Vulnerability Assessment Method

LLMs as verification oracles for Solidity

Authors: Massimo Bartoletti, Enrico Lipparini, Livio Pompianu | Published: 2025-09-23
Prompt Injection
Model DoS
Vulnerability Assessment Method

LLM-Driven SAST-Genius: A Hybrid Static Analysis Framework for Comprehensive and Actionable Security

Authors: Vaibhav Agrawal, Kiarash Ahi | Published: 2025-09-18 | Updated: 2025-09-23
Prompt Injection
Vulnerability Assessment Method
Static Analysis

What You Code Is What We Prove: Translating BLE App Logic into Formal Models with LLMs for Vulnerability Detection

Authors: Biwei Yan, Yue Zhang, Minghui Xu, Runyu Pan, Jinku Li, Xiuzhen Cheng | Published: 2025-09-11
Vulnerabilities of IoT Devices
形式モデル
Vulnerability Assessment Method

Systematic Analysis of MCP Security

Authors: Yongjian Guo, Puzhuo Liu, Wanlun Ma, Zehang Deng, Xiaogang Zhu, Peng Di, Xi Xiao, Sheng Wen | Published: 2025-08-18
Prompt Injection
Attack Chain Analysis
Vulnerability Assessment Method

A Large Language Model-Supported Threat Modeling Framework for Transportation Cyber-Physical Systems

Authors: M Sabbir Salek, Mashrur Chowdhury, Muhaimin Bin Munir, Yuchen Cai, Mohammad Imtiaz Hasan, Jean-Michel Tine, Latifur Khan, Mizanur Rahman | Published: 2025-06-01 | Updated: 2025-07-28
Bias Detection in AI Output
Poisoning attack on RAG
Vulnerability Assessment Method

Unlocking User-oriented Pages: Intention-driven Black-box Scanner for Real-world Web Applications

Authors: Weizhe Wang, Yao Zhang, Kaitai Liang, Guangquan Xu, Hongpeng Bai, Qingyang Yan, Xi Zheng, Bin Wu | Published: 2025-04-29 | Updated: 2025-04-30
Content Compression Techniques
User Behavior Analysis
Vulnerability Assessment Method

The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models

Authors: Swaroop Dora, Deven Lunkad, Naziya Aslam, S. Venkatesan, Sandeep Kumar Shukla | Published: 2025-04-29
Indirect Prompt Injection
Secure Communication Channel
Vulnerability Assessment Method

A Survey on Data-driven Software Vulnerability Assessment and Prioritization

Authors: Triet H. M. Le, Huaming Chen, M. Ali Babar | Published: 2021-07-18 | Updated: 2022-04-04
Data-Driven Vulnerability Assessment
Multi-Class Classification
Vulnerability Assessment Method

Robust Stochastic Linear Contextual Bandits Under Adversarial Attacks

Authors: Qin Ding, Cho-Jui Hsieh, James Sharpnack | Published: 2021-06-05 | Updated: 2023-01-30
Data Contamination Detection
Adversarial attack
Vulnerability Assessment Method

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Authors: Jacob Brown, Tanujay Saha, Niraj K. Jha | Published: 2021-05-31
Risk Management
Vulnerability Assessment Method
Defense Mechanism