Program Verification

Breaking Obfuscation: Cluster-Aware Graph with LLM-Aided Recovery for Malicious JavaScript Detection

Authors: Zhihong Liang, Xin Wang, Zhenhuang Hu, Liangliang Song, Lin Chen, Jingjing Guo, Yanbin Wang, Ye Tian | Published: 2025-07-30
Program Verification
Prompt Injection
Robustness of Watermarking Techniques

CodeBC: A More Secure Large Language Model for Smart Contract Code Generation in Blockchain

Authors: Lingxiang Wang, Hainan Zhang, Qinnan Zhang, Ziwei Wang, Hongwei Zheng, Jin Dong, Zhiming Zheng | Published: 2025-04-28 | Updated: 2025-05-07
Program Verification
Performance Evaluation
Vulnerability Analysis

LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?

Authors: David Glukhov, Ilia Shumailov, Yarin Gal, Nicolas Papernot, Vardan Papyan | Published: 2023-07-20
Security Analysis
Program Verification
Attack Method

How Secure is Code Generated by ChatGPT?

Authors: Raphaël Khoury, Anderson R. Avila, Jacob Brunelle, Baba Mamadou Camara | Published: 2023-04-19
Security Analysis
Program Verification
Vulnerability Prediction

Combining Generators of Adversarial Malware Examples to Increase Evasion Rate

Authors: Matouš Kozák, Martin Jureček | Published: 2023-04-14
Program Verification
Malware Detection Method
Generative Adversarial Network

A Review of Machine Learning Applications in Fuzzing

Authors: Gary J Saavedra, Kathryn N Rodhouse, Daniel M Dunlavy, Philip W Kegelmeyer | Published: 2019-06-13 | Updated: 2019-10-09
Security Testing
Program Verification
Reinforcement Learning

NEUZZ: Efficient Fuzzing with Neural Program Smoothing

Authors: Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2018-07-15 | Updated: 2019-07-12
Training Data Generation
Program Verification
Model Design and Accuracy