Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem Authors: Shuli Zhao, Qinsheng Hou, Zihan Zhan, Yanhao Wang, Yuchong Xie, Yu Guo, Libo Chen, Shenghong Li, Zhi Xue | Published: 2025-09-08 Data LeakagePrivacy ManagementVulnerability Management 2025.09.08 2025.09.10 Literature Database
VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18 Algorithm DesignHardware SecurityVulnerability Management 2025.08.18 2025.08.20 Literature Database
SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18 Hardware SecurityKnowledge Graph InferenceVulnerability Management 2025.08.18 2025.08.20 Literature Database
Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28 Prompt InjectionLarge Language ModelVulnerability Management 2025.07.28 2025.07.30 Literature Database
Secure Coding with AI, From Creation to Inspection Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29 Dataset ApplicabilityProgram AnalysisVulnerability Management 2025.04.29 2025.05.27 Literature Database
Malicious Code Detection in Smart Contracts via Opcode Vectorization Authors: Huanhuan Zou, Zongwei Li, Xiaoqi Li | Published: 2025-04-17 Smart Contract AuditMachine LearningVulnerability Management 2025.04.17 2025.05.27 Literature Database
Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues Authors: Daniele Cipollone, Changjie Wang, Mariano Scazzariello, Simone Ferlin, Maliheh Izadi, Dejan Kostic, Marco Chiesa | Published: 2025-01-09 LLM Performance EvaluationPrompt InjectionVulnerability Management 2025.01.09 2025.05.27 Literature Database
Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering Authors: Matteo Esposito | Published: 2025-01-09 Hypothesis TestingDefect Prediction Dataset CreationVulnerability Management 2025.01.09 2025.05.27 Literature Database
CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics Authors: Yikun Li, Ting Zhang, Ratnadira Widyasari, Yan Naing Tun, Huu Hung Nguyen, Tan Bui, Ivana Clairine Irsan, Yiran Cheng, Xiang Lan, Han Wei Ang, Frank Liauw, Martin Weyssow, Hong Jin Kang, Eng Lieh Ouh, Lwin Khin Shar, David Lo | Published: 2024-11-26 | Updated: 2025-04-14 LLM Performance EvaluationCode Change AnalysisVulnerability Management 2024.11.26 2025.05.27 Literature Database
RealVul: Can We Detect Vulnerabilities in Web Applications with LLM? Authors: Di Cao, Yong Liao, Xiuwei Shang | Published: 2024-10-10 LLM Performance EvaluationVulnerability Management 2024.10.10 2025.05.27 Literature Database