基于图神经网络的切片级漏洞检测及解释方法
☆46Oct 22, 2024Updated last year
Alternatives and similar repositories for Vuldetexp
Users that are interested in Vuldetexp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13May 28, 2023Updated 2 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- ☆14May 28, 2024Updated last year
- ☆29Nov 7, 2022Updated 3 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆76Jun 24, 2022Updated 3 years ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆115Dec 4, 2025Updated 3 months ago
- ☆10Apr 15, 2023Updated 2 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Dec 6, 2023Updated 2 years ago
- MiDas: Multi-granularity Detector for Vulnerability Fixes (IEEE TSE)☆15Dec 5, 2023Updated 2 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆115Aug 9, 2022Updated 3 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆256Jan 19, 2024Updated 2 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆357Mar 25, 2021Updated 4 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆43Apr 10, 2024Updated last year
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆34Jun 6, 2025Updated 9 months ago
- ☆22Nov 17, 2021Updated 4 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- Bootkits☆19Sep 13, 2023Updated 2 years ago
- 个人学术相关、项目相关调研资料以及笔记整理,不定期更新,主要涉及AI漏洞挖掘、逻辑漏洞自动化检测,图聚类等方面☆34May 20, 2024Updated last year
- NFT game using Polygon and Torus☆10Apr 30, 2021Updated 4 years ago
- 这是一份包含所有目前官方已知漏洞的C语言漏洞集合,用于科研使用☆12Apr 9, 2023Updated 2 years ago
- ☆350Oct 24, 2024Updated last year
- A Transformer-based Line-Level Vulnerability Prediction☆161Aug 5, 2024Updated last year
- MCP Server Semgrep is a [Model Context Protocol](https://modelcontextprotocol.io) compliant server that integrates the powerful Semgrep s…☆25Mar 20, 2025Updated last year
- VulDeePecker algorithm implemented in Python☆113May 8, 2019Updated 6 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆83Mar 10, 2022Updated 4 years ago
- Tools for building TIL for IDA SDK & exporting them to python wrapper☆21Jun 26, 2023Updated 2 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- ☆19Aug 23, 2024Updated last year
- ☆13Mar 19, 2022Updated 4 years ago
- 先知社区爬虫,爬取文章保存为本地md文件☆13Sep 24, 2022Updated 3 years ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆85Updated this week
- Python Control Flow Graph Generator☆19Feb 28, 2022Updated 4 years ago
- ☆12Oct 14, 2025Updated 5 months ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- Code using in Paper "Smart Contract Vulnerability Detection Based on Semantic Graph and Residual Graph Convolutional Networks with Edge A…☆16Apr 24, 2023Updated 2 years ago