Vulnerability Analysis

VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities

Authors: Weizhe Wang, Wei Ma, Qiang Hu, Yao Zhang, Jianfei Sun, Bin Wu, Yang Liu, Guangquan Xu, Lingxiao Jiang | Published: 2025-09-03
Prompt Injection
Large Language Model
Vulnerability Analysis

AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning

Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28
Poisoning attack on RAG
Indirect Prompt Injection
Vulnerability Analysis

Multi-Agent Penetration Testing AI for the Web

Authors: Isaac David, Arthur Gervais | Published: 2025-08-28
Indirect Prompt Injection
Security Testing
Vulnerability Analysis

SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning

Authors: S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka | Published: 2025-08-04
Blockchain Strategy
Vulnerability Analysis
Watermark

White-Basilisk: A Hybrid Model for Code Vulnerability Detection

Authors: Ioannis Lamprou, Alexander Shevtsov, Ioannis Arapakis, Sotiris Ioannidis | Published: 2025-07-11 | Updated: 2025-07-31
Hybrid Analysis
Deep Learning Method
Vulnerability Analysis

CyberRAG: An agentic RAG cyber attack classification and reporting tool

Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03
Poisoning attack on RAG
Vulnerability Analysis
Interpretability

Evaluating Language Models For Threat Detection in IoT Security Logs

Authors: Jorge J. Tejero-Fernández, Alfonso Sánchez-Macián | Published: 2025-07-03
IoT Traffic Analysis
Model DoS
Vulnerability Analysis

SAVANT: Vulnerability Detection in Application Dependencies through Semantic-Guided Reachability Analysis

Authors: Wang Lingxiang, Quanzhi Fu, Wenjia Song, Gelei Deng, Yi Liu, Dan Williams, Ying Zhang | Published: 2025-06-21 | Updated: 2025-07-24
Code Change Analysis
Software Security
Vulnerability Analysis

LLM Embedding-based Attribution (LEA): Quantifying Source Contributions to Generative Model’s Response for Vulnerability Analysis

Authors: Reza Fayyazi, Michael Zuzak, Shanchieh Jay Yang | Published: 2025-06-12 | Updated: 2025-09-03
RAG
Token Distribution Analysis
Vulnerability Analysis

VulBinLLM: LLM-powered Vulnerability Detection for Stripped Binaries

Authors: Nasir Hussain, Haohan Chen, Chanh Tran, Philip Huang, Zhuohao Li, Pravir Chugh, William Chen, Ashish Kundu, Yuan Tian | Published: 2025-05-28
LLM Security
Vulnerability Analysis
逆アセンブル