lkpsg / ccscanner
A C/C++ dependency scanner
☆36Updated 9 months ago
Related projects: ⓘ
- Public version of CNEPS☆16Updated 7 months ago
- ☆50Updated 8 months ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆26Updated last year
- This repository contains a list of papers about software supply chain☆25Updated 3 months ago
- ☆33Updated last year
- ☆22Updated last year
- ☆22Updated 2 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆54Updated 5 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆40Updated last year
- ☆21Updated 3 weeks ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆33Updated 2 months ago
- The source code of project "LLift" (Enhancing static analysis with LLM)☆47Updated 6 months ago
- ☆50Updated 3 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆19Updated 9 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆36Updated 11 months ago
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆60Updated last week
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆60Updated 2 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆100Updated last month
- ☆74Updated last year
- ☆64Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆56Updated 3 weeks ago
- Recent Paper About Bug Detection☆29Updated 4 years ago
- AutoPruner: Transformer-based Call Graph Pruning (ESEC/FSE 2022, Research Track)☆20Updated 9 months ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆9Updated 2 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆80Updated last year
- User Guided API Misuse Detection☆26Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆38Updated last year
- 20 benchmark programs☆43Updated 3 years ago
- For our paper DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions (ISSTA'22)☆33Updated 2 years ago
- No description yet☆11Updated last year