Domain-Specific Security Applications

Research applying LLMs to security challenges in specific domains like code analysis, finance, and threat intelligence

Hero image

Domain-Specific Security Applications

Research on Large Language Models in Domain-Specific Security Applications

PoliGraph: Making Sense of Privacy Policies

PoliGraph: Making Sense of Privacy Policies

Using Knowledge Graphs to Detect Policy Contradictions

BotArtist: Detecting Twitter Bots

BotArtist: Detecting Twitter Bots

A semi-automatic approach to fight disinformation and manipulation

Harnessing ChatGPT to Combat Phishing Attacks

Harnessing ChatGPT to Combat Phishing Attacks

Using LLMs as a powerful defense against cybersecurity threats

Security Risks in AI-Generated Code

Security Risks in AI-Generated Code

Empirical analysis of security vulnerabilities in GitHub Copilot code

Privacy Vulnerabilities in Federated Learning

Privacy Vulnerabilities in Federated Learning

How attackers can steal sensitive data from language models without accessing raw data

Nova: AI-Powered Assembly Code Analysis

Nova: AI-Powered Assembly Code Analysis

Enhancing security through specialized language models for binary code

LLMs Revolutionize Kernel Security

LLMs Revolutionize Kernel Security

Enhancing fuzzing with AI to find critical OS vulnerabilities

Automating Threat Intelligence

Automating Threat Intelligence

Blending global and local cyber knowledge for personalized security

Leveraging Language Models for Credit Risk

Leveraging Language Models for Credit Risk

Using BERT to extract risk signals from P2P loan descriptions

Fortifying Recommender Systems

Fortifying Recommender Systems

Using LLMs to Defend Against Poisoning Attacks

Smart Contract Security Through Improved Summarization

Smart Contract Security Through Improved Summarization

Leveraging LLMs with Control Flow Analysis for Safer Smart Contracts

Intelligent Log Parsing with Lemur

Intelligent Log Parsing with Lemur

Enhancing System Monitoring through Advanced AI

Enhancing Digital Forensics with LLMs

Enhancing Digital Forensics with LLMs

Exploring AI solutions for overwhelmed forensic labs

Securing LLM Agents

Securing LLM Agents

Introducing IsolateGPT: Execution Isolation for LLM App Ecosystems

Securing Blockchain with AI

Securing Blockchain with AI

Leveraging Large Language Models for Enhanced Blockchain Security

Security Gaps in Rust's Foreign Function Interface

Security Gaps in Rust's Foreign Function Interface

Detecting undefined behaviors across language boundaries

Backdoor Threats in Code LLMs

Backdoor Threats in Code LLMs

Converting AI Backdoors to Traditional Malware

Harnessing LLMs for Protocol Security

Harnessing LLMs for Protocol Security

Using AI to detect vulnerabilities by inferring state machines

IRIS: AI-Powered Security Shield

IRIS: AI-Powered Security Shield

Combining LLMs with Static Analysis for Better Vulnerability Detection

HoneyGPT: Revolutionizing Cybersecurity Deception

HoneyGPT: Revolutionizing Cybersecurity Deception

Using LLMs to create more adaptive, interactive honeypots

Advancing Log Parsing with AI

Advancing Log Parsing with AI

Using LLMs to self-learn and self-correct for better security insights

Benchmarking LLMs for Cybersecurity

Benchmarking LLMs for Cybersecurity

A New Framework for Testing AI in Offensive Security

FlexLog: Effective Anomaly Detection in Unstable Logs

FlexLog: Effective Anomaly Detection in Unstable Logs

Combining Large Language Models with ML for Data-Efficient Cybersecurity

LLM-Powered Network Health Management

LLM-Powered Network Health Management

Revolutionizing network anomaly detection through semantic understanding

Package Hallucinations: A New Security Threat

Package Hallucinations: A New Security Threat

How LLMs create software supply chain vulnerabilities

AI-Generated Phishing: A New Security Threat

AI-Generated Phishing: A New Security Threat

Comparing AI vs Human-Authored Spear Phishing SMS Attacks

Securing LLM Integration

Securing LLM Integration

Uncovering critical flaws in how developers implement LLMs in software

Securing AI-Generated Code

Securing AI-Generated Code

How Prompting Techniques Impact Security Vulnerabilities

Aurora: AI-Powered Cyberattack Emulation

Aurora: AI-Powered Cyberattack Emulation

Automating Attack Planning with LLMs and Classical Planning

Open-FinLLMs: Revolutionizing Financial Intelligence

Open-FinLLMs: Revolutionizing Financial Intelligence

