LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use in AI/ML modeling. Originally used to create a SAST tool called Vulchecker and a lifting tool called CORBIN, but can be adapted to a wide variety of purposes. This public version contains examples from Vulcheck…
☆16May 17, 2023Updated 2 years ago
Alternatives and similar repositories for llap
Users that are interested in llap are comparing it to the libraries listed below
Sorting:
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆158Jun 28, 2023Updated 2 years ago
- Fuzzing Deep Learning Libraries Via Mining Security Knowledge from Open Source☆17May 14, 2024Updated last year
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- ☆26Sep 21, 2022Updated 3 years ago
- ghidra scripts☆15Feb 5, 2021Updated 5 years ago
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year
- ☆22Mar 21, 2024Updated 2 years ago
- ☆21May 10, 2022Updated 3 years ago
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆24May 1, 2025Updated 10 months ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- ☆54Nov 19, 2022Updated 3 years ago
- EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection☆18Jan 6, 2025Updated last year
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆76Jun 24, 2022Updated 3 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Mar 8, 2026Updated 2 weeks ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- ☆27Feb 9, 2023Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Attention-based multimodal fusion for sentiment analysis☆13Aug 14, 2018Updated 7 years ago
- The paper "Deep Graph Level Anomaly Detection with Contrastive Learning" has been accepted by Scientific Reports Journal.☆12Feb 10, 2023Updated 3 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆74Sep 24, 2024Updated last year
- This repository contains the implementation and the evaluation of our ESEC/FSE 2020 paper: Detecting Numerical Bugs in Neural Network Ar…☆25Dec 17, 2020Updated 5 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- This repository provides the code and guidance for reproducing the results in our ESEC/FSE 2023 submission "Pre-training Code Representat…☆27Jan 24, 2024Updated 2 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆49Aug 9, 2023Updated 2 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- ☆10Jul 19, 2023Updated 2 years ago
- source in sight 4 分享介绍 [官网](https://www.sourceinsight.com/)☆21Dec 16, 2019Updated 6 years ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- A data race detector for C+Pthreads programs☆12Nov 8, 2022Updated 3 years ago
- ☆12Aug 9, 2020Updated 5 years ago
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆14Sep 17, 2019Updated 6 years ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆81Mar 15, 2026Updated last week
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆34Jun 6, 2025Updated 9 months ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago