Vulnerability Management

Rotated Robustness: A Training-Free Defense against Bit-Flip Attacks on Large Language Models

Authors: Deng Liu, Song Chen | Published: 2026-03-17
Adversarial Learning
Vulnerability Management
Evaluation Method

Cascade: Composing Software-Hardware Attack Gadgets for Adversarial Threat Amplification in Compound AI Systems

Authors: Sarbartha Banerjee, Prateek Sahu, Anjo Vahldiek-Oberwagner, Jose Sanchez Vicarte, Mohit Tiwari | Published: 2026-03-12
Prompt Injection
Model Extraction Attack
Vulnerability Management

Taming OpenClaw: Security Analysis and Mitigation of Autonomous LLM Agent Threats

Authors: Xinhao Deng, Yixiang Zhang, Jiaqing Wu, Jiaqi Bai, Sibo Yi, Zhuoheng Zou, Yue Xiao, Rennai Qiu, Jianan Ma, Jialuo Chen, Xiaohu Du, Xiaofang Yang, Shiwen Cui, Changhua Meng, Weiqiang Wang, Jiaxing Song, Ke Xu, Qi Li | Published: 2026-03-12
Indirect Prompt Injection
Prompt Injection
Vulnerability Management

Compartmentalization-Aware Automated Program Repair

Authors: Jia Hu, Youcheng Sun, Pierre Olivier | Published: 2026-03-10
Prompt Injection
Dynamic Vulnerability Management
Vulnerability Management

PentestEval: Benchmarking LLM-based Penetration Testing with Modular and Stage-Level Design

Authors: Ruozhao Yang, Mingfei Cheng, Gelei Deng, Tianwei Zhang, Junjie Wang, Xiaofei Xie | Published: 2025-12-16
Indirect Prompt Injection
Prompt Injection
Vulnerability Management

Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem

Authors: Shuli Zhao, Qinsheng Hou, Zihan Zhan, Yanhao Wang, Yuchong Xie, Yu Guo, Libo Chen, Shenghong Li, Zhi Xue | Published: 2025-09-08
Data Leakage
Privacy Management
Vulnerability Management

VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog

Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
Algorithm Design
Hardware Security
Vulnerability Management

SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip

Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
Hardware Security
Knowledge Graph Inference
Vulnerability Management

Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs

Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28
Prompt Injection
Large Language Model
Vulnerability Management

SEC-bench: Automated Benchmarking of LLM Agents on Real-World Software Security Tasks

Authors: Hwiwon Lee, Ziqi Zhang, Hanxiao Lu, Lingming Zhang | Published: 2025-06-13 | Updated: 2025-10-22
Security Testing
Program Analysis
Vulnerability Management