hzysvilla / Academic_LLM_Sec_PapersLinks
Academic Papers about LLM Application on Security
☆173Updated 2 weeks ago
Alternatives and similar repositories for Academic_LLM_Sec_Papers
Users that are interested in Academic_LLM_Sec_Papers are comparing it to the libraries listed below
Sorting:
- ☆28Updated 9 months ago
- A collection of security papers on top-tier publications☆43Updated this week
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆58Updated last month
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆68Updated 7 months ago
- TensorFlow API analysis tool and malicious model detection tool☆32Updated last month
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆76Updated 5 months ago
- ☆18Updated 10 months ago
- This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Languag…☆33Updated 3 months ago
- ☆77Updated 6 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆96Updated 2 months ago
- ☆29Updated 3 months ago
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆54Updated last year
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆18Updated last month
- Awesome Large Language Models for Vulnerability Detection☆160Updated this week
- ☆85Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆46Updated last year
- [USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malici…☆63Updated 8 months ago
- Automatic checker synthesis for system-level static analysis☆20Updated 3 weeks ago
- ☆116Updated 11 months ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- CovRL-Fuzz: Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation☆27Updated 7 months ago
- Hey folks, this is a repository for papers on LLM for Vuln. Detection area☆51Updated 2 months ago
- A curated list of malware-related papers.☆28Updated last year
- A Systematic Literature Review on Large Language Models for Automated Program Repair☆189Updated 7 months ago
- ☆27Updated 10 months ago
- A manually vetted dataset for security vulnerability detection in Java projects☆64Updated last week
- ☆11Updated last year
- ☆26Updated 8 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆70Updated 11 months ago
- Seminar 2022☆21Updated 3 months ago