Vulnerability Prediction

CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities

Authors: Yuxuan Zhu, Antony Kellermann, Dylan Bowman, Philip Li, Akul Gupta, Adarsh Danda, Richard Fang, Conner Jensen, Eric Ihli, Jason Benn, Jet Geronimo, Avi Dhir, Sudhit Rao, Kaicheng Yu, Twm Stone, Daniel Kang | Published: 2025-03-21
Indirect Prompt Injection
Cyber Threat
Vulnerability Prediction

ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We?

Authors: Michael Fu, Chakkrit Tantithamthavorn, Van Nguyen, Trung Le | Published: 2023-10-15
Program Analysis
Prompt Engineering
Vulnerability Prediction

SCAR: Power Side-Channel Analysis at RTL-Level

Authors: Amisha Srivastava, Sanjay Das, Navnil Choudhury, Rafail Psiakis, Pedro Henrique Silva, Debjit Pal, Kanad Basu | Published: 2023-10-10
Prompt Injection
Cryptography
Vulnerability Prediction

Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives

Authors: Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu | Published: 2023-10-02 | Updated: 2023-10-16
Security Analysis
Prompt Injection
Vulnerability Prediction

How Secure is Code Generated by ChatGPT?

Authors: Raphaël Khoury, Anderson R. Avila, Jacob Brunelle, Baba Mamadou Camara | Published: 2023-04-19
Security Analysis
Program Verification
Vulnerability Prediction

Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights

Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi | Published: 2023-02-27 | Updated: 2023-06-15
Data Collection
Model Performance Evaluation
Vulnerability Prediction

Vulnerability Analysis of the Android Kernel

Authors: Joseph R. Barr, Peter Shaw, Tyler Thatcher | Published: 2021-12-20
Membership Inference
Performance Evaluation
Vulnerability Prediction

Gödel’s Sentence Is An Adversarial Example But Unsolvable

Authors: Xiaodong Qi, Lansheng Han | Published: 2020-02-25
Adversarial Example
Adversarial Training
Vulnerability Prediction

Neuron Shapley: Discovering the Responsible Neurons

Authors: Amirata Ghorbani, James Zou | Published: 2020-02-23 | Updated: 2020-11-13
Performance Evaluation
Feature Importance Analysis
Vulnerability Prediction

Adversarial Attacks on Machine Learning Systems for High-Frequency Trading

Authors: Micah Goldblum, Avi Schwarzschild, Ankit B. Patel, Tom Goldstein | Published: 2020-02-21 | Updated: 2021-10-29
Transaction Generation Method
Adversarial Example
Vulnerability Prediction