This repository contains the replication package for the paper "Featherweight Assisted Vulnerability Discovery", David Binkley, Leon Moonen, Sibren Isaacman, Information and Software Technology, 2022, 106844, ISSN 0950-5849, DOI: 10.1016/j.infsof.2022.106844. https://www.sciencedirect.com/science/article/pii/S0950584922000209. The source code is distributed under the MIT license, the data is distributed under the CC BY 4.0 license. Repository Organization The overall process consists of three steps, organized as three directories: gathering of the labeled function names that are used as the source for step 2, in names dangerous word identification, in dangerous-words analysis of the data gathered during step 2, in analysis The dir...
This replication package can be used for replicating results in the paper. It contains 1) a dataset ...
Replication package for the paper "Automated Black-box Testing of Mass Assignment Vulnerabilities in...
This package allows to replicate the experiments described in the paper “Compositional Verification ...
This replication package contains the datasets, code and results for the paper "The Impact of Hard a...
The replication package for the "DeepCrime: Mutation Testing of Deep Learning Systems based on Real ...
This is the replication package for paper "On the impact of security vulnerabilities in the npm pack...
This replication package can be used for replicating results in the paper. It contains 1) a dataset ...
The present upload constitutes the Replication Package for the "Uncovering the Hidden Risks: The Imp...
This is the replication package for the paper "AI-based Fault-proneness Metrics for Source Code Chan...
This is the replication package for the paper "Assessing Exception Handling Testing Practices in Ope...
This is the replication package of the paper "Pre-training by Predicting Program Dependencies for Vu...
The replication package for the paper "SCPatcher: Mining Crowd Security Discussions to Enrich Secure...
A reproduction package for the paper "Data Quality for Software Vulnerability Datasets"</p
This is the replication package for the article "Machine Learning for the Identification and Classif...
This is the replication package for the paper: "Warnings: Violation Symptoms Indicating Architecture...
This replication package can be used for replicating results in the paper. It contains 1) a dataset ...
Replication package for the paper "Automated Black-box Testing of Mass Assignment Vulnerabilities in...
This package allows to replicate the experiments described in the paper “Compositional Verification ...
This replication package contains the datasets, code and results for the paper "The Impact of Hard a...
The replication package for the "DeepCrime: Mutation Testing of Deep Learning Systems based on Real ...
This is the replication package for paper "On the impact of security vulnerabilities in the npm pack...
This replication package can be used for replicating results in the paper. It contains 1) a dataset ...
The present upload constitutes the Replication Package for the "Uncovering the Hidden Risks: The Imp...
This is the replication package for the paper "AI-based Fault-proneness Metrics for Source Code Chan...
This is the replication package for the paper "Assessing Exception Handling Testing Practices in Ope...
This is the replication package of the paper "Pre-training by Predicting Program Dependencies for Vu...
The replication package for the paper "SCPatcher: Mining Crowd Security Discussions to Enrich Secure...
A reproduction package for the paper "Data Quality for Software Vulnerability Datasets"</p
This is the replication package for the article "Machine Learning for the Identification and Classif...
This is the replication package for the paper: "Warnings: Violation Symptoms Indicating Architecture...
This replication package can be used for replicating results in the paper. It contains 1) a dataset ...
Replication package for the paper "Automated Black-box Testing of Mass Assignment Vulnerabilities in...
This package allows to replicate the experiments described in the paper “Compositional Verification ...