WOOSEUNGHOON / MOVERY-public
☆26Updated 2 years ago
Alternatives and similar repositories for MOVERY-public:
Users that are interested in MOVERY-public are comparing it to the libraries listed below
- Public version of CNEPS☆21Updated 3 months ago
- ☆54Updated last year
- The repo for V0Finder (Security 21)☆26Updated 3 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- ☆41Updated 5 months ago
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆51Updated 2 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆33Updated last year
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆67Updated 3 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆36Updated 6 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆51Updated 2 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- 20 benchmark programs☆47Updated 4 years ago
- PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software (ISSTA 2024)☆19Updated last month
- ☆49Updated 4 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆12Updated 6 months ago
- ☆54Updated this week
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Languag…☆31Updated last month
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Updated last year
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 4 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆46Updated 6 months ago
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆82Updated last month
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆103Updated 2 years ago
- tool of llm-based indirect-call analyzer☆18Updated 2 months ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆16Updated last year
- No description yet☆11Updated last year
- ☆69Updated 9 months ago