☆21Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for C-Code-Slicer
Users that are interested in C-Code-Slicer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆30Jul 25, 2019Updated 6 years ago
- A repository for code risk analysis, bug prediction, software fault detection, software vulnerability detection, Quality analysis.☆18May 3, 2021Updated 4 years ago
- Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction☆10May 10, 2021Updated 4 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆228Jul 25, 2024Updated last year
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆74May 27, 2022Updated 3 years ago
- ☆12Nov 19, 2025Updated 4 months ago
- ☆22May 10, 2022Updated 3 years ago
- ☆41Jan 13, 2023Updated 3 years ago
- ☆350Oct 24, 2024Updated last year
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆12May 8, 2022Updated 3 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- MODIT: On Multi-Modal Learning of Editing Source Code.☆20Apr 24, 2021Updated 4 years ago
- An implementation of Contract-Net Protocol in an attacker/defender scenario☆11Jul 8, 2022Updated 3 years ago
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆52Jan 31, 2025Updated last year
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆258Jan 19, 2024Updated 2 years ago
- MATLAB codes and source data for the experimental calibration of a UAV digital twin☆17Jun 30, 2023Updated 2 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- ☆50Dec 19, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DeepSeek-V3, R1 671B on 8xH100 Throughput Benchmarks☆21Mar 13, 2025Updated last year
- ☆14Mar 3, 2022Updated 4 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Jan 27, 2019Updated 7 years ago
- Implementation of Taint Tracking in LLVM compiler.☆10Jan 1, 2013Updated 13 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Jan 30, 2019Updated 7 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Feb 23, 2024Updated 2 years ago
- ebpf/xdp-based IPSec L2 load-balancer☆13Aug 3, 2023Updated 2 years ago
- dijkstra algorithm optimized with heap☆14Dec 20, 2018Updated 7 years ago
- 3D feature-based image registration for neuroscience datasets☆14Aug 23, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆83Jul 11, 2023Updated 2 years ago
- Official code of our work, Unified Pre-training for Program Understanding and Generation [NAACL 2021].☆186Mar 1, 2022Updated 4 years ago
- ☆16Aug 26, 2023Updated 2 years ago
- DARPA CASE program☆16Jun 10, 2025Updated 10 months ago
- This repo illustrates how to evaluate the artifacts in the paper Deep Just-in-Time Defect Prediction: How Far Are We? published in ISSTA'…☆37Nov 20, 2023Updated 2 years ago
- Deadline countdowns for academic conferences relevant to the SSE chair.☆13Feb 10, 2026Updated 2 months ago
- A Linux XDP based load balancer☆13Jan 12, 2021Updated 5 years ago