Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Authors: Niklas Risse, Jing Liu, Marcel Böhme | Published: 2024-08-23 | Updated: 2025-04-23 Security AnalysisVulnerability ManagementEvaluation Method 2024.08.23 2025.05.12 Literature Database
PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code Authors: Ziyou Jiang, Lin Shi, Guowei Yang, Qing Wang | Published: 2024-08-16 Code GenerationPrompt InjectionVulnerability Management 2024.08.16 2025.05.12 Literature Database
LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions Authors: Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun | Published: 2024-08-14 Code Change AnalysisPrompt InjectionVulnerability Management 2024.08.14 2025.05.12 Literature Database
Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.08.12 2025.05.12 Literature Database
Harnessing the Power of LLMs in Source Code Vulnerability Detection Authors: Andrew A Mahyari | Published: 2024-08-07 LLM Performance EvaluationProgram AnalysisVulnerability Management 2024.08.07 2025.05.12 Literature Database
Practical Attacks against Black-box Code Completion Engines Authors: Slobodan Jenko, Jingxuan He, Niels Mündler, Mark Vero, Martin Vechev | Published: 2024-08-05 Attack MethodVulnerability ManagementEvaluation Method 2024.08.05 2025.05.12 Literature Database
From Generalist to Specialist: Exploring CWE-Specific Vulnerability Detection Authors: Syafiq Al Atiiq, Christian Gehrmann, Kevin Dahlén, Karim Khalil | Published: 2024-08-05 LLM Performance EvaluationModel Performance EvaluationVulnerability Management 2024.08.05 2025.05.12 Literature Database
A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality Authors: M. Mehdi Kholoosi, M. Ali Babar, Roland Croft | Published: 2024-08-01 Security AnalysisPrompt InjectionVulnerability Management 2024.08.01 2025.05.12 Literature Database
Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++ Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2024-07-24 | Updated: 2024-08-03 Deep Learning MethodVulnerability ManagementEvaluation Method 2024.07.24 2025.05.12 Literature Database
ChatBug: A Common Vulnerability of Aligned LLMs Induced by Chat Templates Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Bill Yuchen Lin, Radha Poovendran | Published: 2024-06-17 | Updated: 2025-01-07 LLM SecurityPrompt InjectionVulnerability Management 2024.06.17 2025.05.12 Literature Database