Skip to content

Artifact for ISSTA'23 paper "Understanding and Tackling Label Errors in Deep Learning-based Vulnerability Detection (Experience Paper)"

Notifications You must be signed in to change notification settings

security-pride/Vulnerability-Dataset-Denoising

Repository files navigation

This toolkit is all the code used by Issta2023

Folder Description:

configs:

config files for deep learning models. In this work, we just use deepwukong.yaml, silver.yaml, and vuldeepecker.yaml.

models:

code files for deep learning models.

prepare_data:

util files that prepare data for FFmpeg+qumu.

tools:

program slice util files.

utils:

commonly used functions.

confident_learning.py:

entrance of confident learning.

differential_training.py:

entrance of differential training.

dwk_train.py:

entrance of training deepwukong.

sys_train.py:

entrance of training sysevr.

vdp_train.py:

entrance of training vuldeepecker.

scrd_crawl.py:

code for crawling sard dataset.

Datasets:

SARD:

You can crawl vulnerability data from the SARD official website through script:

python sard_crawl.py

Qemu+FFmpeg:Qemu+FFmpeg

You can download it via this link.

About

Artifact for ISSTA'23 paper "Understanding and Tackling Label Errors in Deep Learning-based Vulnerability Detection (Experience Paper)"

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •