WOOSEUNGHOON / MOVERY-publicLinks
☆26Updated 2 years ago
Alternatives and similar repositories for MOVERY-public
Users that are interested in MOVERY-public are comparing it to the libraries listed below
Sorting:
- Public version of CNEPS☆21Updated 5 months ago
- ☆57Updated last year
- ☆42Updated 8 months ago
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆52Updated 4 months ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆30Updated last year
- The repo for V0Finder (Security 21)☆26Updated 3 years ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆38Updated 9 months ago
- ☆63Updated this week
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- 20 benchmark programs☆47Updated 4 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆55Updated 4 months ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆46Updated 9 months ago
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆36Updated 2 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆37Updated last year
- No description yet☆11Updated 2 years ago
- ☆14Updated 3 months ago
- ☆18Updated 10 months ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆25Updated last year
- tool of llm-based indirect-call analyzer☆22Updated 4 months ago
- Two-Level Collaborative Fuzzing for Python Runtimes☆19Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆46Updated last year
- ☆14Updated 2 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Languag…☆33Updated 3 months ago
- ☆68Updated last year
- ☆31Updated last year
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- ☆85Updated last year
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆91Updated this week
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆64Updated last year