VulBinLLM: LLM-powered Vulnerability Detection for Stripped Binaries Authors: Nasir Hussain, Haohan Chen, Chanh Tran, Philip Huang, Zhuohao Li, Pravir Chugh, William Chen, Ashish Kundu, Yuan Tian | Published: 2025-05-28 LLM SecurityVulnerability Analysis逆アセンブル 2025.05.28 2025.05.30 Literature Database
Weaponizing Language Models for Cybersecurity Offensive Operations: Automating Vulnerability Assessment Report Validation; A Review Paper Authors: Abdulrahman S Almuhaidib, Azlan Mohd Zain, Zalmiyah Zakaria, Izyan Izzati Kamsani, Abdulaziz S Almuhaidib | Published: 2025-05-07 LLM SecurityVulnerability Analysis 2025.05.07 2025.05.27 Literature Database
AutoPatch: Multi-Agent Framework for Patching Real-World CVE Vulnerabilities Authors: Minjae Seo, Wonwoo Choi, Myoungsung You, Seungwon Shin | Published: 2025-05-07 RAGModel DoSVulnerability Analysis 2025.05.07 2025.05.27 Literature Database
LLMs’ Suitability for Network Security: A Case Study of STRIDE Threat Modeling Authors: AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2025-05-07 LLM SecurityPerformance EvaluationVulnerability Analysis 2025.05.07 2025.05.27 Literature Database
Directed Greybox Fuzzing via Large Language Model Authors: Hanxiang Xu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-06 RAGPrompt InjectionVulnerability Analysis 2025.05.06 2025.05.27 Literature Database
CodeBC: A More Secure Large Language Model for Smart Contract Code Generation in Blockchain Authors: Lingxiang Wang, Hainan Zhang, Qinnan Zhang, Ziwei Wang, Hongwei Zheng, Jin Dong, Zhiming Zheng | Published: 2025-04-28 | Updated: 2025-05-07 Program VerificationPerformance EvaluationVulnerability Analysis 2025.04.28 2025.05.27 Literature Database
Enhancing Smart Contract Vulnerability Detection in DApps Leveraging Fine-Tuned LLM Authors: Jiuyang Bu, Wenkai Li, Zongwei Li, Zeng Zhang, Xiaoqi Li | Published: 2025-04-07 Smart ContractModel Performance EvaluationVulnerability Analysis 2025.04.07 2025.05.27 Literature Database
Generative Large Language Model usage in Smart Contract Vulnerability Detection Authors: Peter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du | Published: 2025-04-07 Prompt InjectionPrompt leakingVulnerability Analysis 2025.04.07 2025.05.27 Literature Database
Bugdar: AI-Augmented Secure Code Review for GitHub Pull Requests Authors: John Naulty, Eason Chen, Joy Wang, George Digkas, Kostas Chalkias | Published: 2025-03-21 Poisoning attack on RAGSystem DevelopmentVulnerability Analysis 2025.03.21 2025.05.27 Literature Database
InjecAgent: Benchmarking Indirect Prompt Injections in Tool-Integrated Large Language Model Agents Authors: Qiusi Zhan, Zhixiang Liang, Zifan Ying, Daniel Kang | Published: 2024-03-05 | Updated: 2024-08-04 Indirect Prompt InjectionTaxonomy of AttacksVulnerability Analysis 2024.03.05 2025.05.27 Literature Database