yagol2020 / Smart-Target
Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution
☆13Updated 2 years ago
Alternatives and similar repositories for Smart-Target:
Users that are interested in Smart-Target are comparing it to the libraries listed below
- This is the dataset for our TSE paper "Defining Smart Contracts Defects on Ethereum"☆16Updated 3 months ago
- ☆42Updated 3 years ago
- ☆26Updated 2 years ago
- ☆18Updated last year
- Cross-Modality Mutual Learning for Smart Contract Vulnerability Detection☆31Updated 2 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆23Updated last year
- A project to automatically generate program repair recommendation in the field of smart contracts for given code snippets with their cont…☆15Updated last month
- ☆12Updated 2 years ago
- ☆22Updated 2 years ago
- ☆80Updated last year
- ☆9Updated last year
- MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabili…☆31Updated last year
- ☆16Updated 9 months ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆103Updated 2 years ago
- We propose a novel DL-based mutation technique (LEAM), which adapts the syntax-guided encoder-decoder architecture to build two sub-model…☆27Updated 10 months ago
- VulnerabilityDetectionResearch☆84Updated 3 years ago
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆12Updated last year
- Evaluation Results for the Paper "EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts"☆13Updated 3 years ago
- “CBGRU: A Detection method of Smart Contract Vulnerability Based on Hybrid Model”☆11Updated 2 years ago
- ☆12Updated 2 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆26Updated 5 years ago
- ☆13Updated 2 years ago
- Smart Contract Vulnerability Detection Based on Deep Learning. (LSTM, BLSTM, BLSTM+Attention)☆28Updated 5 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆132Updated 8 months ago
- ☆28Updated 3 months ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Updated last year
- ☆32Updated 2 years ago
- ☆15Updated 3 years ago
- ☆9Updated last year
- ☆11Updated last year