chyanju / ReSySeVRLinks
Fixing SySeVR.
☆12Updated 3 years ago
Alternatives and similar repositories for ReSySeVR
Users that are interested in ReSySeVR are comparing it to the libraries listed below
Sorting:
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆37Updated last year
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆17Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆46Updated last year
- ☆83Updated 4 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- A deep learning-based vulnerability detection framework☆76Updated last year
- ☆100Updated 8 months ago
- ☆74Updated last year
- ☆46Updated 6 years ago
- ☆14Updated last year
- VulnerabilityDetectionResearch☆87Updated 3 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆74Updated 3 years ago
- ☆22Updated 3 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆108Updated 2 years ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆28Updated 4 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13Updated 5 years ago
- ☆24Updated last year
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆11Updated 2 years ago
- Code for ICSE'24 Paper☆10Updated last year
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Updated last year
- ☆11Updated 2 years ago
- ☆22Updated 3 years ago
- ☆10Updated 2 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆74Updated 3 years ago
- ☆13Updated 2 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆26Updated 5 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆77Updated last year
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Updated last year
- A paper list of vulnerability detection using deep learning (updating)☆13Updated last year