脆弱性管理

VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog

Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
アルゴリズム設計
ハードウェアセキュリティ
脆弱性管理

SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip

Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
ハードウェアセキュリティ
知識グラフ推論
脆弱性管理

Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs

Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28
プロンプトインジェクション
大規模言語モデル
脆弱性管理

Secure Coding with AI, From Creation to Inspection

Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29
データセットの適用性
プログラム解析
脆弱性管理

Malicious Code Detection in Smart Contracts via Opcode Vectorization

Authors: Huanhuan Zou, Zongwei Li, Xiaoqi Li | Published: 2025-04-17
スマートコントラクト監査
機械学習
脆弱性管理

Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues

Authors: Daniele Cipollone, Changjie Wang, Mariano Scazzariello, Simone Ferlin, Maliheh Izadi, Dejan Kostic, Marco Chiesa | Published: 2025-01-09
LLM性能評価
プロンプトインジェクション
脆弱性管理

Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering

Authors: Matteo Esposito | Published: 2025-01-09
仮説検定
欠陥予測のデータセット作成
脆弱性管理

CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics

Authors: Yikun Li, Ting Zhang, Ratnadira Widyasari, Yan Naing Tun, Huu Hung Nguyen, Tan Bui, Ivana Clairine Irsan, Yiran Cheng, Xiang Lan, Han Wei Ang, Frank Liauw, Martin Weyssow, Hong Jin Kang, Eng Lieh Ouh, Lwin Khin Shar, David Lo | Published: 2024-11-26 | Updated: 2025-01-16
LLM性能評価
コード変更分析
脆弱性管理

RealVul: Can We Detect Vulnerabilities in Web Applications with LLM?

Authors: Di Cao, Yong Liao, Xiuwei Shang | Published: 2024-10-10
LLM性能評価
脆弱性管理

Harnessing TI Feeds for Exploitation Detection

Authors: Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins | Published: 2024-09-12
IoC解析手法
機械学習手法
脆弱性管理