s3c2 / vfcfinderLinks
VFCFinder: Searching for the Missing Vulnerability Fixing Commits
☆29Updated last year
Alternatives and similar repositories for vfcfinder
Users that are interested in vfcfinder are comparing it to the libraries listed below
Sorting:
- ☆72Updated last week
- This repository contains a list of papers about software supply chain☆29Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆41Updated last year
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆30Updated last year
- ☆57Updated last year
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆107Updated 6 months ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆149Updated 2 years ago
- ☆31Updated 3 weeks ago
- Home page of project "KB"☆127Updated 3 months ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆263Updated 11 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆93Updated last year
- A C/C++ dependency scanner☆39Updated last year
- MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery☆35Updated 3 months ago
- ☆34Updated 2 years ago
- Public version of CNEPS☆21Updated 6 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆46Updated last year
- No description yet☆11Updated 2 years ago
- ☆26Updated last year
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆56Updated 5 years ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆30Updated 10 months ago
- ☆26Updated 2 years ago
- ☆26Updated 2 years ago
- ☆21Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 5 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆75Updated 3 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- ☆82Updated 3 months ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆39Updated 2 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated 2 months ago