ZhouyangJia / EH-MinerView external linksLinks
Mining Error-Handling Bugs without Error Specification Input
☆15Jan 13, 2020Updated 6 years ago
Alternatives and similar repositories for EH-Miner
Users that are interested in EH-Miner are comparing it to the libraries listed below
Sorting:
- Error-Log Statement Placement by Deep Understanding of Log Intention☆24Dec 23, 2020Updated 5 years ago
- ☆11Mar 8, 2021Updated 4 years ago
- Tool for detecting error handling bugs☆23Sep 11, 2016Updated 9 years ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Oct 4, 2019Updated 6 years ago
- configuration evolution dataset☆18Feb 25, 2021Updated 4 years ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆30Jun 24, 2025Updated 7 months ago
- Configuration dependency analysis for cloud software☆23Jan 4, 2022Updated 4 years ago
- ☆30Sep 16, 2021Updated 4 years ago
- Trophy case for Rudra bugs.☆40Feb 12, 2024Updated 2 years ago
- ☆14Aug 21, 2020Updated 5 years ago
- ☆12Apr 22, 2023Updated 2 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- ☆11Mar 29, 2019Updated 6 years ago
- AutoRNP -- Automated Repair of High Floating-Point Errors in Numerical Libraries☆12Dec 28, 2018Updated 7 years ago
- An implementation of Tare.☆12Feb 23, 2024Updated last year
- Automated Classification of Overfitting Patches with Statically Extracted Code Features http://arxiv.org/pdf/1910.12057☆11Jan 13, 2023Updated 3 years ago
- ☆13Jun 12, 2024Updated last year
- ☆10Jan 3, 2023Updated 3 years ago
- ☆15May 23, 2019Updated 6 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- Checkout our paper: History Driven Program Repair here☆11Mar 15, 2019Updated 6 years ago
- ☆10Nov 25, 2019Updated 6 years ago
- Structure-Aware C to Rust Translator☆21Dec 29, 2025Updated last month
- ☆21Mar 2, 2024Updated last year
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- A small group for NCU students who want to learn Hacking.☆12Dec 17, 2017Updated 8 years ago
- Repo for the paper: Towards Few-shot Entity Recognition in Document Images:A Label-aware Sequence-to-Sequence Framework☆14May 31, 2023Updated 2 years ago
- A Vectorized Implementation of the Tersoff Potential for the LAMMPS Molecular Dynamics Software☆13Nov 14, 2017Updated 8 years ago
- A tool of collecting patch-related commits and parsing patches.☆13Dec 2, 2018Updated 7 years ago
- Chronos: Zero-Shot Identification of Libraries from Vulnerability Reports (ICSE 2023, Technical Track)☆11Jul 23, 2023Updated 2 years ago
- 0xGame 2024 challenges and writeups☆14Jan 26, 2025Updated last year
- ☆53Nov 1, 2020Updated 5 years ago
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆12Jun 12, 2023Updated 2 years ago
- For our ICSE21 paper "CURE: Code-Aware Neural Machine Translation for Automatic Program Repair" by Nan Jiang, Thibaud Lutellier, and Lin …☆57Dec 8, 2022Updated 3 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- ☆14Feb 2, 2023Updated 3 years ago
- Identifying the compiler family, version and compiler flags that generated a binary☆19Dec 19, 2019Updated 6 years ago
- ☆14May 31, 2021Updated 4 years ago