Vulnerable Source Code Collected from Open Source Repositories for Dataset Generation
☆17Dec 3, 2020Updated 5 years ago
Alternatives and similar repositories for SVCP4CDataset
Users that are interested in SVCP4CDataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆16Nov 7, 2022Updated 3 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Jan 30, 2019Updated 7 years ago
- ☆20May 20, 2019Updated 6 years ago
- Port of libgcov portions to enable a way to generate GCDA files for embedded systems☆34Nov 5, 2016Updated 9 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13May 19, 2024Updated last year
- ☆47Jul 15, 2022Updated 3 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Jul 10, 2020Updated 5 years ago
- ☆102Oct 25, 2024Updated last year
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated 2 months ago
- mTower is Trusted Execution Environment specially designed to be used on MicroController Units (MCUs) supporting ARM TrustZone technology…☆70Mar 1, 2026Updated 3 weeks ago
- Realize The Automation of UAV Cluster by Reinforcement Learning Approach☆12May 21, 2018Updated 7 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- zkSnark circuit compiler☆13Feb 19, 2026Updated last month
- MiDas: Multi-granularity Detector for Vulnerability Fixes (IEEE TSE)☆15Dec 5, 2023Updated 2 years ago
- ☆22Mar 21, 2024Updated 2 years ago
- a model extractor, to automatically extract Spin verification models from multi-threaded C code☆26Jan 3, 2025Updated last year
- vulnerability detection in python source code with LSTM networks☆152Mar 17, 2020Updated 6 years ago
- A Formal Verification of Algorithm W☆17Mar 10, 2021Updated 5 years ago
- Fast subset and superset queries based on tries.☆11Jun 21, 2023Updated 2 years ago
- ☆26Mar 28, 2023Updated 2 years ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆321Jul 30, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SmartSeed☆10Nov 4, 2018Updated 7 years ago
- ☆33Sep 7, 2020Updated 5 years ago
- ☆11Oct 30, 2024Updated last year
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆14Sep 17, 2019Updated 6 years ago
- Artemis Academy capstone project☆10Sep 10, 2022Updated 3 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- ESP32 BLE client for Xiaomi Mi Plant sensors☆13Apr 12, 2020Updated 5 years ago
- ☆15Sep 24, 2024Updated last year
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- source code analysis workshop☆17Mar 7, 2021Updated 5 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- GIoU loss simple example☆16Mar 26, 2019Updated 7 years ago
- Library built from scratch to implement zk-protocols☆13Dec 13, 2023Updated 2 years ago
- Version 2 of ZKaggle, 🏆 Finalist of ETHGlobal FVM Space Warp Hack☆16Jul 12, 2023Updated 2 years ago
- Library for creating and parsing HCI packets.☆18Aug 6, 2018Updated 7 years ago