Vulnerability Management

Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem

Authors: Shuli Zhao, Qinsheng Hou, Zihan Zhan, Yanhao Wang, Yuchong Xie, Yu Guo, Libo Chen, Shenghong Li, Zhi Xue | Published: 2025-09-08
Data Leakage
Privacy Management
Vulnerability Management

VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog

Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
Algorithm Design
Hardware Security
Vulnerability Management

SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip

Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
Hardware Security
Knowledge Graph Inference
Vulnerability Management

Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs

Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28
Prompt Injection
Large Language Model
Vulnerability Management

Secure Coding with AI, From Creation to Inspection

Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29
Dataset Applicability
Program Analysis
Vulnerability Management

Malicious Code Detection in Smart Contracts via Opcode Vectorization

Authors: Huanhuan Zou, Zongwei Li, Xiaoqi Li | Published: 2025-04-17
Smart Contract Audit
Machine Learning
Vulnerability Management

Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues

Authors: Daniele Cipollone, Changjie Wang, Mariano Scazzariello, Simone Ferlin, Maliheh Izadi, Dejan Kostic, Marco Chiesa | Published: 2025-01-09
LLM Performance Evaluation
Prompt Injection
Vulnerability Management

Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering

Authors: Matteo Esposito | Published: 2025-01-09
Hypothesis Testing
Defect Prediction Dataset Creation
Vulnerability Management

CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics

Authors: Yikun Li, Ting Zhang, Ratnadira Widyasari, Yan Naing Tun, Huu Hung Nguyen, Tan Bui, Ivana Clairine Irsan, Yiran Cheng, Xiang Lan, Han Wei Ang, Frank Liauw, Martin Weyssow, Hong Jin Kang, Eng Lieh Ouh, Lwin Khin Shar, David Lo | Published: 2024-11-26 | Updated: 2025-04-14
LLM Performance Evaluation
Code Change Analysis
Vulnerability Management

RealVul: Can We Detect Vulnerabilities in Web Applications with LLM?

Authors: Di Cao, Yong Liao, Xiuwei Shang | Published: 2024-10-10
LLM Performance Evaluation
Vulnerability Management