脆弱性回避手法

SecCodeBench-V2 Technical Report

Authors: Longfei Chen, Ji Zhao, Lanxiao Cui, Tong Su, Xingbo Pan, Ziyang Li, Yongxing Wu, Qijiang Cao, Qiyao Cai, Jing Zhang, Yuandong Ni, Junyao He, Zeyu Zhang, Chao Ge, Xuhuai Lu, Zeyu Gao, Yuxin Cui, Weisen Chen, Yuxuan Peng, Shengping Wang, Qi Li, Yukai Huang, Yukun Liu, Tuo Zhou, Terry Yue Zhuo, Junyang Lin, Chao Zhang | Published: 2026-02-17
テストケース生成
脆弱性回避手法
評価メトリクス

CASTLE: Benchmarking Dataset for Static Code Analyzers and LLMs towards CWE Detection

Authors: Richard A. Dubniczky, Krisztofer Zoltán Horvát, Tamás Bisztray, Mohamed Amine Ferrag, Lucas C. Cordeiro, Norbert Tihanyi | Published: 2025-03-12 | Updated: 2025-03-31
セキュリティメトリック
プロンプトリーキング
脆弱性回避手法

Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding

Authors: André Storhaug, Jingyue Li, Tianyuan Hu | Published: 2023-09-18 | Updated: 2023-10-06
スマートコントラクト
ソフトウェアセキュリティ
脆弱性回避手法

ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching

Authors: M. Caner Tol, Berk Sunar | Published: 2023-08-24
LLMセキュリティ
脆弱性回避手法
透かしの耐久性

DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection

Authors: Sudipta Paria, Aritra Dasgupta, Swarup Bhunia | Published: 2023-08-14
LLMセキュリティ
セキュリティ保証
脆弱性回避手法

Uncharted Territory: Energy Attacks in the Battery-less Internet of Things

Authors: Luca Mottola, Arslan Hameed, Thiemo Voigt | Published: 2023-04-17 | Updated: 2023-07-17
エネルギーベースモデル
ネットワーク脅威検出
脆弱性回避手法

Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

Authors: Serhan W. Bahar | Published: 2023-04-05
セキュリティ分析
脅威モデリング
脆弱性回避手法

Statement-Level Vulnerability Detection: Learning Vulnerability Patterns Through Information Theory and Contrastive Learning

Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, Michael Fu, John Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, Dinh Phung | Published: 2022-09-20 | Updated: 2024-06-12
モデル性能評価
学習の改善
脆弱性回避手法

A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software

Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont | Published: 2019-02-07 | Updated: 2019-03-19
データの起源と変遷
情報収集手法
脆弱性回避手法