Regression-aware Continual Learning for Android Malware Detection Authors: Daniele Ghiani, Daniele Angioni, Giorgio Piras, Angelo Sotgiu, Luca Minnei, Srishti Gupta, Maura Pintor, Fabio Roli, Battista Biggio | Published: 2025-07-24 Security Strategy GenerationSoftware SecurityDrift Detection Method 2025.07.24 2025.07.26 Literature Database
Understanding the Supply Chain and Risks of Large Language Model Applications Authors: Yujie Ma, Lili Quan, Xiaofei Xie, Qiang Hu, Jiongchi Yu, Yao Zhang, Sen Chen | Published: 2025-07-24 Indirect Prompt InjectionSoftware SecurityRisk Assessment 2025.07.24 2025.07.26 Literature Database
Are AI-Generated Fixes Secure? Analyzing LLM and Agent Patches on SWE-bench Authors: Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee | Published: 2025-06-30 | Updated: 2025-07-24 Software SecurityPrompt InjectionLarge Language Model 2025.06.30 2025.07.26 Literature Database
SAVANT: Vulnerability Detection in Application Dependencies through Semantic-Guided Reachability Analysis Authors: Wang Lingxiang, Quanzhi Fu, Wenjia Song, Gelei Deng, Yi Liu, Dan Williams, Ying Zhang | Published: 2025-06-21 | Updated: 2025-07-24 Code Change AnalysisSoftware SecurityVulnerability Analysis 2025.06.21 2025.07.26 Literature Database
Detecting Hard-Coded Credentials in Software Repositories via LLMs Authors: Chidera Biringa, Gokhan Kul | Published: 2025-06-16 Software SecurityPerformance EvaluationPrompt leaking 2025.06.16 2025.06.18 Literature Database
Secure Software Development: Issues and Challenges Authors: Sam Wen Ping, Jeffrey Cheok Jun Wah, Lee Wen Jie, Jeremy Bong Yong Han, Saira Muzafar | Published: 2023-11-18 Security AssuranceSoftware SecurityResource Scarcity Issues 2023.11.18 2025.05.28 Literature Database
HAL 9000: Skynet’s Risk Manager Authors: Tadeu Freitas, Mário Neto, Inês Dutra, João Soares, Manuel Correia, Rolando Martins | Published: 2023-11-15 Software SecurityMachine Learning MethodVulnerability Management 2023.11.15 2025.05.28 Literature Database
Software Repositories and Machine Learning Research in Cyber Security Authors: Mounika Vanamala, Keith Bryant, Alex Caravella | Published: 2023-11-01 Security AnalysisSoftware SecurityTopic Modeling 2023.11.01 2025.05.28 Literature Database
Enhancing Large Language Models for Secure Code Generation: A Dataset-driven Study on Vulnerability Mitigation Authors: Jiexin Wang, Liuwen Cao, Xitong Luo, Zhiping Zhou, Jiayuan Xie, Adam Jatowt, Yi Cai | Published: 2023-10-25 Security AnalysisSoftware SecurityPrompt Injection 2023.10.25 2025.05.28 Literature Database
Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding Authors: André Storhaug, Jingyue Li, Tianyuan Hu | Published: 2023-09-18 | Updated: 2023-10-06 Smart ContractSoftware SecurityVulnerability Mitigation Technique 2023.09.18 2025.05.28 Literature Database