Vulnerability Analysis

Benchmarking and Defending Against Indirect Prompt Injection Attacks on Large Language Models

Authors: Jingwei Yi, Yueqi Xie, Bin Zhu, Emre Kiciman, Guangzhong Sun, Xing Xie, Fangzhao Wu | Published: 2023-12-21 | Updated: 2025-01-27
Indirect Prompt Injection
Malicious Prompt
Vulnerability Analysis

Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01
Deep Learning Method
Threat modeling
Vulnerability Analysis

Measuring and Modeling the Free Content Web

Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen | Published: 2023-04-26
Website Vulnerability
Security Analysis
Vulnerability Analysis

Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity

Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02
Watermarking
Software Security
Vulnerability Analysis

Large Language Models for Code: Security Hardening and Adversarial Testing

Authors: Jingxuan He, Martin Vechev | Published: 2023-02-10 | Updated: 2024-08-16
Security Assurance
Prompt Injection
Vulnerability Analysis

CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models

Authors: Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz | Published: 2023-02-08 | Updated: 2023-10-23
Code Generation
Prompt Injection
Vulnerability Analysis

Vulnerability Prioritization: An Offensive Security Approach

Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek | Published: 2022-06-22
Test Prioritization
Vulnerability Analysis
Evaluation Method

Attack Techniques and Threat Identification for Vulnerabilities

Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta | Published: 2022-06-22
Attacker Behavior Analysis
Vulnerability Analysis
Vulnerability detection

Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems

Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05
Robustness Evaluation
Trust Evaluation Module
Vulnerability Analysis

LineVD: Statement-level Vulnerability Detection using Graph Neural Networks

Authors: David Hin, Andrey Kan, Huaming Chen, M. Ali Babar | Published: 2022-03-10 | Updated: 2022-03-25
Graph Neural Network
Deep Learning Method
Vulnerability Analysis