The first open-source multimodal LLMs for comprehensive financial applications

APPATCH: AI-Powered Vulnerability Patching

APPATCH: AI-Powered Vulnerability Patching

Automating software security fixes with adaptive prompting of LLMs

Detecting Vulnerabilities Without Labeled Data

Detecting Vulnerabilities Without Labeled Data

LLM-based anomaly detection outperforms direct LLM vulnerability prediction

Enhancing Log Analysis with LLM Knowledge

Enhancing Log Analysis with LLM Knowledge

Knowledge-driven approach for efficient log understanding

LLMs as Security Sentinels

LLMs as Security Sentinels

Revolutionizing Anomaly & Out-of-Distribution Detection

LLMs for Security Log Analysis

LLMs for Security Log Analysis

Revolutionizing Cyber Security with Template Detection

News Ripples Through Supply Chain Networks

News Ripples Through Supply Chain Networks

How positive and negative news impacts stock prices across connected firms

MarS: Simulating Financial Markets with AI

MarS: Simulating Financial Markets with AI

Using Large Language Models to Create Realistic Market Environments

Combating Financial Misinformation with AI

Combating Financial Misinformation with AI

How Large Language Models Can Detect Financial Falsehoods

Securing the Supply Chain

Securing the Supply Chain

Automatic Verification of Vulnerabilities in Third-Party Dependencies

Navigating the Safety Frontier of AI in Healthcare

Navigating the Safety Frontier of AI in Healthcare

Balancing innovation with responsible implementation of LLMs in medicine

DomainLynx: AI-Powered Cybersecurity

DomainLynx: AI-Powered Cybersecurity

Enhancing Domain Squatting Detection with Large Language Models

Securing POI Recommendation Systems

Securing POI Recommendation Systems

A comprehensive analysis of security threats and safeguards in location-based recommendations

ChatGPT Meets Malware Detection

ChatGPT Meets Malware Detection

Leveraging LLMs to Enhance Android Security

Unlocking Time Series Anomaly Detection with LLMs

Unlocking Time Series Anomaly Detection with LLMs

Exploring LLMs' untapped potential beyond forecasting

TEOChat: Temporal Vision for Earth Observation

TEOChat: Temporal Vision for Earth Observation

First LLM assistant that analyzes time-series satellite imagery

Smart Motion Prediction for Autonomous Vehicles

Smart Motion Prediction for Autonomous Vehicles

Advancing Self-Supervised Learning for Safer Autonomous Driving

Ensuring Safe AI Agents for Mobile Interfaces

Ensuring Safe AI Agents for Mobile Interfaces

A framework for evaluating the impact and risks of AI actions on mobile UIs

Scaling Up Targeted AI Attacks

Scaling Up Targeted AI Attacks

A Simple Transformation Technique for Attacking Black-Box Models

AI-Powered Smart Contract Security

AI-Powered Smart Contract Security

Automating Blockchain Security Audits with Fine-Tuned LLMs

Safety Blind Spots in AI Lab Assistants

Safety Blind Spots in AI Lab Assistants

Benchmarking LLMs on Critical Laboratory Safety Risks

Intelligent Safety Filters for Robot Manipulation

Intelligent Safety Filters for Robot Manipulation

Teaching robots 'common sense' safety constraints through semantics

Improving Smart Contract Transparency

Improving Smart Contract Transparency

AI-Powered Decompiler for Blockchain Security

AI-Powered Formal Verification

AI-Powered Formal Verification

Enabling LLMs to automatically generate security proofs for Rust code

AI-Powered Ethical Hacking

AI-Powered Ethical Hacking

Benchmarking LLMs for Automated Penetration Testing

Next-Gen Surveillance with Zero-Shot Learning

Next-Gen Surveillance with Zero-Shot Learning

Leveraging LVLMs for Action Recognition Without Training Data

Supercharging Anomaly Detection with LLMs

Supercharging Anomaly Detection with LLMs

Using language models to detect system issues in log data

Unified Vision-Language for Autonomous Driving

Unified Vision-Language for Autonomous Driving

Aligning BEV Perception with Natural Language Understanding

Securing Code Generation in LLMs

Securing Code Generation in LLMs

Proactive security alignment to prevent vulnerabilities in AI-generated code

Cleaning Up Vulnerability Detection in Code

Cleaning Up Vulnerability Detection in Code

Using LLMs to spot real vulnerabilities in software commits

Spotting the Unusual: AI-Powered Anomaly Detection

Spotting the Unusual: AI-Powered Anomaly Detection

A breakthrough benchmark for text-based detection of abnormal pedestrian behaviors

