CVE Information Extraction

Using Retriever Augmented Large Language Models for Attack Graph Generation

Authors: Renascence Tarafder Prapty, Ashish Kundu, Arun Iyengar | Published: 2024-08-11
CVE Information Extraction
Prompt Injection
Attack Graph Generation

Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning

Authors: Xiaohu Du, Ming Wen, Jiahao Zhu, Zifan Xie, Bin Ji, Huijun Liu, Xuanhua Shi, Hai Jin | Published: 2024-06-06
CVE Information Extraction
LLM Performance Evaluation
Vulnerability Management

IT Intrusion Detection Using Statistical Learning and Testbed Measurements

Authors: Xiaoxuan Wang, Rolf Stadler | Published: 2024-02-20
CVE Information Extraction
Intrusion Detection System
Attack Method

HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion

Authors: Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi | Published: 2023-12-21
CVE Information Extraction
Prompt Injection
Vulnerability Management

VulLibGen: Generating Names of Vulnerability-Affected Packages via a Large Language Model

Authors: Tianyu Chen, Lin Li, Liuchuan Zhu, Zongyang Li, Xueqing Liu, Guangtai Liang, Qianxiang Wang, Tao Xie | Published: 2023-08-09 | Updated: 2024-05-18
CVE Information Extraction
Model Performance Evaluation
Challenges of Generative Models