Vulnerability Mitigation Technique

SecCodeBench-V2 Technical Report

Authors: Longfei Chen, Ji Zhao, Lanxiao Cui, Tong Su, Xingbo Pan, Ziyang Li, Yongxing Wu, Qijiang Cao, Qiyao Cai, Jing Zhang, Yuandong Ni, Junyao He, Zeyu Zhang, Chao Ge, Xuhuai Lu, Zeyu Gao, Yuxin Cui, Weisen Chen, Yuxuan Peng, Shengping Wang, Qi Li, Yukai Huang, Yukun Liu, Tuo Zhou, Terry Yue Zhuo, Junyang Lin, Chao Zhang | Published: 2026-02-17
Test Case Generation
Vulnerability Mitigation Technique
評価メトリクス

CASTLE: Benchmarking Dataset for Static Code Analyzers and LLMs towards CWE Detection

Authors: Richard A. Dubniczky, Krisztofer Zoltán Horvát, Tamás Bisztray, Mohamed Amine Ferrag, Lucas C. Cordeiro, Norbert Tihanyi | Published: 2025-03-12 | Updated: 2025-03-31
Security Metric
Prompt leaking
Vulnerability Mitigation Technique

Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding

Authors: André Storhaug, Jingyue Li, Tianyuan Hu | Published: 2023-09-18 | Updated: 2023-10-06
Smart Contract
Software Security
Vulnerability Mitigation Technique

ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching

Authors: M. Caner Tol, Berk Sunar | Published: 2023-08-24
LLM Security
Vulnerability Mitigation Technique
Watermark Robustness

DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection

Authors: Sudipta Paria, Aritra Dasgupta, Swarup Bhunia | Published: 2023-08-14
LLM Security
Security Assurance
Vulnerability Mitigation Technique

Uncharted Territory: Energy Attacks in the Battery-less Internet of Things

Authors: Luca Mottola, Arslan Hameed, Thiemo Voigt | Published: 2023-04-17 | Updated: 2023-07-17
Energy-Based Model
Network Threat Detection
Vulnerability Mitigation Technique

Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

Authors: Serhan W. Bahar | Published: 2023-04-05
Security Analysis
Threat modeling
Vulnerability Mitigation Technique

Statement-Level Vulnerability Detection: Learning Vulnerability Patterns Through Information Theory and Contrastive Learning

Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, Michael Fu, John Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, Dinh Phung | Published: 2022-09-20 | Updated: 2024-06-12
Model Performance Evaluation
Improvement of Learning
Vulnerability Mitigation Technique

A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software

Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont | Published: 2019-02-07 | Updated: 2019-03-19
Data Origins and Evolution
Information Gathering Methods
Vulnerability Mitigation Technique