Bridging the AI Security Gap

Bridging the AI Security Gap

Advancing Autonomous Penetration Testing with AI Generalization Techniques

Trusted AI Through Neural Interactive Proofs

Trusted AI Through Neural Interactive Proofs

A Framework for Secure Collaboration Between Trusted and Untrusted AI Systems

Safeguarding AI Agents in the Physical World

Safeguarding AI Agents in the Physical World

A new benchmark for evaluating the safety of embodied AI agents

Automating Formal Verification with AI

Automating Formal Verification with AI

How Rango uses LLMs to streamline software security verification

LLMs in Code Security: A Double-Edged Sword

LLMs in Code Security: A Double-Edged Sword

Analyzing vulnerabilities and remediation in AI-assisted coding

AI-Powered News Reliability Assessment

AI-Powered News Reliability Assessment

Using LLMs to Evaluate News Publisher Trustworthiness

LLMs as Code Obfuscation Weapons?

LLMs as Code Obfuscation Weapons?

Evaluating LLMs' ability to create malware-evading code obfuscations

Navigating with Words

Navigating with Words

Text-guided geo-localization for location identification

Intelligent Cloud Defense with LLMs

Intelligent Cloud Defense with LLMs

Leveraging AI to anticipate and neutralize cyber threats

Visual Reasoning for Driving Safety

Visual Reasoning for Driving Safety

Enhancing VLMs with Retrieval-Based Interleaved Visual Chain-of-Thought

Edge AI for Military Defense Vehicles

Edge AI for Military Defense Vehicles

Combining LLMs with Edge Intelligence for Secure 6G-Enabled Autonomous Defense

Knowledge-Powered Violence Detection

Knowledge-Powered Violence Detection

Building More Interpretable Security Systems Using Graph AI

Diffusion Models Revolutionize Anomaly Detection

Diffusion Models Revolutionize Anomaly Detection

A powerful new approach for detecting irregularities in complex data

Weather-Adaptive Maritime Security Systems

Weather-Adaptive Maritime Security Systems

Using AI-generated data to overcome weather and category limitations

Personalized AI Surveillance Made Simple

Personalized AI Surveillance Made Simple

Creating Custom Visual Sensors with Multimodal LLMs

Multi-Agent Framework for KG Error Detection

Multi-Agent Framework for KG Error Detection

Leveraging Diverse Perspectives to Enhance Knowledge Graph Security

Smarter Adversarial Testing for Self-Driving Cars

Smarter Adversarial Testing for Self-Driving Cars

Using LLMs to Identify and Generate Critical Safety Scenarios

Next-Gen Person Re-Identification

Next-Gen Person Re-Identification

Leveraging CLIP to Enhance Security Systems

LLM-Powered Aerial Surveillance

LLM-Powered Aerial Surveillance

Using AI dialogue systems for active perception and anomaly detection

Smarter Video Search for Security

Smarter Video Search for Security

Context-Aware Retrieval for Enhanced Video Event Detection

Defending Power Grids Against Zero-Day Attacks

Defending Power Grids Against Zero-Day Attacks

Using In-Context Learning to Detect Novel Cyber Threats in Digital Substations

Unmasking Hidden Threats to IoT Devices

Unmasking Hidden Threats to IoT Devices

How attackers use Tor to exploit cloudless IoT vulnerabilities

Intelligent Network Diagnosis with LLMs

Intelligent Network Diagnosis with LLMs

Translating Network Data into Language Model-Readable Semantics

AI-Powered Traffic Scene Understanding

AI-Powered Traffic Scene Understanding

Leveraging Large Visual Language Models for Autonomous Driving

LLMs for Penetration Testing Education

LLMs for Penetration Testing Education

Comparative Analysis of 6 Leading Models for Cybersecurity Training

Enhancing Text-Based Person Search

Enhancing Text-Based Person Search

A novel approach to boost weak positive matches in security applications

Unleashing LLMs on Bitcoin's Digital Trail

Unleashing LLMs on Bitcoin's Digital Trail

A novel approach using AI to interpret cryptocurrency transactions

RepoAudit: AI-Powered Code Security at Scale

RepoAudit: AI-Powered Code Security at Scale

Autonomous LLM agent designed for repository-level vulnerability detection

