tushartushar / ML4SCA
Machine Learning for Source Code Analysis
☆17Updated last year
Alternatives and similar repositories for ML4SCA:
Users that are interested in ML4SCA are comparing it to the libraries listed below
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13Updated 2 years ago
- Replication code for the paper "On using distributed representations of source code for the detection of C security vulnerabilities"☆9Updated 2 years ago
- Public BanditFuzz Repo☆12Updated 4 years ago
- Code implementation for CoTexT: Multi-task Learning with Code-Text Transformer☆36Updated 3 years ago
- The dataset for the variable-misuse task, used in the ICLR 2020 paper 'Global Relational Models of Source Code' [https://openreview.net/f…☆22Updated 4 years ago
- the code for three models introduced in DYNAMIC NEURAL PROGRAM EMBEDDINGS FOR PROGRAM REPAIR (ICLR 18)☆32Updated 6 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆37Updated 2 years ago
- Repository of the paper 'CodeQueries: A Dataset of Semantic Queries over Code' published in ISEC 2024☆12Updated 10 months ago
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆13Updated 3 years ago
- Mining tool and large-scale datasets of single statement bug fixes in Python☆15Updated last year
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆28Updated 2 years ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆28Updated 3 months ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆52Updated last week
- RepairAgent is an autonomous LLM-based agent for software repair.☆32Updated 2 weeks ago
- A collection of recent papers, benchmarks and datasets of AI4Code domain.☆56Updated 10 months ago
- ExploitGen is a template-augmented Exploit Code generation method based on CodeBERT, which accepted in JSS.☆9Updated last year
- Recent Advances in Programming Language Pre-Trained Models (PL-PTMs)☆58Updated 3 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆38Updated 10 months ago
- ☆10Updated 4 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆88Updated last year
- Source Code Data Augmentation for Deep Learning: A Survey.☆64Updated 8 months ago
- ACER is an AST-based Callgraph Generator Development Framework☆31Updated 8 months ago
- ☆26Updated last year
- ☆15Updated 3 years ago
- CFG based program similarity using Graph Neural Networks☆35Updated last year
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- code and data for paper "ComFormer: Code Comment Generation via Transformer and Fusion Method-based Hybrid Code Representation" accepted …☆14Updated 2 years ago
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆27Updated 3 years ago
- Reproduction Code for FSE Paper "DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks"☆12Updated 4 years ago
- ☆16Updated 5 months ago