sodium49 / CNEPS-public
Public version of CNEPS
☆20Updated last month
Alternatives and similar repositories for CNEPS-public:
Users that are interested in CNEPS-public are comparing it to the libraries listed below
- ☆26Updated last year
- ☆54Updated last year
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated last year
- ☆36Updated 3 months ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆33Updated 4 months ago
- ☆51Updated 4 years ago
- A C/C++ dependency scanner☆38Updated last year
- 20 benchmark programs☆46Updated 3 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆48Updated 8 months ago
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆24Updated 9 months ago
- No description yet☆11Updated last year
- The repo for V0Finder (Security 21)☆26Updated 3 years ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆23Updated 10 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆31Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆41Updated 2 years ago
- ☆34Updated 2 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated last year
- Pre-built bitcode files for the Linux kernel☆22Updated 5 years ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆59Updated last month
- ☆67Updated 7 months ago
- ☆21Updated 9 months ago
- This repository contains a list of papers about software supply chain☆26Updated 8 months ago
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆11Updated last year
- This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Languag…☆25Updated 5 months ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- ☆11Updated 8 months ago
- PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software (ISSTA 2024)☆18Updated last month
- ☆28Updated last year
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆74Updated 5 months ago