Safeguarding AI Clinicians

Safeguarding AI Clinicians

Exposing LLM Vulnerabilities in Healthcare Settings

AI-Powered Security Vulnerability Triage

AI-Powered Security Vulnerability Triage

Using LLMs to streamline security bug classification and assessment

Enabling LLM-Powered Fuzzing for Non-Textual Inputs

Enabling LLM-Powered Fuzzing for Non-Textual Inputs

How G2FUZZ bridges the gap between LLMs and complex input testing

Securing Smart Homes with Synthetic Data

Securing Smart Homes with Synthetic Data

Using LLMs to generate realistic user behavior for security testing

Code Length Matters in Vulnerability Detection

Code Length Matters in Vulnerability Detection

How input size affects LLM security performance

Fault-Tolerant Verification in Distributed Systems

Fault-Tolerant Verification in Distributed Systems

A New Framework for Secure Runtime Verification

Revolutionizing Security with LLMs

Revolutionizing Security with LLMs

How Large Language Models Transform Event Log Analysis

Personalizing Anomaly Detection

Personalizing Anomaly Detection

A few-shot approach that transforms anomalies to normal patterns

Evaluating Custom GPT Safety

Evaluating Custom GPT Safety

A Framework for Automated Policy Compliance Assessment

LLM-Powered Trading Intelligence

LLM-Powered Trading Intelligence

Harnessing AI for Real-Time Market Sentiment Analysis

Hiding Secrets in Plain Text

Hiding Secrets in Plain Text

Enhancing Steganography Security with Large Language Models

Security Risks in AI-Generated Code

Security Risks in AI-Generated Code

A comprehensive analysis across languages and models

Improving LLMs for Financial Trading

Improving LLMs for Financial Trading

Fine-tuning language models with market feedback for better trading signals

Automated Security Fixes for Containers

Automated Security Fixes for Containers

Using LLMs to Repair Container Misconfigurations

Revolutionizing ADS Testing with Real-World Data

Revolutionizing ADS Testing with Real-World Data

Leveraging multimodal accident data for safer autonomous vehicles

Enhancing Autonomous Driving Safety with LLMs

Enhancing Autonomous Driving Safety with LLMs

Using AI to identify and mitigate risks in driving scenarios

SHIELD: Next-Gen APT Detection

SHIELD: Next-Gen APT Detection

Leveraging LLMs for Intelligent Threat Detection & Explanation

AI-Powered Defense Against Phishing Attacks

AI-Powered Defense Against Phishing Attacks

Automating phishing defense while preserving privacy

AI-Powered Network Penetration Testing

AI-Powered Network Penetration Testing

LLMs as Autonomous Security Testers in Enterprise Environments

Enhancing Smart Contract Security Through LLMs

Enhancing Smart Contract Security Through LLMs

First systematic study of bad practices in Ethereum smart contracts

Smart Ransomware Risk Prioritization

Smart Ransomware Risk Prioritization

Using historical data to predict and prepare for targeted attacks

Fighting Phishing with AI Intelligence

Fighting Phishing with AI Intelligence

Leveraging Large Language Models to Detect Malicious Emails

Secure UAV Intelligence: The Aero-LLM Framework

Secure UAV Intelligence: The Aero-LLM Framework

Distributed LLM architecture for enhanced drone security and autonomy

AI Agent Crews in Financial Services

AI Agent Crews in Financial Services

Autonomous LLM-powered systems for modeling and risk management

Cyri: AI-Powered Defense Against Phishing Attacks

Cyri: AI-Powered Defense Against Phishing Attacks

A conversational assistant that helps users detect and analyze phishing threats

Securing AI-Generated Code Through Prompt Engineering

Securing AI-Generated Code Through Prompt Engineering

Reducing security vulnerabilities by up to 56% in LLM code generation

Improving Bash Command Generation with LLMs

Improving Bash Command Generation with LLMs

Enhancing security and accessibility of command-line interfaces

Lost in the Code: LLM Vulnerability Detection

Lost in the Code: LLM Vulnerability Detection

How large language models struggle with vulnerability detection in full-size code files

