tushartushar / ML4SCALinks
Machine Learning for Source Code Analysis
☆17Updated last year
Alternatives and similar repositories for ML4SCA
Users that are interested in ML4SCA are comparing it to the libraries listed below
Sorting:
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13Updated 3 years ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆78Updated last week
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆27Updated 8 months ago
- Replication Code for "Self-Supervised Bug Detection and Repair" NeurIPS 2021☆111Updated 3 years ago
- Code implementation for CoTexT: Multi-task Learning with Code-Text Transformer☆36Updated 4 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆18Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆14Updated 2 years ago
- ☆25Updated 2 years ago
- RepairAgent is an autonomous LLM-based agent for software repair.☆68Updated 2 months ago
- ☆10Updated 5 years ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆58Updated last year
- ☆65Updated last month
- Public BanditFuzz Repo☆12Updated 4 years ago
- ACER is an AST-based Callgraph Generator Development Framework☆38Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆45Updated 2 years ago
- Symmetric Encryption with Language Models☆13Updated 2 years ago
- Cyber Code Intelligence (CyberCI)☆14Updated 4 years ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆41Updated last month
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- ☆16Updated last year
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆44Updated last year
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆59Updated last week
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 5 years ago
- ☆15Updated 2 months ago
- Evolving fuzzers with large language models☆17Updated last year
- An empirical study on patch correctness☆15Updated 2 years ago
- Fast tokenization and structural analysis of any programming language☆59Updated 9 months ago
- RepairLLaMA: Efficient Representations and Fine-Tuned Adapters for Program Repair http://arxiv.org/pdf/2312.15698☆34Updated last month
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆27Updated 3 years ago
- Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natura…☆37Updated 2 years ago