PentestEval: Benchmarking LLM-based Penetration Testing with Modular and Stage-Level Design Authors: Ruozhao Yang, Mingfei Cheng, Gelei Deng, Tianwei Zhang, Junjie Wang, Xiaofei Xie | Published: 2025-12-16 Indirect Prompt InjectionPrompt InjectionVulnerability Management 2025.12.16 2025.12.18 Literature Database
Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem Authors: Shuli Zhao, Qinsheng Hou, Zihan Zhan, Yanhao Wang, Yuchong Xie, Yu Guo, Libo Chen, Shenghong Li, Zhi Xue | Published: 2025-09-08 Data LeakagePrivacy ManagementVulnerability Management 2025.09.08 2025.09.10 Literature Database
VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18 Algorithm DesignHardware SecurityVulnerability Management 2025.08.18 2025.08.20 Literature Database
SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18 Hardware SecurityKnowledge Graph InferenceVulnerability Management 2025.08.18 2025.08.20 Literature Database
Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28 Prompt InjectionLarge Language ModelVulnerability Management 2025.07.28 2025.07.30 Literature Database
SEC-bench: Automated Benchmarking of LLM Agents on Real-World Software Security Tasks Authors: Hwiwon Lee, Ziqi Zhang, Hanxiao Lu, Lingming Zhang | Published: 2025-06-13 | Updated: 2025-10-22 Security TestingProgram AnalysisVulnerability Management 2025.06.13 2025.10.24 Literature Database
Secure Coding with AI, From Creation to Inspection Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29 Dataset ApplicabilityProgram AnalysisVulnerability Management 2025.04.29 2025.05.27 Literature Database
Malicious Code Detection in Smart Contracts via Opcode Vectorization Authors: Huanhuan Zou, Zongwei Li, Xiaoqi Li | Published: 2025-04-17 Smart Contract AuditMachine LearningVulnerability Management 2025.04.17 2025.05.27 Literature Database
Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues Authors: Daniele Cipollone, Changjie Wang, Mariano Scazzariello, Simone Ferlin, Maliheh Izadi, Dejan Kostic, Marco Chiesa | Published: 2025-01-09 LLM Performance EvaluationPrompt InjectionVulnerability Management 2025.01.09 2025.05.27 Literature Database
Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering Authors: Matteo Esposito | Published: 2025-01-09 Hypothesis TestingDefect Prediction Dataset CreationVulnerability Management 2025.01.09 2025.05.27 Literature Database