Software Security

Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for Directed Greybox Fuzzing

Authors: Yifan Zhang, Xin Zhang | Published: 2025-10-27
Software Security
Performance Evaluation Method
Vulnerability detection

Is Your Prompt Poisoning Code? Defect Induction Rates and Security Mitigation Strategies

Authors: Bin Wang, YiLu Zhong, MiDi Wan, WenJie Yu, YuanBing Ouyang, Yenan Huang, Hui Li | Published: 2025-10-27
Software Security
Prompt Injection
Prompt leaking

When Secure Isn’t: Assessing the Security of Machine Learning Model Sharing

Authors: Gabriele Digregorio, Marco Di Gennaro, Stefano Zanero, Stefano Longari, Michele Carminati | Published: 2025-09-08
Software Security
Model Extraction Attack
Detection of Model Extraction Attacks

Regression-aware Continual Learning for Android Malware Detection

Authors: Daniele Ghiani, Daniele Angioni, Giorgio Piras, Angelo Sotgiu, Luca Minnei, Srishti Gupta, Maura Pintor, Fabio Roli, Battista Biggio | Published: 2025-07-24
Security Strategy Generation
Software Security
Drift Detection Method

Understanding the Supply Chain and Risks of Large Language Model Applications

Authors: Yujie Ma, Lili Quan, Xiaofei Xie, Qiang Hu, Jiongchi Yu, Yao Zhang, Sen Chen | Published: 2025-07-24
Indirect Prompt Injection
Software Security
Risk Assessment

Are AI-Generated Fixes Secure? Analyzing LLM and Agent Patches on SWE-bench

Authors: Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee | Published: 2025-06-30 | Updated: 2025-07-24
Software Security
Prompt Injection
Large Language Model

SAVANT: Vulnerability Detection in Application Dependencies through Semantic-Guided Reachability Analysis

Authors: Wang Lingxiang, Quanzhi Fu, Wenjia Song, Gelei Deng, Yi Liu, Dan Williams, Ying Zhang | Published: 2025-06-21 | Updated: 2025-07-24
Code Change Analysis
Software Security
Vulnerability Analysis

Detecting Hard-Coded Credentials in Software Repositories via LLMs

Authors: Chidera Biringa, Gokhan Kul | Published: 2025-06-16
Software Security
Performance Evaluation
Prompt leaking

Secure Software Development: Issues and Challenges

Authors: Sam Wen Ping, Jeffrey Cheok Jun Wah, Lee Wen Jie, Jeremy Bong Yong Han, Saira Muzafar | Published: 2023-11-18
Security Assurance
Software Security
Resource Scarcity Issues

HAL 9000: Skynet’s Risk Manager

Authors: Tadeu Freitas, Mário Neto, Inês Dutra, João Soares, Manuel Correia, Rolando Martins | Published: 2023-11-15
Software Security
Machine Learning Method
Vulnerability Management