HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs
☆43Oct 18, 2022Updated 3 years ago
Alternatives and similar repositories for HiddenCPG
Users that are interested in HiddenCPG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Feb 19, 2024Updated 2 years ago
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 4 years ago
- ☆15Mar 19, 2022Updated 4 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆18Jun 21, 2025Updated 11 months ago
- RICC: Robust Collective Classification of Sybil Accounts☆11Jul 12, 2023Updated 2 years ago
- CFG based program similarity using Graph Neural Networks☆36Mar 21, 2023Updated 3 years ago
- ☆45Jan 30, 2023Updated 3 years ago
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆14Feb 19, 2020Updated 6 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆90May 3, 2024Updated 2 years ago
- ☆62Apr 24, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆18Mar 18, 2024Updated 2 years ago
- Code for the paper(VDoTR: Vulnerability Detection Based on Tensor Representation \\of Comprehensive Code Graphs)☆17Apr 23, 2023Updated 3 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆50Aug 9, 2023Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆84Mar 10, 2022Updated 4 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆31Dec 1, 2023Updated 2 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆102Apr 21, 2024Updated 2 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- ☆13Mar 19, 2022Updated 4 years ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago
- ☆12Sep 29, 2025Updated 7 months ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 9 months ago
- A repository for code risk analysis, bug prediction, software fault detection, software vulnerability detection, Quality analysis.☆18May 3, 2021Updated 5 years ago
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆29Jan 27, 2025Updated last year
- ☆353Oct 24, 2024Updated last year
- Received CVE list☆12Dec 24, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Codee☆17Dec 9, 2020Updated 5 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆105Nov 28, 2023Updated 2 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- ☆227Jul 25, 2024Updated last year
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆99Nov 27, 2023Updated 2 years ago
- CRash Scope (CRScope) is a ML-guided crash classifier of a given JavaScript engine crash-dump file.☆13Aug 28, 2019Updated 6 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated last year