Large language model for vulnerability detection and repair: Literature review and the road ahead

X Zhou, S Cao, X Sun, D Lo - ACM Transactions on Software …, 2024 - dl.acm.org
The significant advancements in Large Language Models (LLMs) have resulted in their
widespread adoption across various tasks within Software Engineering (SE), including …

Generative ai and large language models for cyber security: All insights you need

MA Ferrag, F Alwahedi, A Battah, B Cherif… - Available at SSRN …, 2024 - papers.ssrn.com
This paper provides a comprehensive review of the future of cybersecurity through
Generative AI and Large Language Models (LLMs). We explore LLM applications across …

From llms to llm-based agents for software engineering: A survey of current, challenges and future

H **, L Huang, H Cai, J Yan, B Li, H Chen - arxiv preprint arxiv …, 2024 - arxiv.org
With the rise of large language models (LLMs), researchers are increasingly exploring their
applications in var ious vertical domains, such as software engineering. LLMs have …

International Scientific Report on the Safety of Advanced AI (Interim Report)

Y Bengio, S Mindermann, D Privitera… - arxiv preprint arxiv …, 2024 - arxiv.org
This is the interim publication of the first International Scientific Report on the Safety of
Advanced AI. The report synthesises the scientific understanding of general-purpose AI--AI …

Outside the comfort zone: Analysing llm capabilities in software vulnerability detection

Y Guo, C Patsakis, Q Hu, Q Tang, F Casino - European symposium on …, 2024 - Springer
The significant increase in software production driven by automation and faster development
lifecycles has resulted in a corresponding surge in software vulnerabilities. In parallel, the …

[HTML][HTML] A comprehensive review and assessment of cybersecurity vulnerability detection methodologies

K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …

Revisiting the performance of deep learning-based vulnerability detection on realistic datasets

P Chakraborty, KK Arumugam, M Alfadel… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The impact of software vulnerabilities on everyday software systems is concerning. Although
deep learning-based models have been proposed for vulnerability detection, their reliability …

Hidden code vulnerability detection: A study of the Graph-BiLSTM algorithm

K Ge, QB Han - Information and Software Technology, 2024 - Elsevier
Context: The accelerated growth of the Internet and the advent of artificial intelligence have
led to a heightened interdependence of open source products, which has in turn resulted in …

Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection

S Cao, X Sun, X Wu, D Lo, L Bo, B Li, X Liu… - Proceedings of the 39th …, 2024 - dl.acm.org
Deep Learning (DL) has emerged as a promising means for vulnerability detection due to its
ability to automatically derive features from vulnerable code. Unfortunately, current solutions …

[HTML][HTML] Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities

MA Ferrag, F Alwahedi, A Battah, B Cherif… - Internet of Things and …, 2025 - Elsevier
This paper provides a comprehensive review of the future of cybersecurity through
Generative AI and Large Language Models (LLMs). We explore LLM applications across …