Vulnerability Analysis

Generative Large Language Model usage in Smart Contract Vulnerability Detection

Authors: Peter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du | Published: 2025-04-07
Prompt Injection
Prompt leaking
Vulnerability Analysis

Bugdar: AI-Augmented Secure Code Review for GitHub Pull Requests

Authors: John Naulty, Eason Chen, Joy Wang, George Digkas, Kostas Chalkias | Published: 2025-03-21
Poisoning attack on RAG
System Development
Vulnerability Analysis

InjecAgent: Benchmarking Indirect Prompt Injections in Tool-Integrated Large Language Model Agents

Authors: Qiusi Zhan, Zhixiang Liang, Zifan Ying, Daniel Kang | Published: 2024-03-05 | Updated: 2024-08-04
Indirect Prompt Injection
Taxonomy of Attacks
Vulnerability Analysis

Benchmarking and Defending Against Indirect Prompt Injection Attacks on Large Language Models

Authors: Jingwei Yi, Yueqi Xie, Bin Zhu, Emre Kiciman, Guangzhong Sun, Xing Xie, Fangzhao Wu | Published: 2023-12-21 | Updated: 2025-01-27
Indirect Prompt Injection
Malicious Prompt
Vulnerability Analysis

Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01
Deep Learning Method
Threat modeling
Vulnerability Analysis

Measuring and Modeling the Free Content Web

Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen | Published: 2023-04-26
Website Vulnerability
Security Analysis
Vulnerability Analysis

Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity

Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02
Watermarking
Software Security
Vulnerability Analysis

Large Language Models for Code: Security Hardening and Adversarial Testing

Authors: Jingxuan He, Martin Vechev | Published: 2023-02-10 | Updated: 2024-08-16
Security Assurance
Prompt Injection
Vulnerability Analysis

CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models

Authors: Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz | Published: 2023-02-08 | Updated: 2023-10-23
Code Generation
Prompt Injection
Vulnerability Analysis

Vulnerability Prioritization: An Offensive Security Approach

Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek | Published: 2022-06-22
Test Prioritization
Vulnerability Analysis
Evaluation Method