sa-bAbI is a software assurance dataset generator similar to the natural language dataset generator
☆27Dec 10, 2020Updated 5 years ago
Alternatives and similar repositories for sa-bAbI
Users that are interested in sa-bAbI are comparing it to the libraries listed below
Sorting:
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Feb 27, 2019Updated 7 years ago
- Experimental Deep Learning for Code Generation Processes☆13Jan 20, 2019Updated 7 years ago
- Datasets of the paper: Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS☆19Apr 9, 2019Updated 6 years ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- ☆20Feb 20, 2017Updated 9 years ago
- 基于Java实现的CMM语言解释器,包括词法分析,语法分析等☆23Jul 4, 2014Updated 11 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Jan 30, 2019Updated 7 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- Large-Scale Graph Inference☆12Nov 6, 2024Updated last year
- ☆12Nov 19, 2025Updated 3 months ago
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- ⚙️ Program slicer based on the Mozilla Lithium Tool for Java (also dubbed as Tandem-FL).☆11Oct 21, 2024Updated last year
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Detect adversarial images from intermediate features in distance space☆12Aug 22, 2018Updated 7 years ago
- String obfuscator based on the Mealy automata☆13Sep 16, 2017Updated 8 years ago
- A fuzzing environment for RL, based on Gym and AFL.☆13Dec 19, 2020Updated 5 years ago
- Official code of HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection.☆11Apr 14, 2025Updated 10 months ago
- Software defect prediction (predicting logical errors in source code files) using recurrent neural network and convolutional neural netwo…☆12Oct 16, 2020Updated 5 years ago
- A GAN demo project☆12Jan 2, 2020Updated 6 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- This is a authority management project.☆11Dec 18, 2020Updated 5 years ago
- ☆11Jan 3, 2018Updated 8 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Jun 7, 2013Updated 12 years ago
- software defect prediction☆11Jan 2, 2023Updated 3 years ago
- Simple boilerplate to compile and run WebAssembly modules.☆13Aug 23, 2017Updated 8 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago
- hexo pure theme☆10Aug 5, 2021Updated 4 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- ☆50Jan 19, 2019Updated 7 years ago
- Neural Code Comprehension: A Learnable Representation of Code Semantics☆216Nov 22, 2024Updated last year
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆345Nov 17, 2020Updated 5 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Jul 7, 2020Updated 5 years ago
- Sina News Crawler and Word Segmentation☆13Dec 20, 2017Updated 8 years ago