guanqun-yang / FewVulnerability
Detecting software vulnerability described public security reports with minimal training examples
☆13Updated 3 years ago
Alternatives and similar repositories for FewVulnerability:
Users that are interested in FewVulnerability are comparing it to the libraries listed below
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- A Survey of Deep Learning Models for Structural Code Understanding☆20Updated 2 years ago
- ☆16Updated 2 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆68Updated 2 years ago
- JSON schema representation of Stucco ontology☆20Updated 8 years ago
- ☆11Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆19Updated 11 months ago
- ☆75Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆34Updated 8 months ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- ☆17Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆57Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆52Updated 3 years ago
- ☆24Updated 3 weeks ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- Public Arena dataset☆12Updated 2 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- ☆13Updated 5 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆63Updated last year
- ☆33Updated 7 months ago
- ☆35Updated 4 months ago
- ☆14Updated 4 years ago
- GraphChi's C++ version. Big Data - small machine.☆16Updated 4 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆43Updated last year
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆87Updated last year
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 4 years ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆87Updated 9 months ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 4 years ago