Can LLMs Handle WebShell Detection? Overcoming Detection Challenges with Behavioral Function-Aware Framework Authors: Feijiang Han, Jiaming Zhang, Chuyi Deng, Jianheng Tang, Yunhuai Liu | Published: 2025-04-14 | Updated: 2025-08-26 Data Generation MethodProgram AnalysisPrompt leaking 2025.04.14 2025.08.28 Literature Database
Fast, Fine-Grained Equivalence Checking for Neural Decompilers Authors: Luke Dramko, Claire Le Goues, Edward J. Schwartz | Published: 2025-01-08 Program AnalysisControl Dependency OrderingEquivalence Evaluation 2025.01.08 2025.05.27 Literature Database
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts Authors: Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen | Published: 2024-09-15 Smart ContractProgram AnalysisAutomated Vulnerability Remediation 2024.09.15 2025.05.27 Literature Database
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification Authors: Zeqing Qin, Yiwei Wu, Lansheng Han | Published: 2024-09-11 LLM Performance EvaluationProgram AnalysisPrompt Injection 2024.09.11 2025.05.27 Literature Database
Comment on Revisiting Neural Program Smoothing for Fuzzing Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06 WatermarkingProgram AnalysisEvaluation Method 2024.09.06 2025.05.27 Literature Database
The Role of Transformer Models in Advancing Blockchain Technology: A Systematic Survey Authors: Tianxu Liu, Yanbin Wang, Jianguo Sun, Ye Tian, Yanyu Huang, Tao Xue, Peiyue Li, Yiwei Liu | Published: 2024-09-02 | Updated: 2024-09-05 Smart ContractProgram AnalysisBlockchain Technology 2024.09.02 2025.05.27 Literature Database
Harnessing the Power of LLMs in Source Code Vulnerability Detection Authors: Andrew A Mahyari | Published: 2024-08-07 LLM Performance EvaluationProgram AnalysisVulnerability Management 2024.08.07 2025.05.27 Literature Database
LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems Authors: Zhensu Sun, Haotian Zhu, Bowen Xu, Xiaoning Du, Li Li, David Lo | Published: 2024-08-02 LLM Performance EvaluationProgram AnalysisSelf-Healing System 2024.08.02 2025.05.27 Literature Database
FuSeBMC AI: Acceleration of Hybrid Approach through Machine Learning Authors: Kaled M. Alshmrany, Mohannad Aldughaim, Chenfeng Wei, Tom Sweet, Richard Allmendinger, Lucas C. Cordeiro | Published: 2024-04-09 Test PrioritizationProgram AnalysisResource optimization 2024.04.09 2025.05.27 Literature Database
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks Authors: Beatrice Casey, Joanna C. S. Santos, George Perry | Published: 2024-03-15 | Updated: 2025-04-09 WatermarkingProgram AnalysisMembership Inference 2024.03.15 2025.05.27 Literature Database