This is the replication package of V-SZZ, which has been accepted by ICSE2022
☆16Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for V-SZZ
Users that are interested in V-SZZ are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project provides several implementations for commit untangling and proposes a new representation of git patches by projecting the pa…☆12Jul 28, 2025Updated 7 months ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- [ISSTA 2024] PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software☆26Sep 13, 2025Updated 6 months ago
- this is the repository for the paper titled "The Best of Both Worlds: Integrating Semantic Features with Expert Features for Defect Predi…☆21Aug 25, 2023Updated 2 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆136Mar 1, 2023Updated 3 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- ☆22Nov 17, 2021Updated 4 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Feb 25, 2023Updated 3 years ago
- Evaluating SZZ Implementations Through a Developer-informed Oracle (https://arxiv.org/abs/2102.03300)☆21Jun 1, 2023Updated 2 years ago
- refactoring-aware SZZ (RA-SZZ) Implementation☆14Apr 30, 2019Updated 6 years ago
- ☆39Jun 23, 2025Updated 9 months ago
- ☆13Feb 29, 2024Updated 2 years ago
- Python bindings for libsrcml☆17Aug 25, 2025Updated 6 months ago
- GLITCH is a technology-agnostic framework that enables automated detection of code smells in Infrastructure-as-Code scripts.☆29Mar 5, 2026Updated 2 weeks ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- ☆14May 28, 2024Updated last year
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Jul 10, 2020Updated 5 years ago
- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs - DIMVA '24☆16Aug 20, 2024Updated last year
- ☆57Oct 4, 2024Updated last year
- ☆11Jul 8, 2024Updated last year
- ☆226Jul 25, 2024Updated last year
- ☆34Nov 11, 2021Updated 4 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- ☆21Apr 23, 2025Updated 11 months ago
- ☆18Mar 18, 2024Updated 2 years ago
- Tool for analyzing git log messages and diffs.☆22Jan 13, 2021Updated 5 years ago
- ML models often mispredict, and it is hard to tell when and why. We present a data mining based approach to discover whether there is a c…☆17Jun 6, 2022Updated 3 years ago
- MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery☆67Dec 13, 2025Updated 3 months ago
- ☆19May 2, 2019Updated 6 years ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆42Nov 4, 2023Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆49Aug 9, 2023Updated 2 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆357Mar 25, 2021Updated 5 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- An implementation of the SZZ algorithm, i.e., an approach to identify bug-introducing commits.☆129Oct 4, 2023Updated 2 years ago