LLM4CVE: Enabling Iterative Automated Vulnerability Repair with Large Language Models Authors: Mohamad Fakih, Rahul Dharmaji, Halima Bouzidi, Gustavo Quiros Araya, Oluwatosin Ogundare, Mohammad Abdullah Al Faruque | Published: 2025-01-07 LLM Performance EvaluationPrompt EngineeringAutomated Vulnerability Remediation 2025.01.07 2025.05.27 Literature Database
Leveraging Large Language Models and Machine Learning for Smart Contract Vulnerability Detection Authors: S M Mostaq Hossain, Amani Altarawneh, Jesse Roberts | Published: 2025-01-04 LLM Performance EvaluationSmart Contract 2025.01.04 2025.05.27 Literature Database
CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models Authors: Johan Wahréus, Ahmed Mohamed Hussain, Panos Papadimitratos | Published: 2025-01-02 LLM Performance EvaluationCybersecurityPrompt Injection 2025.01.02 2025.05.27 Literature Database
Shifting-Merging: Secure, High-Capacity and Efficient Steganography via Large Language Models Authors: Minhao Bai, Jinshuai Yang, Kaiyi Pang, Yongfeng Huang, Yue Gao | Published: 2025-01-01 LLM Performance EvaluationData Obfuscation 2025.01.01 2025.05.27 Literature Database
SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity Authors: Pengfei Jing, Mengyun Tang, Xiaorong Shi, Xing Zheng, Sen Nie, Shi Wu, Yong Yang, Xiapu Luo | Published: 2024-12-30 | Updated: 2025-01-06 LLM Performance EvaluationCybersecurityPrompt Injection 2024.12.30 2025.05.27 Literature Database
Safeguarding System Prompts for LLMs Authors: Zhifeng Jiang, Zhihua Jin, Guoliang He | Published: 2024-12-18 | Updated: 2025-01-09 LLM Performance EvaluationPrompt InjectionDefense Method 2024.12.18 2025.05.27 Literature Database
Can LLM Prompting Serve as a Proxy for Static Analysis in Vulnerability Detection Authors: Ira Ceka, Feitong Qiao, Anik Dey, Aastha Valecha, Gail Kaiser, Baishakhi Ray | Published: 2024-12-16 | Updated: 2025-01-18 LLM Performance EvaluationPrompting StrategyPrompt Injection 2024.12.16 2025.05.27 Literature Database
LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states Authors: Luis Ibanez-Lissen, Lorena Gonzalez-Manzano, Jose Maria de Fuentes, Nicolas Anciaux, Joaquin Garcia-Alfaro | Published: 2024-11-29 | Updated: 2025-01-10 LLM Performance EvaluationMembership Inference 2024.11.29 2025.05.27 Literature Database
CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics Authors: Yikun Li, Ting Zhang, Ratnadira Widyasari, Yan Naing Tun, Huu Hung Nguyen, Tan Bui, Ivana Clairine Irsan, Yiran Cheng, Xiang Lan, Han Wei Ang, Frank Liauw, Martin Weyssow, Hong Jin Kang, Eng Lieh Ouh, Lwin Khin Shar, David Lo | Published: 2024-11-26 | Updated: 2025-04-14 LLM Performance EvaluationCode Change AnalysisVulnerability Management 2024.11.26 2025.05.27 Literature Database
CS-Eval: A Comprehensive Large Language Model Benchmark for CyberSecurity Authors: Zhengmin Yu, Jiutian Zeng, Siyi Chen, Wenhan Xu, Dandan Xu, Xiangyu Liu, Zonghao Ying, Nan Wang, Yuan Zhang, Min Yang | Published: 2024-11-25 | Updated: 2025-01-17 LLM Performance EvaluationCybersecurity 2024.11.25 2025.05.27 Literature Database