yagol2020 / Smart-Target
Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution
☆13Updated 2 years ago
Alternatives and similar repositories for Smart-Target:
Users that are interested in Smart-Target are comparing it to the libraries listed below
- This is the dataset for our TSE paper "Defining Smart Contracts Defects on Ethereum"☆16Updated 3 weeks ago
- ☆39Updated 3 years ago
- ☆17Updated 8 months ago
- A project to automatically generate program repair recommendation in the field of smart contracts for given code snippets with their cont…☆12Updated 9 months ago
- ☆26Updated 2 years ago
- Cross-Modality Mutual Learning for Smart Contract Vulnerability Detection☆30Updated last year
- MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabili…☆31Updated last year
- Evaluation Results for the Paper "EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts"☆13Updated 3 years ago
- ☆21Updated last year
- Smart Contract Vulnerability Detection Based on Deep Learning. (LSTM, BLSTM, BLSTM+Attention)☆26Updated 5 years ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆58Updated last week
- ☆14Updated 6 months ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆20Updated last year
- Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accept…☆84Updated last year
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆92Updated 2 years ago
- ☆12Updated 2 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆25Updated 5 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆121Updated 5 months ago
- ☆12Updated last year
- VulnerabilityDetectionResearch☆79Updated 2 years ago
- ☆31Updated 2 years ago
- ☆12Updated last year
- We propose a novel DL-based mutation technique (LEAM), which adapts the syntax-guided encoder-decoder architecture to build two sub-model…☆27Updated 7 months ago
- ☆28Updated 3 weeks ago
- ☆9Updated last year
- ☆78Updated 3 years ago
- ☆14Updated last year
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆30Updated last year
- ☆23Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆57Updated 10 months ago