Fighting Modern Slavery with AI

Fighting Modern Slavery with AI

Using LLMs to analyze corporate compliance statements

Measuring LLM Reliability in Security

Measuring LLM Reliability in Security

Benchmarking consistency for cybersecurity applications

Detecting Insider Threats with AI

Detecting Insider Threats with AI

Using LLMs for Scalable and Ethical Security Analysis

Revolutionizing Security with AI

Revolutionizing Security with AI

How LLMs are transforming vulnerability detection in software

CodeQUEST: AI-Powered Code Quality Improvement

CodeQUEST: AI-Powered Code Quality Improvement

Automating code evaluation and enhancement with LLMs

Supercharging Network Security with LLMs

Supercharging Network Security with LLMs

How Large Language Models Can Enhance Network Monitoring

SymGPT: Smarter Smart Contract Auditing

SymGPT: Smarter Smart Contract Auditing

Combining Symbolic Execution with LLMs for Automated Security Verification

Verifying AI-Generated Code

Verifying AI-Generated Code

Using SPARK/Ada formal verification to ensure LLM code reliability

SAR Image Interpretation with AI

SAR Image Interpretation with AI

Advancing Security Applications through Vision-Language Models

Strategic Target Selection in Directed Fuzzing

Strategic Target Selection in Directed Fuzzing

Optimizing where to fuzz improves vulnerability discovery

Boosting Food Safety AI with Synthetic Data

Boosting Food Safety AI with Synthetic Data

How ChatGPT-4o-mini enhances LLMs for food hazard detection

Enhancing Surveillance Security with AI

Enhancing Surveillance Security with AI

Benchmarking Large Models for Crime Video Analysis

ChatIoT: Smart Security for Smart Devices

ChatIoT: Smart Security for Smart Devices

Leveraging LLMs to revolutionize IoT security practices

AI-Powered Hazard Source Detection

AI-Powered Hazard Source Detection

Autonomous reasoning for critical industrial safety decisions

Smarter Cars Through Collaboration

Smarter Cars Through Collaboration

Enhancing autonomous driving safety with inter-vehicle communication

ScamFerret: AI-Powered Scam Website Detection

ScamFerret: AI-Powered Scam Website Detection

Autonomous detection through large language models without training data

Securing RISC-V Processor Designs

Securing RISC-V Processor Designs

Translating Security Assertions Across Architectures

Enhancing Cryptoasset Forensics with AI

Enhancing Cryptoasset Forensics with AI

Using LLMs to improve attribution tag accuracy and prevent false accusations

Optimizing SMS Spam Detection

Optimizing SMS Spam Detection

Using LLMs to enhance cybersecurity through advanced text classification

Weather Forecasting Revolution via LLMs

Weather Forecasting Revolution via LLMs

Frequency-aware language models for more accurate and efficient predictions

AI-Powered Traffic Monitoring Systems

AI-Powered Traffic Monitoring Systems

Enhancing urban mobility through multimodal LLMs and computer vision

Securing DeFi with AI Reasoning

Securing DeFi with AI Reasoning

Using LLMs to Detect Cryptocurrency Price Manipulation Attacks

LLMs as Backend Developers: A Security Risk?

LLMs as Backend Developers: A Security Risk?

Evaluating the security and correctness of LLM-generated backend applications

Voice Profiling: Extracting Demographics from Speech

Voice Profiling: Extracting Demographics from Speech

Using WavLM embeddings to predict speaker attributes from voice alone

AI-Powered Decompilation Breakthrough

AI-Powered Decompilation Breakthrough

Enhancing Security Analysis with LLM-Based Code Reconstruction

Wi-Chat: Revolutionizing Security Through Wi-Fi

Wi-Chat: Revolutionizing Security Through Wi-Fi

Integrating LLMs with Wi-Fi Sensing for Human Activity Recognition

Automating Security Policy Generation

Automating Security Policy Generation

Converting natural language policies to machine-enforceable code with LLMs

On-Device LLMs for Smarter Homes

On-Device LLMs for Smarter Homes

Efficient dual-role models for intent detection and response generation

LLMs Take On Android Malware

LLMs Take On Android Malware

Context-Driven Detection for Enhanced Security

Enhancing Blockchain Security with AI

Enhancing Blockchain Security with AI

Fine-tuned LLMs for smart contract vulnerability detection

Simplifying Security: TEE Protection Made Easy

Simplifying Security: TEE Protection Made Easy

Automating the integration of secure enclaves into existing programs

LLMs in High-Stakes Political Decision-Making

LLMs in High-Stakes Political Decision-Making

Evaluating AI capabilities in UN security contexts

Controlling What LLMs Learn

Controlling What LLMs Learn

A novel approach for supervised learning by revealing and controlling latent features

