joernio / standalone-extLinks
Minimal example of a standalone program that depends on Joern
☆10Updated 3 months ago
Alternatives and similar repositories for standalone-ext
Users that are interested in standalone-ext are comparing it to the libraries listed below
Sorting:
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆25Updated 4 months ago
- Python library for CPGQL server☆29Updated last year
- Mutation-guided mutation-based fuzz testing☆45Updated 10 months ago
- Program analysis tools built on tree-sitter (https://github.com/tree-sitter/tree-sitter).☆42Updated last year
- ☆26Updated this week
- A powerful relational representation of source code☆31Updated last year
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago
- User Guided API Misuse Detection☆29Updated 2 years ago
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- An empirical study on patch correctness☆15Updated 2 years ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆17Updated 4 months ago
- Python library for code analysis with CPG and Joern☆20Updated last year
- ☆10Updated 4 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆34Updated last year
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 4 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆18Updated 8 months ago
- Interprocedural Distributive Environment algorithm implementation☆16Updated 9 years ago
- Sys, but no longer in Haskell☆18Updated 3 years ago
- ACER is an AST-based Callgraph Generator Development Framework☆33Updated 11 months ago
- Doop - Framework for Java Pointer and Taint Analysis☆19Updated 6 years ago
- ☆16Updated 8 months ago
- Fine-tuning a LLM for generating the structured data☆22Updated 6 months ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- ☆27Updated 2 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆46Updated 8 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- Camera Ready copy of FuzzSlice v1 code for ICSE☆17Updated last year
- ☆22Updated 3 months ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆30Updated last year
- ☆25Updated 3 years ago