Exploring the Limits of ChatGPT in Software Security Applications Authors: Fangzhou Wu, Qingzhao Zhang, Ati Priya Bajaj, Tiffany Bao, Ning Zhang, Ruoyu "Fish" Wang, Chaowei Xiao | Published: 2023-12-08 Program AnalysisPrompt InjectionVulnerability Management 2023.12.08 2025.05.28 Literature Database
HAL 9000: Skynet’s Risk Manager Authors: Tadeu Freitas, Mário Neto, Inês Dutra, João Soares, Manuel Correia, Rolando Martins | Published: 2023-11-15 Software SecurityMachine Learning MethodVulnerability Management 2023.11.15 2025.05.28 Literature Database
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums Authors: Felipe Moreno-Vera, Mateus Nogueira, Cainã Figueiredo, Daniel Sadoc Menasché, Miguel Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar | Published: 2023-08-03 Cyber AttackData CollectionVulnerability Management 2023.08.03 2025.05.28 Literature Database
A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman | Published: 2023-06-29 Scalability AnalysisNetwork Threat DetectionVulnerability Management 2023.06.29 2025.05.28 Literature Database
Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06 Dataset GenerationPerformance EvaluationVulnerability Management 2023.06.28 2025.05.28 Literature Database
Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07 Automation of CybersecurityInformation Gathering MethodsVulnerability Management 2023.01.27 2025.05.28 Literature Database
Beware of the Unexpected: Bimodal Taint Analysis Authors: Yiu Wai Chow, Max Schäfer, Michael Pradel | Published: 2023-01-25 Software SecurityProgram AnalysisVulnerability Management 2023.01.25 2025.05.28 Literature Database
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19 PoisoningMembership InferenceVulnerability Management 2023.01.18 2025.05.28 Literature Database
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29 Cyber ThreatSoftware SecurityVulnerability Management 2022.06.29 2025.05.28 Literature Database
xFuzz: Machine Learning Guided Cross-Contract Fuzzing Authors: Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao | Published: 2021-11-24 | Updated: 2022-06-30 Smart ContractVulnerability ManagementStatic Analysis 2021.11.24 2025.05.28 Literature Database