WOOSEUNGHOON / MOVERY-publicLinks
☆26Updated 2 years ago
Alternatives and similar repositories for MOVERY-public
Users that are interested in MOVERY-public are comparing it to the libraries listed below
Sorting:
- ☆57Updated last year
- Public version of CNEPS☆21Updated 5 months ago
- The repo for V0Finder (Security 21)☆26Updated 3 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆30Updated last year
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆52Updated 4 months ago
- ☆42Updated 7 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆34Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆64Updated last year
- ☆62Updated this week
- ☆14Updated 2 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆17Updated 3 weeks ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆86Updated 4 months ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆37Updated 8 months ago
- PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software (ISSTA 2024)☆19Updated 2 months ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Updated 9 months ago
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆89Updated 3 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- ☆18Updated 9 months ago
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆36Updated 2 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆73Updated 3 years ago
- This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Languag…☆33Updated 2 months ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆17Updated last year
- tool of llm-based indirect-call analyzer☆22Updated 3 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆55Updated 3 months ago
- ☆50Updated 4 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆107Updated 2 years ago
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆12Updated 8 months ago