yingdongucas / inconsistency_detection
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
☆75Updated last year
Related projects ⓘ
Alternatives and complementary repositories for inconsistency_detection
- ☆14Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆110Updated 3 years ago
- ☆73Updated last year
- Corpus of auto-labeled text for the cyber security domain☆90Updated 4 years ago
- Works about detecting vulnerable using ML.☆83Updated 4 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆34Updated 5 years ago
- ☆50Updated 3 years ago
- A deep learning-based vulnerability detection framework☆74Updated 8 months ago
- ☆18Updated 3 years ago
- ☆30Updated 3 years ago
- ☆41Updated 5 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆78Updated 2 years ago
- ☆11Updated 5 years ago
- Datasets of the paper: Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS☆18Updated 5 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆36Updated 6 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆20Updated 8 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆102Updated 5 years ago
- ☆95Updated 3 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 4 months ago
- ReDeBug Source Code.☆24Updated 10 months ago
- IoT Security Reading List☆62Updated 4 years ago
- Awesome materials for software supply chain security☆17Updated 4 years ago
- VulDeePecker algorithm implemented in Python☆105Updated 5 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆25Updated 6 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13Updated 4 years ago
- Codee☆17Updated 3 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 4 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆18Updated 2 years ago