VulDetectBench: Evaluating the Deep Capability of Vulnerability Detection with Large Language Models Authors: Yu Liu, Lang Gao, Mingxin Yang, Yu Xie, Ping Chen, Xiaojin Zhang, Wei Chen | Published: 2024-06-11 | Updated: 2024-08-21 LLM Performance EvaluationModel Performance EvaluationVulnerability Management 2024.06.11 2025.05.12 Literature Database
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning Authors: Xiaohu Du, Ming Wen, Jiahao Zhu, Zifan Xie, Bin Ji, Huijun Liu, Xuanhua Shi, Hai Jin | Published: 2024-06-06 CVE Information ExtractionLLM Performance EvaluationVulnerability Management 2024.06.06 2025.05.12 Literature Database
Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study Authors: Karl Tamberg, Hayretdin Bahsi | Published: 2024-05-24 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.05.24 2025.05.12 Literature Database
Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security Verification Authors: Mohammad Akyash, Hadi Mardani Kamali | Published: 2024-05-20 Security AnalysisPrompt InjectionVulnerability Management 2024.05.20 2025.05.12 Literature Database
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions Authors: Rudolf Ferenc, Péter Hegedűs, Péter Gyimesi, Gábor Antal, Dénes Bán, Tibor Gyimóthy | Published: 2024-05-12 Model Performance EvaluationMachine Learning MethodVulnerability Management 2024.05.12 2025.05.12 Literature Database
Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums Authors: Felipe Moreno-Vera | Published: 2024-05-07 CybersecurityData PreprocessingVulnerability Management 2024.05.07 2025.05.12 Literature Database
DLAP: A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection Authors: Yanjing Yang, Xin Zhou, Runfeng Mao, Jinwei Xu, Lanxin Yang, Yu Zhangm, Haifeng Shen, He Zhang | Published: 2024-05-02 Prompt InjectionPrompt EngineeringVulnerability Management 2024.05.02 2025.05.12 Literature Database
An Extensive Comparison of Static Application Security Testing Tools Authors: Matteo Esposito, Valentina Falaschi, Davide Falessi | Published: 2024-03-14 Toolkit ComparisonVulnerability ManagementEvaluation Method 2024.03.14 2025.05.12 Literature Database
Unveiling Hidden Links Between Unseen Security Entities Authors: Daniel Alfasi, Tal Shapira, Anat Bremler Barr | Published: 2024-03-04 Link Prediction MethodKnowledge Graph InferenceVulnerability Management 2024.03.04 2025.05.12 Literature Database
Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models Authors: Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou | Published: 2024-03-01 CybersecurityEnhancement of Strategic InsightsVulnerability Management 2024.03.01 2025.05.12 Literature Database