Securing Smart Contracts with AI

Securing Smart Contracts with AI

Using LLMs to prevent manipulation attacks through secure partitioning

Context-Aware Chatbots for Smart Environments

Context-Aware Chatbots for Smart Environments

Integrating LLMs with real-time user context for personalized interactions

LLM-Powered Security Testing

LLM-Powered Security Testing

Semi-Autonomous Penetration Testing with Large Language Models

AI as Cyber Threat Actor

AI as Cyber Threat Actor

Evaluating LLMs' Offensive Cyber Operation Capabilities

Building Trust in Healthcare AI

Building Trust in Healthcare AI

Evaluating the trustworthiness of LLMs in clinical applications

AI-Powered Vulnerability Detection

AI-Powered Vulnerability Detection

Using LLMs to Automate Medical Device Security Assessment

ZiGong: Specialized AI for Financial Credit Assessment

ZiGong: Specialized AI for Financial Credit Assessment

Combating hallucination in financial decision-making with domain-specific LLMs

Securing the Connected Road Ahead

Securing the Connected Road Ahead

Using LLMs to Enhance Vehicle Security Through Smarter Key Generation

Securing AI Code Generation

Securing AI Code Generation

Multi-Model Validation to Mitigate LLM Security Risks

Market Manipulation by AI Agents

Market Manipulation by AI Agents

How LLM-powered trading bots can influence market sentiment

Navigation-GPT: Revolutionizing Navigation Systems

Navigation-GPT: Revolutionizing Navigation Systems

How LLMs are making navigation more adaptive to unpredictable scenarios

AI-Powered Autonomous Penetration Testing

AI-Powered Autonomous Penetration Testing

How LLMs can fully automate IP-to-Shell security testing

Advancing Vehicle Tracking with AI

Advancing Vehicle Tracking with AI

CLIP-based semantic enhancement without additional annotations

Smart Code Security with Graph Neural Networks

Smart Code Security with Graph Neural Networks

Leveraging heterogeneous GNNs to detect complex software vulnerabilities

LLMs: Revolutionizing News Summarization

LLMs: Revolutionizing News Summarization

Automated solutions for information overload in security contexts

AI-Powered Wildfire Evacuation Prediction

AI-Powered Wildfire Evacuation Prediction

Using LLMs to understand and predict human decision-making during disasters

Enhancing AI for Disaster Response

Enhancing AI for Disaster Response

Using synthetic data to boost common sense reasoning in smaller LLMs

Security Risks in AI-Assisted Development

Security Risks in AI-Assisted Development

Understanding LLM vulnerabilities in software engineering workflows

LLMs Revolutionize Program Analysis

LLMs Revolutionize Program Analysis

Enhancing security through AI-powered code comprehension

AI Guards for Smart Contracts

AI Guards for Smart Contracts

Using Multi-Agent LLM Systems to Secure Blockchain Applications

Evaluating LLMs for Smart Contract Security

Evaluating LLMs for Smart Contract Security

First benchmark for repository-level Solidity code generation

Securing LLMs Against Domain Breaches

Securing LLMs Against Domain Breaches

A framework for certifying and limiting LLM behavior

ChatReID: Revolutionizing Person Recognition

ChatReID: Revolutionizing Person Recognition

Interactive Visual Identity Matching Through Advanced Vision-Language Models

AI-Powered Cyber Defense

AI-Powered Cyber Defense

Transforming Threat Intelligence with Large Language Models

Making AI Safer for Women's Health

Making AI Safer for Women's Health

Using Semantic Entropy to Reduce Hallucinations in Medical LLMs

Enhancing Fuzz Testing with LLMs

Enhancing Fuzz Testing with LLMs

Overcoming reliability challenges in AI-driven security testing

LLMs as Security Guards

LLMs as Security Guards

Assessing AI's effectiveness in multi-language vulnerability detection

Combating Online Drug Trafficking with AI

Combating Online Drug Trafficking with AI

Using LLMs to detect illegal drug sales despite limited data

Detecting Privacy Behaviors in Android Code

Detecting Privacy Behaviors in Android Code

Improving machine understanding of privacy-relevant code statements

Next-Gen Network Traffic Classification

Next-Gen Network Traffic Classification

Comparing Traditional ML, Transformers, and LLMs for Enhanced Security

Advanced Malware Detection Through Memory Analysis

Advanced Malware Detection Through Memory Analysis

Comparing Traditional ML, Transformers, and LLMs for Security Applications

SyzAgent: LLM-Guided Kernel Fuzzing

SyzAgent: LLM-Guided Kernel Fuzzing

Enhancing Security Testing with AI-Powered Mutation

RedChronos: AI-Powered Insider Threat Detection

RedChronos: AI-Powered Insider Threat Detection

Using LLMs to analyze enterprise security logs at scale

OmniSec: Closing the Knowledge Gap in Intrusion Detection

OmniSec: Closing the Knowledge Gap in Intrusion Detection

Leveraging LLMs to Automate Provenance-based Security Analysis

AttackSeqBench: Benchmarking Large Language Models' Understa...

AttackSeqBench: Benchmarking Large Language Models' Understa...

By Javier Yong, Haokai Ma...

Securing Critical Infrastructure with AI

Securing Critical Infrastructure with AI

Using LLMs to Make IoT Security Systems Explainable

COSINT-Agent: Revolutionizing Intelligence Gathering

COSINT-Agent: Revolutionizing Intelligence Gathering

A Knowledge-Driven Multimodal Approach to Chinese OSINT

A 262 TOPS Hyperdimensional Photonic AI Accelerator powered ...

A 262 TOPS Hyperdimensional Photonic AI Accelerator powered ...

By Christos Pappas, Antonios Prapas...

Benchmarking LLMs and LLM-based Agents in Practical Vulnerab...

Benchmarking LLMs and LLM-based Agents in Practical Vulnerab...

