niklasrisse / LimitsOfML4Vuln
☆26Updated 11 months ago
Alternatives and similar repositories for LimitsOfML4Vuln:
Users that are interested in LimitsOfML4Vuln are comparing it to the libraries listed below
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Updated last year
- ☆22Updated 5 months ago
- Resources for our ICSE'24 poster: Prompt-Enhanced Software Vulnerability Detection Using ChatGPT.☆21Updated 8 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆37Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆13Updated last year
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆60Updated 2 weeks ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- Practical Data-Only Attack Generation☆33Updated 7 months ago
- ☆10Updated 4 years ago
- ☆16Updated last year
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆30Updated 3 months ago
- ☆23Updated 2 years ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆71Updated last month
- ☆11Updated 3 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆30Updated last year
- ICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode☆45Updated last year
- ☆42Updated 4 months ago
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆42Updated last year
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆53Updated 5 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆25Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆27Updated last week
- Coverage-guided Fuzzing as Online Stochastic Control☆44Updated 2 months ago
- ☆11Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆44Updated 2 months ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆38Updated 9 months ago
- ☆17Updated last year
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆84Updated last year
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆46Updated 4 months ago