Software Security

Regression-aware Continual Learning for Android Malware Detection

Authors: Daniele Ghiani, Daniele Angioni, Giorgio Piras, Angelo Sotgiu, Luca Minnei, Srishti Gupta, Maura Pintor, Fabio Roli, Battista Biggio | Published: 2025-07-24
Security Strategy Generation
Software Security
Drift Detection Method

Understanding the Supply Chain and Risks of Large Language Model Applications

Authors: Yujie Ma, Lili Quan, Xiaofei Xie, Qiang Hu, Jiongchi Yu, Yao Zhang, Sen Chen | Published: 2025-07-24
Indirect Prompt Injection
Software Security
Risk Assessment

Are AI-Generated Fixes Secure? Analyzing LLM and Agent Patches on SWE-bench

Authors: Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee | Published: 2025-06-30 | Updated: 2025-07-24
Software Security
Prompt Injection
Large Language Model

SAVANT: Vulnerability Detection in Application Dependencies through Semantic-Guided Reachability Analysis

Authors: Wang Lingxiang, Quanzhi Fu, Wenjia Song, Gelei Deng, Yi Liu, Dan Williams, Ying Zhang | Published: 2025-06-21 | Updated: 2025-07-24
Code Change Analysis
Software Security
Vulnerability Analysis

Detecting Hard-Coded Credentials in Software Repositories via LLMs

Authors: Chidera Biringa, Gokhan Kul | Published: 2025-06-16
Software Security
Performance Evaluation
Prompt leaking

Secure Software Development: Issues and Challenges

Authors: Sam Wen Ping, Jeffrey Cheok Jun Wah, Lee Wen Jie, Jeremy Bong Yong Han, Saira Muzafar | Published: 2023-11-18
Security Assurance
Software Security
Resource Scarcity Issues

HAL 9000: Skynet’s Risk Manager

Authors: Tadeu Freitas, Mário Neto, Inês Dutra, João Soares, Manuel Correia, Rolando Martins | Published: 2023-11-15
Software Security
Machine Learning Method
Vulnerability Management

Software Repositories and Machine Learning Research in Cyber Security

Authors: Mounika Vanamala, Keith Bryant, Alex Caravella | Published: 2023-11-01
Security Analysis
Software Security
Topic Modeling

Enhancing Large Language Models for Secure Code Generation: A Dataset-driven Study on Vulnerability Mitigation

Authors: Jiexin Wang, Liuwen Cao, Xitong Luo, Zhiping Zhou, Jiayuan Xie, Adam Jatowt, Yi Cai | Published: 2023-10-25
Security Analysis
Software Security
Prompt Injection

Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding

Authors: André Storhaug, Jingyue Li, Tianyuan Hu | Published: 2023-09-18 | Updated: 2023-10-06
Smart Contract
Software Security
Vulnerability Mitigation Technique