VADER: A Human-Evaluated Benchmark for Vulnerability Assessment, Detection, Explanation, and Remediation Authors: Ethan TS. Liu, Austin Wang, Spencer Mateega, Carlos Georgescu, Danny Tang | Published: 2025-05-26 Website VulnerabilityHallucinationDynamic Vulnerability Management 2025.05.26 2025.05.28 Literature Database
Developing Assurance Cases for Adversarial Robustness and Regulatory Compliance in LLMs Authors: Tomas Bueno Momcilovic, Dian Balta, Beat Buesser, Giulio Zizzo, Mark Purcell | Published: 2024-10-04 LLM SecurityPrompt InjectionDynamic Vulnerability Management 2024.10.04 2025.05.27 Literature Database
Learning Failure-Inducing Models for Testing Software-Defined Networks Authors: Raphaël Ollando, Seung Yeob Shin, Lionel C. Briand | Published: 2022-10-27 | Updated: 2024-01-08 Class ImbalancePenetration Testing MethodsDynamic Vulnerability Management 2022.10.27 2025.05.28 Literature Database
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks Authors: Chidera Biringa, Gaspard Baye, Gökhan Kul | Published: 2022-10-26 Program AnalysisDynamic AnalysisDynamic Vulnerability Management 2022.10.26 2025.05.28 Literature Database
Do Software Security Practices Yield Fewer Vulnerabilities? Authors: Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie Williams | Published: 2022-10-20 | Updated: 2023-06-15 Security labelData Extraction and AnalysisDynamic Vulnerability Management 2022.10.20 2025.05.28 Literature Database