脆弱性分析

SAVANT: Vulnerability Detection in Application Dependencies through Semantic-Guided Reachability Analysis

Authors: Wang Lingxiang, Quanzhi Fu, Wenjia Song, Gelei Deng, Yi Liu, Dan Williams, Ying Zhang | Published: 2025-06-21 | Updated: 2025-07-24
コード変更分析
ソフトウェアセキュリティ
脆弱性分析

LLM Embedding-based Attribution (LEA): Quantifying Source Contributions to Generative Model’s Response for Vulnerability Analysis

Authors: Reza Fayyazi, Michael Zuzak, Shanchieh Jay Yang | Published: 2025-06-12 | Updated: 2025-09-03
RAG
トークン分布分析
脆弱性分析

VulBinLLM: LLM-powered Vulnerability Detection for Stripped Binaries

Authors: Nasir Hussain, Haohan Chen, Chanh Tran, Philip Huang, Zhuohao Li, Pravir Chugh, William Chen, Ashish Kundu, Yuan Tian | Published: 2025-05-28
LLMセキュリティ
脆弱性分析
逆アセンブル

Weaponizing Language Models for Cybersecurity Offensive Operations: Automating Vulnerability Assessment Report Validation; A Review Paper

Authors: Abdulrahman S Almuhaidib, Azlan Mohd Zain, Zalmiyah Zakaria, Izyan Izzati Kamsani, Abdulaziz S Almuhaidib | Published: 2025-05-07
LLMセキュリティ
脆弱性分析

AutoPatch: Multi-Agent Framework for Patching Real-World CVE Vulnerabilities

Authors: Minjae Seo, Wonwoo Choi, Myoungsung You, Seungwon Shin | Published: 2025-05-07
RAG
モデルDoS
脆弱性分析

LLMs’ Suitability for Network Security: A Case Study of STRIDE Threat Modeling

Authors: AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2025-05-07
LLMセキュリティ
性能評価
脆弱性分析

Directed Greybox Fuzzing via Large Language Model

Authors: Hanxiang Xu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-06
RAG
プロンプトインジェクション
脆弱性分析

CodeBC: A More Secure Large Language Model for Smart Contract Code Generation in Blockchain

Authors: Lingxiang Wang, Hainan Zhang, Qinnan Zhang, Ziwei Wang, Hongwei Zheng, Jin Dong, Zhiming Zheng | Published: 2025-04-28 | Updated: 2025-05-07
プログラムの検証
性能評価
脆弱性分析

Enhancing Smart Contract Vulnerability Detection in DApps Leveraging Fine-Tuned LLM

Authors: Jiuyang Bu, Wenkai Li, Zongwei Li, Zeng Zhang, Xiaoqi Li | Published: 2025-04-07
スマートコントラクト
モデル性能評価
脆弱性分析

Generative Large Language Model usage in Smart Contract Vulnerability Detection

Authors: Peter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du | Published: 2025-04-07
プロンプトインジェクション
プロンプトリーキング
脆弱性分析