Vulnerability Management

PentestEval: Benchmarking LLM-based Penetration Testing with Modular and Stage-Level Design

Authors: Ruozhao Yang, Mingfei Cheng, Gelei Deng, Tianwei Zhang, Junjie Wang, Xiaofei Xie | Published: 2025-12-16
Indirect Prompt Injection
Prompt Injection
Vulnerability Management

Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem

Authors: Shuli Zhao, Qinsheng Hou, Zihan Zhan, Yanhao Wang, Yuchong Xie, Yu Guo, Libo Chen, Shenghong Li, Zhi Xue | Published: 2025-09-08
Data Leakage
Privacy Management
Vulnerability Management

VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog

Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
Algorithm Design
Hardware Security
Vulnerability Management

SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip

Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
Hardware Security
Knowledge Graph Inference
Vulnerability Management

Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs

Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28
Prompt Injection
Large Language Model
Vulnerability Management

SEC-bench: Automated Benchmarking of LLM Agents on Real-World Software Security Tasks

Authors: Hwiwon Lee, Ziqi Zhang, Hanxiao Lu, Lingming Zhang | Published: 2025-06-13 | Updated: 2025-10-22
Security Testing
Program Analysis
Vulnerability Management

Secure Coding with AI, From Creation to Inspection

Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29
Dataset Applicability
Program Analysis
Vulnerability Management

Malicious Code Detection in Smart Contracts via Opcode Vectorization

Authors: Huanhuan Zou, Zongwei Li, Xiaoqi Li | Published: 2025-04-17
Smart Contract Audit
Machine Learning
Vulnerability Management

Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues

Authors: Daniele Cipollone, Changjie Wang, Mariano Scazzariello, Simone Ferlin, Maliheh Izadi, Dejan Kostic, Marco Chiesa | Published: 2025-01-09
LLM Performance Evaluation
Prompt Injection
Vulnerability Management

Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering

Authors: Matteo Esposito | Published: 2025-01-09
Hypothesis Testing
Defect Prediction Dataset Creation
Vulnerability Management