ljiahao / TeLL
TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22
☆14Updated 2 years ago
Alternatives and similar repositories for TeLL:
Users that are interested in TeLL are comparing it to the libraries listed below
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆18Updated 2 months ago
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆49Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- ☆13Updated 4 months ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated last year
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆20Updated 5 months ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆51Updated 3 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆42Updated last year
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆58Updated last week
- ☆24Updated 3 months ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- ☆10Updated last year
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆14Updated last year
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆29Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆65Updated 2 months ago
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆49Updated last month
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆12Updated last year
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆79Updated last year
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆12Updated 2 weeks ago
- Repository for PrimeVul Vulnerability Detection Dataset☆93Updated 4 months ago
- ☆43Updated last year
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆28Updated last month
- ☆14Updated last year
- A Transformer-based Line-Level Vulnerability Prediction☆121Updated 5 months ago
- ☆13Updated 2 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆20Updated last year
- This is the implementation repository of our ICSE'22 paper: Muffin: Testing Deep Learning Libraries via Neural Architecture Fuzzing.☆30Updated 2 years ago
- A curated list of malware-related papers.☆23Updated 10 months ago
- A tool based on python to parse C/C++ code into code property graph☆14Updated 2 years ago