評価手法

DogeFuzz: A Simple Yet Efficient Grey-box Fuzzer for Ethereum Smart Contracts

Authors: Ismael Medeiros, Fausto Carvalho, Alexandre Ferreira, Rodrigo Bonifácio, Fabiano Cavalcanti Fernandes | Published: 2024-09-03
スマートコントラクト
ブロックチェーン技術
評価手法

Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers

Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2024-09-01
ポイズニング
敵対的サンプル
評価手法

Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection

Authors: Niklas Risse, Marcel Böhme | Published: 2024-08-23
セキュリティ分析
脆弱性管理
評価手法

Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions

Authors: Jinxin Liu, Zao Yang | Published: 2024-08-20 | Updated: 2024-09-05
LLM性能評価
プライバシー保護手法
評価手法

KGV: Integrating Large Language Models with Knowledge Graphs for Cyber Threat Intelligence Credibility Assessment

Authors: Zongzong Wu, Fengxiao Tang, Ming Zhao, Yufeng Li | Published: 2024-08-15
サイバーセキュリティ
データセット生成
評価手法

EnJa: Ensemble Jailbreak on Large Language Models

Authors: Jiahao Zhang, Zilong Wang, Ruofan Wang, Xingjun Ma, Yu-Gang Jiang | Published: 2024-08-07
プロンプトインジェクション
攻撃手法
評価手法

Malicious Internet Entity Detection Using Local Graph Inference

Authors: Simon Mandlik, Tomas Pevny, Vaclav Smidl, Lukas Bajer | Published: 2024-08-06 | Updated: 2024-08-07
アルゴリズム
グラフ変換
評価手法

Practical Attacks against Black-box Code Completion Engines

Authors: Slobodan Jenko, Jingxuan He, Niels Mündler, Mark Vero, Martin Vechev | Published: 2024-08-05
攻撃手法
脆弱性管理
評価手法

A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks

Authors: Charles Oredola, Adnan Ashraf | Published: 2024-08-02
SDNアーキテクチャ
サイバーセキュリティ
評価手法

Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++

Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2024-07-24 | Updated: 2024-08-03
深層学習手法
脆弱性管理
評価手法