WOOSEUNGHOON / MOVERY-public
☆26Updated last year
Alternatives and similar repositories for MOVERY-public:
Users that are interested in MOVERY-public are comparing it to the libraries listed below
- Public version of CNEPS☆20Updated last month
- ☆54Updated last year
- ☆37Updated 3 months ago
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆52Updated 3 weeks ago
- The repo for V0Finder (Security 21)☆26Updated 3 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated last year
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆60Updated last month
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆41Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆43Updated last year
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆32Updated last year
- ☆51Updated 4 years ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆33Updated 4 months ago
- No description yet☆11Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆38Updated last year
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆34Updated 2 years ago
- Program Vulnerability Repair via Inductive Inference☆18Updated last year
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆74Updated 5 months ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆23Updated 10 months ago
- 20 benchmark programs☆46Updated 3 years ago
- A C/C++ dependency scanner☆38Updated last year
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆65Updated 2 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆46Updated 4 months ago
- ☆14Updated last year
- ☆14Updated 5 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆48Updated this week
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆14Updated 5 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆58Updated 11 months ago
- This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Languag…☆27Updated 5 months ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated last year