脆弱性分析

CyberRAG: An agentic RAG cyber attack classification and reporting tool

Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03
RAGへのポイズニング攻撃
脆弱性分析
解釈可能性

Evaluating Language Models For Threat Detection in IoT Security Logs

Authors: Jorge J. Tejero-Fernández, Alfonso Sánchez-Macián | Published: 2025-07-03
IoTトラフィック分析
モデルDoS
脆弱性分析

VulBinLLM: LLM-powered Vulnerability Detection for Stripped Binaries

Authors: Nasir Hussain, Haohan Chen, Chanh Tran, Philip Huang, Zhuohao Li, Pravir Chugh, William Chen, Ashish Kundu, Yuan Tian | Published: 2025-05-28
LLMセキュリティ
脆弱性分析
逆アセンブル

Weaponizing Language Models for Cybersecurity Offensive Operations: Automating Vulnerability Assessment Report Validation; A Review Paper

Authors: Abdulrahman S Almuhaidib, Azlan Mohd Zain, Zalmiyah Zakaria, Izyan Izzati Kamsani, Abdulaziz S Almuhaidib | Published: 2025-05-07
LLMセキュリティ
脆弱性分析

AutoPatch: Multi-Agent Framework for Patching Real-World CVE Vulnerabilities

Authors: Minjae Seo, Wonwoo Choi, Myoungsung You, Seungwon Shin | Published: 2025-05-07
RAG
モデルDoS
脆弱性分析

LLMs’ Suitability for Network Security: A Case Study of STRIDE Threat Modeling

Authors: AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2025-05-07
LLMセキュリティ
性能評価
脆弱性分析

Directed Greybox Fuzzing via Large Language Model

Authors: Hanxiang Xu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-06
RAG
プロンプトインジェクション
脆弱性分析

CodeBC: A More Secure Large Language Model for Smart Contract Code Generation in Blockchain

Authors: Lingxiang Wang, Hainan Zhang, Qinnan Zhang, Ziwei Wang, Hongwei Zheng, Jin Dong, Zhiming Zheng | Published: 2025-04-28 | Updated: 2025-05-07
プログラムの検証
性能評価
脆弱性分析

Enhancing Smart Contract Vulnerability Detection in DApps Leveraging Fine-Tuned LLM

Authors: Jiuyang Bu, Wenkai Li, Zongwei Li, Zeng Zhang, Xiaoqi Li | Published: 2025-04-07
スマートコントラクト
モデル性能評価
脆弱性分析

Generative Large Language Model usage in Smart Contract Vulnerability Detection

Authors: Peter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du | Published: 2025-04-07
プロンプトインジェクション
プロンプトリーキング
脆弱性分析