脆弱性管理

ReposVul: A Repository-Level High-Quality Vulnerability Dataset

Authors: Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao | Published: 2024-01-24 | Updated: 2024-02-08
コード変更分析
データ収集
脆弱性管理

LLbezpeky: Leveraging Large Language Models for Vulnerability Detection

Authors: Noble Saji Mathews, Yelizaveta Brus, Yousra Aafer, Meiyappan Nagappan, Shane McIntosh | Published: 2024-01-02 | Updated: 2024-02-13
LLM性能評価
プロンプトインジェクション
脆弱性管理

HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion

Authors: Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi | Published: 2023-12-21
CVE情報抽出
プロンプトインジェクション
脆弱性管理

Exploring the Limits of ChatGPT in Software Security Applications

Authors: Fangzhou Wu, Qingzhao Zhang, Ati Priya Bajaj, Tiffany Bao, Ning Zhang, Ruoyu "Fish" Wang, Chaowei Xiao | Published: 2023-12-08
プログラム解析
プロンプトインジェクション
脆弱性管理

HAL 9000: Skynet’s Risk Manager

Authors: Tadeu Freitas, Mário Neto, Inês Dutra, João Soares, Manuel Correia, Rolando Martins | Published: 2023-11-15
ソフトウェアセキュリティ
機械学習手法
脆弱性管理

Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums

Authors: Felipe Moreno-Vera, Mateus Nogueira, Cainã Figueiredo, Daniel Sadoc Menasché, Miguel Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar | Published: 2023-08-03
サイバー攻撃
データ収集
脆弱性管理

A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection

Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman | Published: 2023-06-29
スケーラビリティ分析
ネットワーク脅威検出
脆弱性管理

Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection

Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06
データセット生成
性能評価
脆弱性管理

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence

Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07
サイバーセキュリティの自動化
情報収集手法
脆弱性管理

Beware of the Unexpected: Bimodal Taint Analysis

Authors: Yiu Wai Chow, Max Schäfer, Michael Pradel | Published: 2023-01-25
ソフトウェアセキュリティ
プログラム解析
脆弱性管理