User Guided API Misuse Detection
☆30Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for arbitrar
Users that are interested in arbitrar are comparing it to the libraries listed below
Sorting:
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆18Oct 5, 2021Updated 4 years ago
- Python library for CPGQL server☆41Jun 4, 2024Updated last year
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆64Nov 5, 2021Updated 4 years ago
- ☆27Feb 9, 2023Updated 3 years ago
- An automatic API misuse checker for C programs!☆19Apr 3, 2019Updated 6 years ago
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution☆22May 29, 2023Updated 2 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆50Sep 25, 2024Updated last year
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆56Feb 17, 2025Updated last year
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- A text classifier in Python using classification algorithms of machine learning (Support vector machines, Naïve Bayes classifier) to dete…☆11Dec 11, 2017Updated 8 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆38Mar 8, 2023Updated 2 years ago
- ☆45Apr 12, 2022Updated 3 years ago
- ☆10Mar 24, 2022Updated 3 years ago
- Big Data and Machine Intelligence, Spring 2021.☆12Jul 2, 2021Updated 4 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 4 months ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆52Jun 18, 2025Updated 8 months ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 9 months ago
- ShiftLeft Scan is a free and open-source commercial-grade security tool for modern DevOps teams.☆13Dec 30, 2022Updated 3 years ago
- Plugins for Influx Telegraf☆10Mar 9, 2017Updated 8 years ago
- This is an Android plugin, which can improve the performance of layout loading by parsing the layout xml file during the compilation peri…☆10Sep 20, 2023Updated 2 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Artifact for TOSEM Submission: GiantRepair☆13Jun 26, 2024Updated last year
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- A toy WebAssembly(wasm) interpreter written in Swift☆16Jan 25, 2025Updated last year
- ☆11Feb 16, 2024Updated 2 years ago
- 解析PE文件,对PE文件进行静态变形,简单的加密壳。☆10Dec 26, 2020Updated 5 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆15Sep 27, 2024Updated last year
- Source code for "An Empirical Study of Code Smells in Transformer-based Code Generation Techniques".☆11Oct 4, 2022Updated 3 years ago
- ☆11Aug 19, 2016Updated 9 years ago
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 6 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆10Mar 3, 2019Updated 7 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- ☆11Aug 24, 2024Updated last year