joernio / joernti-codetidal5
An integration of JoernTI's CodeTIDAL5 neural type inference model.
☆24Updated 2 months ago
Alternatives and similar repositories for joernti-codetidal5:
Users that are interested in joernti-codetidal5 are comparing it to the libraries listed below
- Program analysis tools built on tree-sitter (https://github.com/tree-sitter/tree-sitter).☆38Updated last year
- ACER is an AST-based Callgraph Generator Development Framework☆32Updated 10 months ago
- A powerful relational representation of source code☆31Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- User Guided API Misuse Detection☆29Updated 2 years ago
- ☆26Updated 2 weeks ago
- Mutation-guided mutation-based fuzz testing☆45Updated 9 months ago
- ☆27Updated 2 years ago
- ☆19Updated last month
- A Micro-benchmarking Framework for Python Type Inference Tools☆33Updated last week
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 4 years ago
- ☆137Updated 5 months ago
- Extract and combine multiple source code views using tree-sitter☆132Updated 4 months ago
- ☆22Updated 2 years ago
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆24Updated 3 months ago
- GitHub Cloner & Compiler☆69Updated 3 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆34Updated last year
- Fast AST based code differencing in Python☆33Updated 3 months ago
- DBGBench Website:☆18Updated 4 years ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆17Updated 2 months ago
- ☆54Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated last week
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆18Updated 7 months ago
- ☆16Updated 2 months ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13Updated 2 years ago
- ☆39Updated last year
- Fine-tuning a LLM for generating the structured data☆20Updated 4 months ago
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago
- ☆10Updated 4 years ago
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆56Updated 5 months ago