2 code implementations • 19 Jul 2021 • Guru Prasad Bhandari, Amara Naseer, Leon Moonen
Data-driven research on the automated discovery and repair of security vulnerabilities in source code requires comprehensive datasets of real-life vulnerable code and their fixes.