Fault Injection Attacks on Machine Learning-based Quantum Computer Readout Error Correction Authors: Anthony Etim, Jakub Szefer | Published: 2025-12-23 Security Analysis MethodSignal ProcessingVulnerability Analysis 2025.12.23 2025.12.25 Literature Database
On the Effectiveness of Instruction-Tuning Local LLMs for Identifying Software Vulnerabilities Authors: Sangryu Park, Gihyuk Ko, Homook Cho | Published: 2025-12-23 Prompt InjectionLarge Language ModelVulnerability Analysis 2025.12.23 2025.12.25 Literature Database
Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28 RAGTCP Connection CharacteristicsVulnerability Analysis 2025.10.28 2025.10.30 Literature Database
VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities Authors: Weizhe Wang, Wei Ma, Qiang Hu, Yao Zhang, Jianfei Sun, Bin Wu, Yang Liu, Guangquan Xu, Lingxiao Jiang | Published: 2025-09-03 Prompt InjectionLarge Language ModelVulnerability Analysis 2025.09.03 2025.09.05 Literature Database
AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28 Poisoning attack on RAGIndirect Prompt InjectionVulnerability Analysis 2025.08.28 2025.09.01 Literature Database
Multi-Agent Penetration Testing AI for the Web Authors: Isaac David, Arthur Gervais | Published: 2025-08-28 Indirect Prompt InjectionSecurity TestingVulnerability Analysis 2025.08.28 2025.09.01 Literature Database
SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning Authors: S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka | Published: 2025-08-04 Blockchain StrategyVulnerability AnalysisWatermark 2025.08.04 2025.08.06 Literature Database
White-Basilisk: A Hybrid Model for Code Vulnerability Detection Authors: Ioannis Lamprou, Alexander Shevtsov, Ioannis Arapakis, Sotiris Ioannidis | Published: 2025-07-11 | Updated: 2025-07-31 Hybrid AnalysisDeep Learning MethodVulnerability Analysis 2025.07.11 2025.08.02 Literature Database
CyberRAG: An agentic RAG cyber attack classification and reporting tool Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03 Poisoning attack on RAGVulnerability AnalysisInterpretability 2025.07.03 2025.07.05 Literature Database
Evaluating Language Models For Threat Detection in IoT Security Logs Authors: Jorge J. Tejero-Fernández, Alfonso Sánchez-Macián | Published: 2025-07-03 IoT Traffic AnalysisModel DoSVulnerability Analysis 2025.07.03 2025.07.05 Literature Database