脆弱性管理

Harnessing TI Feeds for Exploitation Detection

Authors: Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins | Published: 2024-09-12
IoC解析手法
機械学習手法
脆弱性管理

HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data

Authors: Hossein Hajipour, Lea Schönherr, Thorsten Holz, Mario Fritz | Published: 2024-09-10
コード生成
脆弱性管理
自動脆弱性修復

ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model

Authors: Dawei Wang, Geng Zhou, Li Chen, Dan Li, Yukai Miao | Published: 2024-09-02
オプションに基づくファジング
プロンプトインジェクション
脆弱性管理

Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs

Authors: Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Elias Bou-Harb, Peyman Najafirad | Published: 2024-09-01
LLMセキュリティ
脆弱性管理
自動脆弱性修復

Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection

Authors: Niklas Risse, Marcel Böhme | Published: 2024-08-23
セキュリティ分析
脆弱性管理
評価手法

PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code

Authors: Ziyou Jiang, Lin Shi, Guowei Yang, Qing Wang | Published: 2024-08-16
コード生成
プロンプトインジェクション
脆弱性管理

LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions

Authors: Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun | Published: 2024-08-14
コード変更分析
プロンプトインジェクション
脆弱性管理

Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study

Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12
LLM性能評価
プロンプトインジェクション
脆弱性管理

Harnessing the Power of LLMs in Source Code Vulnerability Detection

Authors: Andrew A Mahyari | Published: 2024-08-07
LLM性能評価
プログラム解析
脆弱性管理

Practical Attacks against Black-box Code Completion Engines

Authors: Slobodan Jenko, Jingxuan He, Niels Mündler, Mark Vero, Martin Vechev | Published: 2024-08-05
攻撃手法
脆弱性管理
評価手法