Vulnerability Management

VulDetectBench: Evaluating the Deep Capability of Vulnerability Detection with Large Language Models

Authors: Yu Liu, Lang Gao, Mingxin Yang, Yu Xie, Ping Chen, Xiaojin Zhang, Wei Chen | Published: 2024-06-11 | Updated: 2024-08-21
LLM Performance Evaluation
Model Performance Evaluation
Vulnerability Management

Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning

Authors: Xiaohu Du, Ming Wen, Jiahao Zhu, Zifan Xie, Bin Ji, Huijun Liu, Xuanhua Shi, Hai Jin | Published: 2024-06-06
CVE Information Extraction
LLM Performance Evaluation
Vulnerability Management

Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study

Authors: Karl Tamberg, Hayretdin Bahsi | Published: 2024-05-24
LLM Performance Evaluation
Prompt Injection
Vulnerability Management

Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security Verification

Authors: Mohammad Akyash, Hadi Mardani Kamali | Published: 2024-05-20
Security Analysis
Prompt Injection
Vulnerability Management

Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions

Authors: Rudolf Ferenc, Péter Hegedűs, Péter Gyimesi, Gábor Antal, Dénes Bán, Tibor Gyimóthy | Published: 2024-05-12
Model Performance Evaluation
Machine Learning Method
Vulnerability Management

Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums

Authors: Felipe Moreno-Vera | Published: 2024-05-07
Cybersecurity
Data Preprocessing
Vulnerability Management

DLAP: A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection

Authors: Yanjing Yang, Xin Zhou, Runfeng Mao, Jinwei Xu, Lanxin Yang, Yu Zhangm, Haifeng Shen, He Zhang | Published: 2024-05-02
Prompt Injection
Prompt Engineering
Vulnerability Management

An Extensive Comparison of Static Application Security Testing Tools

Authors: Matteo Esposito, Valentina Falaschi, Davide Falessi | Published: 2024-03-14
Toolkit Comparison
Vulnerability Management
Evaluation Method

Unveiling Hidden Links Between Unseen Security Entities

Authors: Daniel Alfasi, Tal Shapira, Anat Bremler Barr | Published: 2024-03-04
Link Prediction Method
Knowledge Graph Inference
Vulnerability Management

Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models

Authors: Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou | Published: 2024-03-01
Cybersecurity
Enhancement of Strategic Insights
Vulnerability Management