By Alperen Yildiz, Sin G. Teo...

KidneyTalk-open: No-code Deployment of a Private Large Langu...

KidneyTalk-open: No-code Deployment of a Private Large Langu...

By Yongchao Long, Chao Yang...

Edge-Based Malware Detection with Lightweight LLMs

Edge-Based Malware Detection with Lightweight LLMs

Optimizing security for resource-constrained edge devices

LLMs as Your IoT Automation Hub

LLMs as Your IoT Automation Hub

Enabling Seamless Natural Language Control for IoT Devices

Garbage In, Garbage Out: LLM Security Research

Garbage In, Garbage Out: LLM Security Research

Why Quality Matters in Security Vulnerability Datasets

Control Flow-Augmented Decompiler based on Large Language Mo...

Control Flow-Augmented Decompiler based on Large Language Mo...

By Peipei Liu, Jian Sun...

LLaMA 3.2: The New Frontier in Vulnerability Detection

LLaMA 3.2: The New Frontier in Vulnerability Detection

Leveraging advanced LLMs to identify software security flaws

Wi-Fi Sensing Beyond Boundaries

Wi-Fi Sensing Beyond Boundaries

Addressing generalization challenges in wireless sensing technology

Revolutionizing Medical Image Re-Identification

Revolutionizing Medical Image Re-Identification

A unified approach across all medical imaging modalities

Multimodal Stock Prediction

Multimodal Stock Prediction

Combining News Text and Price Data for Better Market Forecasting

Securing Software Through Smart Debloating

Securing Software Through Smart Debloating

Using LLMs to Enhance Security by Removing Unnecessary Code

Supercharging Security with AI-Powered Bug Detection

Supercharging Security with AI-Powered Bug Detection

How LLMs can transform static analysis for critical systems

Securing LLMs in Cybersecurity

Securing LLMs in Cybersecurity

New dataset to evaluate and mitigate AI safety risks

CASTLE: Benchmarking Dataset for Static Code Analyzers and L...

CASTLE: Benchmarking Dataset for Static Code Analyzers and L...

By Richard A. Dubniczky, Krisztofer Zoltán Horvát...

Scaling Person Identification with AI Annotations

Scaling Person Identification with AI Annotations

Using AI to Model Human-like Diversity in ReID Systems

Securing Smart Contracts Against Numerical Vulnerabilities

Securing Smart Contracts Against Numerical Vulnerabilities

LLM-Enhanced Detection of Mathematical Flaws in Blockchain Applications

Enhancing Object Re-ID with Text Intelligence

Enhancing Object Re-ID with Text Intelligence

A novel text-integrated approach to multi-modal object recognition

Vulnerability Detection: From Formal Verification to Large L...

Vulnerability Detection: From Formal Verification to Large L...

By Norbert Tihanyi, Tamas Bisztray...

