The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
☆13Aug 9, 2023Updated 2 years ago
Alternatives and similar repositories for SecretPatch
Users that are interested in SecretPatch are comparing it to the libraries listed below
Sorting:
- ☆11Jun 14, 2020Updated 5 years ago
- Jess is short for Joern extended by Semantic Slicing. This tool allows you to import C code into a Code Property Graph, and then compute …☆17May 22, 2024Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆49Aug 9, 2023Updated 2 years ago
- ☆50Dec 19, 2020Updated 5 years ago
- Github repo backing website for the CS Assistant Professor Handbook☆28Aug 28, 2024Updated last year
- Gson and Object Hierarchies☆12Dec 12, 2020Updated 5 years ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- A simple worker pool using channels☆14Feb 26, 2020Updated 6 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- ReDeBug Source Code.☆24Dec 12, 2023Updated 2 years ago
- ☆12Apr 22, 2023Updated 2 years ago
- ☆11Mar 8, 2021Updated 5 years ago
- Identifying the compiler family, version and compiler flags that generated a binary☆19Dec 19, 2019Updated 6 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- ☆57Oct 15, 2020Updated 5 years ago
- 基于CNN的新浪新闻文本分类☆11Jul 22, 2019Updated 6 years ago
- Implementation of Taint Tracking in LLVM compiler.☆10Jan 1, 2013Updated 13 years ago
- ☆16Sep 29, 2022Updated 3 years ago
- dijkstra algorithm optimized with heap☆14Dec 20, 2018Updated 7 years ago
- Code that accompanies the PyData New York (2022) talk: Addressing the sensitivity of Large language models☆13Nov 7, 2022Updated 3 years ago
- 30天自制操作系统的部分注释☆15Oct 5, 2018Updated 7 years ago
- Realize The Automation of UAV Cluster by Reinforcement Learning Approach☆12May 21, 2018Updated 7 years ago
- BinTuner☆67Jul 25, 2022Updated 3 years ago
- Panes zooming in tmux☆37Jun 6, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆23Feb 27, 2026Updated 3 weeks ago
- The collections of MOE (Mixture Of Expert) papers, code and tools, etc.☆12Mar 15, 2024Updated 2 years ago
- ☆16Aug 26, 2023Updated 2 years ago
- DARPA CASE program☆16Jun 10, 2025Updated 9 months ago
- ☆11Mar 22, 2022Updated 3 years ago
- Nuclear Powered Command-Line Tools☆12Nov 21, 2018Updated 7 years ago
- ☆15Oct 26, 2021Updated 4 years ago
- Cross-Domain Deep Code Search with Few-Shot Learning☆11Jul 5, 2023Updated 2 years ago
- Implementation of NRMS "Neural News Recommendation with Multi-Head Self-Attention" (EMNLP2019), in Pytorch☆10Jan 20, 2021Updated 5 years ago
- DokuWiki Docker image☆43Mar 6, 2026Updated 2 weeks ago
- Sign and verify digital signatures in native Python with RSA☆29Nov 10, 2011Updated 14 years ago
- Implementation of "Towards Understanding Mixture of Experts in Deep Learning", NeurIPS 2022☆10Jan 6, 2023Updated 3 years ago
- 《winsows内核安全与驱动开发》,谭文,陈铭霖等著。配套光盘example。现在还配光盘实在是浪费啊...☆24Dec 18, 2016Updated 9 years ago
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆14Sep 17, 2019Updated 6 years ago