Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models
Abstract
References
Index Terms
- Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models
Recommendations
Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs
Detection of Intrusions and Malware, and Vulnerability AssessmentAbstractAs the reliance on open-source software dependencies increases, managing the security vulnerabilities in these dependencies becomes complex. State-of-the-art industry tools use reachability analysis of code to alert developers when security ...
Measuring and ranking attacks based on vulnerability analysis
As the number of software vulnerabilities increases, the research on software vulnerabilities becomes a focusing point in information security. A vulnerability could be exploited to attack the information asset with the weakness related to the ...
The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityNVD is one of the most popular databases used by researchers to conduct empirical research on data sets of vulnerabilities. Our recent analysis on Chrome vulnerability data reported by NVD has revealed an abnormally phenomenon in the data where almost ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Vladimir Filkov,
- Program Co-chairs:
- Baishakhi Ray,
- Minghui Zhou
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Major Program (JD) of Hubei Province
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 315Total Downloads
- Downloads (Last 12 months)315
- Downloads (Last 6 weeks)67
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in