tum-i4 / deadlines
Deadline countdowns for academic conferences relevant to the SSE chair.
☆11Updated last week
Alternatives and similar repositories for deadlines
Users that are interested in deadlines are comparing it to the libraries listed below
Sorting:
- ☆16Updated 3 months ago
- ☆25Updated 3 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 4 years ago
- ☆25Updated last month
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆35Updated 2 years ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆14Updated last week
- PTABen: Micro-benchmark Suite for Pointer Analysis☆78Updated last week
- A Static Differential Analysis Tool of Network Protocol Parsers☆24Updated last year
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- ☆59Updated this week
- The ISLa (Input Specification Language) language & solver.☆63Updated 10 months ago
- Mutation-guided mutation-based fuzz testing☆45Updated 10 months ago
- User Guided API Misuse Detection☆29Updated 2 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆71Updated 2 years ago
- Lifting network implementation to precise format specification☆24Updated 3 weeks ago
- ☆13Updated 2 years ago
- ☆40Updated last year
- ☆22Updated 2 years ago
- ☆34Updated 2 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆53Updated 2 months ago
- ☆56Updated last year
- This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Languag…☆32Updated 2 months ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- An external project example using SVF as a library☆22Updated 2 months ago
- ☆74Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Updated last year
- ☆55Updated last year
- ☆20Updated 3 years ago
- Fuzzing Deep-Learning Libraries via Automated Relational API Inference (ESEC/FSE 2022)☆37Updated last year