101Updated 8 months ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆74Updated 3 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆46Updated last year
- MPHunter can detect malicious packages without explicit knowledge.☆5Updated last year
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆25Updated last year
- tool of llm-based indirect-call analyzer☆21Updated 4 months ago
- Recent Paper About Bug Detection☆31Updated 5 years ago
- ☆71Updated last week
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆51Updated 5 months ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- ☆81Updated 3 months ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆133Updated 2 years ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆263Updated 11 months ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 5 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆37Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆38Updated 9 months ago
- ☆61Updated last year