soarsmu / midas
MiDas: Multi-granularity Detector for Vulnerability Fixes (IEEE TSE)
☆11Updated last year
Alternatives and similar repositories for midas:
Users that are interested in midas are comparing it to the libraries listed below
- Labeled vulnerable functions statistics analysis and neural network training☆26Updated 5 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆22Updated last year
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆19Updated 2 years ago
- ☆22Updated 3 years ago
- ☆82Updated 4 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆60Updated last year
- ☆14Updated last year
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆16Updated last year
- ☆13Updated 3 years ago
- ☆19Updated last year
- SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning☆17Updated 3 years ago
- ☆22Updated 2 years ago
- ☆14Updated last year
- ☆15Updated 3 years ago
- ☆41Updated 2 years ago
- CD-VulD based on DR and TL☆8Updated 6 years ago
- A deep learning-based vulnerability detection framework☆75Updated last year
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆32Updated last year
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆66Updated 2 years ago
- VulnerabilityDetectionResearch☆83Updated 3 years ago
- ☆22Updated last year
- Functional clone detection(currently maintained version)☆33Updated 2 years ago
- ☆12Updated 2 years ago
- ☆11Updated last year
- ☆9Updated last year
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆12Updated last year
- Neural Program Repair with Execution-based Backpropagation http://arxiv.org/pdf/2105.04123☆23Updated 2 years ago
- ☆44Updated 2 years ago
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆34Updated last year
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Updated 6 years ago