Transformers for Secure Hardware Systems: Applications, Challenges, and Outlook Authors: Banafsheh Saber Latibari, Najmeh Nazari, Avesta Sasan, Houman Homayoun, Pratik Satam, Soheil Salehi, Hossein Sayadi | Published: 2025-05-28 Security AnalysisHardware Trojan DetectionBackdoor Detection 2025.05.28 2025.05.30 Literature Database
Poster: Developing an O-RAN Security Test Lab Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02 WatermarkingCybersecuritySecurity Analysis 2024.09.02 2025.05.27 Literature Database
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Authors: Niklas Risse, Jing Liu, Marcel Böhme | Published: 2024-08-23 | Updated: 2025-04-23 Security AnalysisVulnerability ManagementEvaluation Method 2024.08.23 2025.05.27 Literature Database
A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality Authors: M. Mehdi Kholoosi, M. Ali Babar, Roland Croft | Published: 2024-08-01 Security AnalysisPrompt InjectionVulnerability Management 2024.08.01 2025.05.27 Literature Database
Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security Verification Authors: Mohammad Akyash, Hadi Mardani Kamali | Published: 2024-05-20 Security AnalysisPrompt InjectionVulnerability Management 2024.05.20 2025.05.27 Literature Database
Detecting Android Malware: From Neural Embeddings to Hands-On Validation with BERTroid Authors: Meryam Chaieb, Mostafa Anouar Ghorab, Mohamed Aymen Saied | Published: 2024-05-06 | Updated: 2024-08-12 Security AnalysisMalware ClassificationModel Performance Evaluation 2024.05.06 2025.05.27 Literature Database
LLM Security Guard for Code Authors: Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari | Published: 2024-05-02 | Updated: 2024-05-03 LLM SecuritySecurity AnalysisPrompt Injection 2024.05.02 2025.05.27 Literature Database
Guardians of the Quantum GAN Authors: Archisman Ghosh, Debarshi Kundu, Avimita Chatterjee, Swaroop Ghosh | Published: 2024-04-24 | Updated: 2024-05-15 WatermarkingSecurity AnalysisQuantum Framework 2024.04.24 2025.05.27 Literature Database
An Investigation into Misuse of Java Security APIs by Large Language Models Authors: Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar | Published: 2024-04-04 Misuse of Security APISecurity AnalysisPrompt Injection 2024.04.04 2025.05.27 Literature Database
LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel | Published: 2024-04-03 | Updated: 2024-04-04 WatermarkingSecurity AnalysisAnomaly Detection Method 2024.04.03 2025.05.27 Literature Database