LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs’ Vulnerability Reasoning Authors: Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Wei Ma, Lyuye Zhang, Yang Liu, Yingjiu Li | Published: 2024-01-29 | Updated: 2025-01-13 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.01.29 2025.05.12 Literature Database
ReposVul: A Repository-Level High-Quality Vulnerability Dataset Authors: Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao | Published: 2024-01-24 | Updated: 2024-02-08 Code Change AnalysisData CollectionVulnerability Management 2024.01.24 2025.05.12 Literature Database
LLbezpeky: Leveraging Large Language Models for Vulnerability Detection Authors: Noble Saji Mathews, Yelizaveta Brus, Yousra Aafer, Meiyappan Nagappan, Shane McIntosh | Published: 2024-01-02 | Updated: 2024-02-13 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.01.02 2025.05.12 Literature Database
HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion Authors: Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi | Published: 2023-12-21 CVE Information ExtractionPrompt InjectionVulnerability Management 2023.12.21 2025.05.12 Literature Database
Exploring the Limits of ChatGPT in Software Security Applications Authors: Fangzhou Wu, Qingzhao Zhang, Ati Priya Bajaj, Tiffany Bao, Ning Zhang, Ruoyu "Fish" Wang, Chaowei Xiao | Published: 2023-12-08 Program AnalysisPrompt InjectionVulnerability Management 2023.12.08 2025.05.12 Literature Database
HAL 9000: Skynet’s Risk Manager Authors: Tadeu Freitas, Mário Neto, Inês Dutra, João Soares, Manuel Correia, Rolando Martins | Published: 2023-11-15 Software SecurityMachine Learning MethodVulnerability Management 2023.11.15 2025.05.12 Literature Database
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums Authors: Felipe Moreno-Vera, Mateus Nogueira, Cainã Figueiredo, Daniel Sadoc Menasché, Miguel Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar | Published: 2023-08-03 Cyber AttackData CollectionVulnerability Management 2023.08.03 2025.05.12 Literature Database
A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman | Published: 2023-06-29 Scalability AnalysisNetwork Threat DetectionVulnerability Management 2023.06.29 2025.05.12 Literature Database
Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06 Dataset GenerationPerformance EvaluationVulnerability Management 2023.06.28 2025.05.12 Literature Database
Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07 Automation of CybersecurityInformation Gathering MethodsVulnerability Management 2023.01.27 2025.05.12 Literature Database