From Generalist to Specialist: Exploring CWE-Specific Vulnerability Detection Authors: Syafiq Al Atiiq, Christian Gehrmann, Kevin Dahlén, Karim Khalil | Published: 2024-08-05 LLM Performance EvaluationModel Performance EvaluationVulnerability Management 2024.08.05 2025.05.27 Literature Database
A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality Authors: M. Mehdi Kholoosi, M. Ali Babar, Roland Croft | Published: 2024-08-01 Security AnalysisPrompt InjectionVulnerability Management 2024.08.01 2025.05.27 Literature Database
Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++ Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2024-07-24 | Updated: 2024-08-03 Deep Learning MethodVulnerability ManagementEvaluation Method 2024.07.24 2025.05.27 Literature Database
ChatBug: A Common Vulnerability of Aligned LLMs Induced by Chat Templates Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Bill Yuchen Lin, Radha Poovendran | Published: 2024-06-17 | Updated: 2025-01-07 LLM SecurityPrompt InjectionVulnerability Management 2024.06.17 2025.05.27 Literature Database
VulDetectBench: Evaluating the Deep Capability of Vulnerability Detection with Large Language Models Authors: Yu Liu, Lang Gao, Mingxin Yang, Yu Xie, Ping Chen, Xiaojin Zhang, Wei Chen | Published: 2024-06-11 | Updated: 2024-08-21 LLM Performance EvaluationModel Performance EvaluationVulnerability Management 2024.06.11 2025.05.27 Literature Database
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning Authors: Xiaohu Du, Ming Wen, Jiahao Zhu, Zifan Xie, Bin Ji, Huijun Liu, Xuanhua Shi, Hai Jin | Published: 2024-06-06 CVE Information ExtractionLLM Performance EvaluationVulnerability Management 2024.06.06 2025.05.27 Literature Database
Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study Authors: Karl Tamberg, Hayretdin Bahsi | Published: 2024-05-24 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.05.24 2025.05.27 Literature Database
Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security Verification Authors: Mohammad Akyash, Hadi Mardani Kamali | Published: 2024-05-20 Security AnalysisPrompt InjectionVulnerability Management 2024.05.20 2025.05.27 Literature Database
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions Authors: Rudolf Ferenc, Péter Hegedűs, Péter Gyimesi, Gábor Antal, Dénes Bán, Tibor Gyimóthy | Published: 2024-05-12 Model Performance EvaluationMachine Learning MethodVulnerability Management 2024.05.12 2025.05.27 Literature Database
Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums Authors: Felipe Moreno-Vera | Published: 2024-05-07 CybersecurityData PreprocessingVulnerability Management 2024.05.07 2025.05.27 Literature Database