Benchmarking and Defending Against Indirect Prompt Injection Attacks on Large Language Models Authors: Jingwei Yi, Yueqi Xie, Bin Zhu, Emre Kiciman, Guangzhong Sun, Xing Xie, Fangzhao Wu | Published: 2023-12-21 | Updated: 2025-01-27 Indirect Prompt InjectionMalicious PromptVulnerability Analysis 2023.12.21 2025.05.27 Literature Database
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01 Deep Learning MethodThreat modelingVulnerability Analysis 2023.06.01 2025.05.28 Literature Database
Measuring and Modeling the Free Content Web Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen | Published: 2023-04-26 Website VulnerabilitySecurity AnalysisVulnerability Analysis 2023.04.26 2025.05.28 Literature Database
Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02 WatermarkingSoftware SecurityVulnerability Analysis 2023.02.24 2025.05.28 Literature Database
Large Language Models for Code: Security Hardening and Adversarial Testing Authors: Jingxuan He, Martin Vechev | Published: 2023-02-10 | Updated: 2024-08-16 Security AssurancePrompt InjectionVulnerability Analysis 2023.02.10 2025.05.28 Literature Database
CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models Authors: Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz | Published: 2023-02-08 | Updated: 2023-10-23 Code GenerationPrompt InjectionVulnerability Analysis 2023.02.08 2025.05.28 Literature Database
Vulnerability Prioritization: An Offensive Security Approach Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek | Published: 2022-06-22 Test PrioritizationVulnerability AnalysisEvaluation Method 2022.06.22 2025.05.28 Literature Database
Attack Techniques and Threat Identification for Vulnerabilities Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta | Published: 2022-06-22 Attacker Behavior AnalysisVulnerability AnalysisVulnerability detection 2022.06.22 2025.05.28 Literature Database
Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05 Robustness EvaluationTrust Evaluation ModuleVulnerability Analysis 2022.05.05 2025.05.28 Literature Database
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks Authors: David Hin, Andrey Kan, Huaming Chen, M. Ali Babar | Published: 2022-03-10 | Updated: 2022-03-25 Graph Neural NetworkDeep Learning MethodVulnerability Analysis 2022.03.10 2025.05.28 Literature Database