Harnessing TI Feeds for Exploitation Detection Authors: Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins | Published: 2024-09-12 IoC Analysis MethodMachine Learning MethodVulnerability Management 2024.09.12 2025.05.27 Literature Database
HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data Authors: Hossein Hajipour, Lea Schönherr, Thorsten Holz, Mario Fritz | Published: 2024-09-10 Code GenerationVulnerability ManagementAutomated Vulnerability Remediation 2024.09.10 2025.05.27 Literature Database
ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model Authors: Dawei Wang, Geng Zhou, Li Chen, Dan Li, Yukai Miao | Published: 2024-09-02 Option-Based FuzzingPrompt InjectionVulnerability Management 2024.09.02 2025.05.27 Literature Database
Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs Authors: Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Elias Bou-Harb, Peyman Najafirad | Published: 2024-09-01 LLM SecurityVulnerability ManagementAutomated Vulnerability Remediation 2024.09.01 2025.05.27 Literature Database
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Authors: Niklas Risse, Jing Liu, Marcel Böhme | Published: 2024-08-23 | Updated: 2025-04-23 Security AnalysisVulnerability ManagementEvaluation Method 2024.08.23 2025.05.27 Literature Database
PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code Authors: Ziyou Jiang, Lin Shi, Guowei Yang, Qing Wang | Published: 2024-08-16 Code GenerationPrompt InjectionVulnerability Management 2024.08.16 2025.05.27 Literature Database
LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions Authors: Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun | Published: 2024-08-14 Code Change AnalysisPrompt InjectionVulnerability Management 2024.08.14 2025.05.27 Literature Database
Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.08.12 2025.05.27 Literature Database
Harnessing the Power of LLMs in Source Code Vulnerability Detection Authors: Andrew A Mahyari | Published: 2024-08-07 LLM Performance EvaluationProgram AnalysisVulnerability Management 2024.08.07 2025.05.27 Literature Database
Practical Attacks against Black-box Code Completion Engines Authors: Slobodan Jenko, Jingxuan He, Niels Mündler, Mark Vero, Martin Vechev | Published: 2024-08-05 Attack MethodVulnerability ManagementEvaluation Method 2024.08.05 2025.05.27 Literature Database