yingdongucas / inconsistency_detectionLinks
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
☆75Updated 2 years ago
Alternatives and similar repositories for inconsistency_detection
Users that are interested in inconsistency_detection are comparing it to the libraries listed below
Sorting:
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- An Automated Vulnerability Detection System☆60Updated 9 years ago
- Works about detecting vulnerable using ML.☆86Updated 5 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆332Updated 4 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆135Updated 2 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Updated 6 years ago
- VulDeePecker algorithm implemented in Python☆113Updated 6 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- ☆80Updated 2 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆96Updated 2 years ago
- IoT Security Reading List☆63Updated 5 years ago
- ☆50Updated 4 years ago
- ☆14Updated 4 years ago
- ☆101Updated 4 years ago
- ☆52Updated 4 years ago
- 恶意代码家族聚类。DataCon☆11Updated 6 years ago
- ReDeBug Source Code.☆24Updated last year
- Awesome materials for software supply chain security☆18Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆57Updated 4 years ago
- ☆11Updated 6 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆64Updated 2 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆186Updated 2 weeks ago
- Corpus of auto-labeled text for the cyber security domain☆97Updated 5 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 9 years ago
- ☆138Updated 7 years ago
- A deep learning-based vulnerability detection framework☆76Updated last year
- ☆22Updated 2 years ago