yagol2020 / Smart-TargetLinks
Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution
☆13Updated 2 years ago
Alternatives and similar repositories for Smart-Target
Users that are interested in Smart-Target are comparing it to the libraries listed below
Sorting:
- This is the dataset for our TSE paper "Defining Smart Contracts Defects on Ethereum"☆16Updated 5 months ago
- ☆26Updated 2 years ago
- ☆18Updated last year
- ☆22Updated 2 years ago
- ☆42Updated 3 years ago
- A project to automatically generate program repair recommendation in the field of smart contracts for given code snippets with their cont…☆15Updated 2 months ago
- Cross-Modality Mutual Learning for Smart Contract Vulnerability Detection☆33Updated 2 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆107Updated 2 years ago
- ☆10Updated last year
- ☆16Updated 11 months ago
- ☆74Updated last year
- We propose a novel DL-based mutation technique (LEAM), which adapts the syntax-guided encoder-decoder architecture to build two sub-model…☆27Updated 11 months ago
- ☆13Updated 2 years ago
- Smart Contract Vulnerability Detection Based on Deep Learning. (LSTM, BLSTM, BLSTM+Attention)☆28Updated 5 years ago
- ☆32Updated 2 years ago
- DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection (IJCNN 2021)☆24Updated 2 years ago
- “CBGRU: A Detection method of Smart Contract Vulnerability Based on Hybrid Model”☆11Updated 3 years ago
- VulnerabilityDetectionResearch☆86Updated 3 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆64Updated last year
- ☆12Updated 2 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆23Updated last year
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆36Updated 2 years ago
- Dataset containing source code and deployed bytecode for Solidity Smart Contracts that have been verified on Etherscan.io, along with a c…☆22Updated 2 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆26Updated 5 years ago
- ☆206Updated 10 months ago
- ☆83Updated 4 years ago
- ☆22Updated 3 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆17Updated last year
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆34Updated last year
- ☆28Updated 5 months ago