Leveraging LLM Hallucinations for Rust Security

Leveraging LLM Hallucinations for Rust Security

Novel approach to detect vulnerabilities in safety-focused Rust code

Falcon: Revolutionizing Remote Sensing with AI

Falcon: Revolutionizing Remote Sensing with AI

A foundation model that transforms how we analyze satellite imagery

Unlocking Assembly Code Comprehension with AI

Unlocking Assembly Code Comprehension with AI

A new approach to making assembly code accessible through LLMs

AI-Powered Highway Emergency Response

AI-Powered Highway Emergency Response

Integrating LLMs into Traffic Incident Management

Enhancing LLMs for Code Security

Enhancing LLMs for Code Security

Using Bridging Predicates to Fix Static Analysis Alerts

Foundation Models for IoT Event Detection

Foundation Models for IoT Event Detection

Advancing CPS-IoT security through advanced event reasoning

360° Action Detection for Mission-Critical Training

360° Action Detection for Mission-Critical Training

AI-powered video analysis for enhanced security training and debriefing

AI-Powered Travel Safety

AI-Powered Travel Safety

Personalized Safety Advice Through Retrieval-Augmented LLMs

Decoding the Blockchain's Black Box

Decoding the Blockchain's Black Box

Automating Comments for Smart Contracts Without Source Code

Mapping Android Threats with MITRE ATT&CK

Mapping Android Threats with MITRE ATT&CK

Enhanced malware intelligence through TTP analysis

LLMs as Privacy Policy Analyzers

LLMs as Privacy Policy Analyzers

Automating legal document analysis with AI

Advancing Speaker Verification Security

Advancing Speaker Verification Security

Enhancing biometric authentication with adversarial training techniques

AI-Powered Secure Code Review

AI-Powered Secure Code Review

Revolutionizing DevSecOps with GitHub-Integrated Vulnerability Detection

AI Security Threat Assessment

AI Security Threat Assessment

Evaluating LLM Agents' Ability to Exploit Web Vulnerabilities

Bridging C to Rust: Smarter Migration

Bridging C to Rust: Smarter Migration

Using program analysis and LLMs for safer, more maintainable translations

VulnSage: Smart Vulnerability Detection

VulnSage: Smart Vulnerability Detection

Using LLMs for Zero-Shot Code Security Analysis

AI-Enhanced Credit Default Prediction

AI-Enhanced Credit Default Prediction

How ChatGPT refines loan assessments for better risk analysis

Leveraging LLMs for Advanced Threat Detection

Leveraging LLMs for Advanced Threat Detection

A semantic-augmented approach to identify APTs through provenance analysis

Leveraging LLMs for Network Security

Leveraging LLMs for Network Security

A new paradigm for intelligent threat detection

Boosting Typosquatting Detection with AI

Boosting Typosquatting Detection with AI

Using Large Language Models to Combat Sophisticated URL Deception

The LLM Reliability Gap in Cybersecurity

The LLM Reliability Gap in Cybersecurity

Evaluating LLMs for Cyber Threat Intelligence: Warning Signs Ahead

Aud-Sur: Next-Gen Audio Surveillance

Aud-Sur: Next-Gen Audio Surveillance

An AI-powered audio analysis assistant for security applications

Social Media Intelligence for Disaster Response

Social Media Intelligence for Disaster Response

Leveraging LLMs to Extract Stakeholder-Specific Crisis Insights

CyberBOT: Enhancing Cybersecurity Education with AI

CyberBOT: Enhancing Cybersecurity Education with AI

Ontology-Grounded Retrieval for Trustworthy Technical Learning

AI-Powered Threat Intelligence

AI-Powered Threat Intelligence

Using LLMs to Automate Cybersecurity Response

Harnessing LLMs for Android Malware Detection

Harnessing LLMs for Android Malware Detection

A new benchmarking framework evaluates code LLMs in cybersecurity contexts

MaLAware: AI-Powered Malware Comprehension

MaLAware: AI-Powered Malware Comprehension

Translating Complex Malware Behaviors into Human-Readable Narratives

Strategic LLM Integration for Finance

Strategic LLM Integration for Finance

A framework for responsible AI innovation in financial services

Revolutionizing Digital Forensics with AI

Revolutionizing Digital Forensics with AI

How Large Language Models Are Transforming Investigative Security

Security Vulnerabilities in Medical AI Agents

Security Vulnerabilities in Medical AI Agents

Exposing cyber attack risks in healthcare LLM applications

AI-Powered Attack Pattern Generation

AI-Powered Attack Pattern Generation

Using LLMs to enhance security testing for Industrial Control Systems

Revolutionizing Financial Risk Management with LLMs

Revolutionizing Financial Risk Management with LLMs

Real-time cross-asset monitoring for enhanced market risk assessment

AI-Powered Risk Management

AI-Powered Risk Management

Enhancing Derivatives Trading with LLM-Based Sentiment Analysis

LLMs as Financial Advisors: Proceed with Caution

LLMs as Financial Advisors: Proceed with Caution

Evaluating AI agents in high-stakes financial decision-making

Enhancing Cyber Threat Intelligence with AI

Enhancing Cyber Threat Intelligence with AI

A new human-annotated dataset for automated threat analysis

AI-Powered Security for Hardware Designs

AI-Powered Security for Hardware Designs

Leveraging LLMs to Enhance Information Flow Tracking

LLMs in Safety-Critical Applications

LLMs in Safety-Critical Applications

Evaluating Retrieval Augmented Generation for Transportation Safety

LLMs as Security Defenders

LLMs as Security Defenders

Transforming cybersecurity through advanced language models

DeepGreen: Catching Corporate Greenwashing

DeepGreen: Catching Corporate Greenwashing

AI-powered detection system for environmental claim verification

AI-Powered XSS Attack Detection

AI-Powered XSS Attack Detection

Using LLMs to outsmart sophisticated web attacks

AI-Powered Hardware Security

AI-Powered Hardware Security

How LLMs are transforming secure hardware design

LLMs for Vulnerability Classification

LLMs for Vulnerability Classification

Using AI to automate security risk scoring

Evaluating AI's Cybersecurity Expertise

Evaluating AI's Cybersecurity Expertise

A Fine-Grained Framework for Assessing LLMs in Cybersecurity

AI-Powered Knowledge Extraction for Mass-Shooting Events

AI-Powered Knowledge Extraction for Mass-Shooting Events

Leveraging LLMs to enhance investigation and policy formulation

Key Takeaways

Summary of Research on Domain-Specific Security Applications