DLAP: A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection Authors: Yanjing Yang, Xin Zhou, Runfeng Mao, Jinwei Xu, Lanxin Yang, Yu Zhangm, Haifeng Shen, He Zhang | Published: 2024-05-02 Prompt InjectionPrompt EngineeringVulnerability Management 2024.05.02 2025.05.27 Literature Database
An Extensive Comparison of Static Application Security Testing Tools Authors: Matteo Esposito, Valentina Falaschi, Davide Falessi | Published: 2024-03-14 Toolkit ComparisonVulnerability ManagementEvaluation Method 2024.03.14 2025.05.27 Literature Database
Unveiling Hidden Links Between Unseen Security Entities Authors: Daniel Alfasi, Tal Shapira, Anat Bremler Barr | Published: 2024-03-04 Link Prediction MethodKnowledge Graph InferenceVulnerability Management 2024.03.04 2025.05.27 Literature Database
Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models Authors: Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou | Published: 2024-03-01 CybersecurityEnhancement of Strategic InsightsVulnerability Management 2024.03.01 2025.05.27 Literature Database
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs’ Vulnerability Reasoning Authors: Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Wei Ma, Lyuye Zhang, Yang Liu, Yingjiu Li | Published: 2024-01-29 | Updated: 2025-01-13 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.01.29 2025.05.27 Literature Database
ReposVul: A Repository-Level High-Quality Vulnerability Dataset Authors: Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao | Published: 2024-01-24 | Updated: 2024-02-08 Code Change AnalysisData CollectionVulnerability Management 2024.01.24 2025.05.27 Literature Database
LLbezpeky: Leveraging Large Language Models for Vulnerability Detection Authors: Noble Saji Mathews, Yelizaveta Brus, Yousra Aafer, Meiyappan Nagappan, Shane McIntosh | Published: 2024-01-02 | Updated: 2024-02-13 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.01.02 2025.05.27 Literature Database
HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion Authors: Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi | Published: 2023-12-21 CVE Information ExtractionPrompt InjectionVulnerability Management 2023.12.21 2025.05.27 Literature Database
Exploring the Limits of ChatGPT in Software Security Applications Authors: Fangzhou Wu, Qingzhao Zhang, Ati Priya Bajaj, Tiffany Bao, Ning Zhang, Ruoyu "Fish" Wang, Chaowei Xiao | Published: 2023-12-08 Program AnalysisPrompt InjectionVulnerability Management 2023.12.08 2025.05.28 Literature Database
HAL 9000: Skynet’s Risk Manager Authors: Tadeu Freitas, Mário Neto, Inês Dutra, João Soares, Manuel Correia, Rolando Martins | Published: 2023-11-15 Software SecurityMachine Learning MethodVulnerability Management 2023.11.15 2025.05.28 Literature Database