SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning Authors: S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka | Published: 2025-08-04 Blockchain StrategyVulnerability AnalysisWatermark 2025.08.04 2025.08.06 Literature Database
White-Basilisk: A Hybrid Model for Code Vulnerability Detection Authors: Ioannis Lamprou, Alexander Shevtsov, Ioannis Arapakis, Sotiris Ioannidis | Published: 2025-07-11 | Updated: 2025-07-31 Hybrid AnalysisDeep Learning MethodVulnerability Analysis 2025.07.11 2025.08.02 Literature Database
CyberRAG: An agentic RAG cyber attack classification and reporting tool Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03 Poisoning attack on RAGVulnerability AnalysisInterpretability 2025.07.03 2025.07.05 Literature Database
Evaluating Language Models For Threat Detection in IoT Security Logs Authors: Jorge J. Tejero-Fernández, Alfonso Sánchez-Macián | Published: 2025-07-03 IoT Traffic AnalysisModel DoSVulnerability Analysis 2025.07.03 2025.07.05 Literature Database
SAVANT: Vulnerability Detection in Application Dependencies through Semantic-Guided Reachability Analysis Authors: Wang Lingxiang, Quanzhi Fu, Wenjia Song, Gelei Deng, Yi Liu, Dan Williams, Ying Zhang | Published: 2025-06-21 | Updated: 2025-07-24 Code Change AnalysisSoftware SecurityVulnerability Analysis 2025.06.21 2025.07.26 Literature Database
VulBinLLM: LLM-powered Vulnerability Detection for Stripped Binaries Authors: Nasir Hussain, Haohan Chen, Chanh Tran, Philip Huang, Zhuohao Li, Pravir Chugh, William Chen, Ashish Kundu, Yuan Tian | Published: 2025-05-28 LLM SecurityVulnerability Analysis逆アセンブル 2025.05.28 2025.05.30 Literature Database
Weaponizing Language Models for Cybersecurity Offensive Operations: Automating Vulnerability Assessment Report Validation; A Review Paper Authors: Abdulrahman S Almuhaidib, Azlan Mohd Zain, Zalmiyah Zakaria, Izyan Izzati Kamsani, Abdulaziz S Almuhaidib | Published: 2025-05-07 LLM SecurityVulnerability Analysis 2025.05.07 2025.05.27 Literature Database
AutoPatch: Multi-Agent Framework for Patching Real-World CVE Vulnerabilities Authors: Minjae Seo, Wonwoo Choi, Myoungsung You, Seungwon Shin | Published: 2025-05-07 RAGModel DoSVulnerability Analysis 2025.05.07 2025.05.27 Literature Database
LLMs’ Suitability for Network Security: A Case Study of STRIDE Threat Modeling Authors: AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2025-05-07 LLM SecurityPerformance EvaluationVulnerability Analysis 2025.05.07 2025.05.27 Literature Database
Directed Greybox Fuzzing via Large Language Model Authors: Hanxiang Xu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-06 RAGPrompt InjectionVulnerability Analysis 2025.05.06 2025.05.27 Literature Database