ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2306.17193
  4. Cited By
Uncovering the Limits of Machine Learning for Automatic Vulnerability
  Detection
v1v2 (latest)

Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection

USENIX Security Symposium (USENIX Security), 2023
28 June 2023
Niklas Risse
Marcel Bohme
    AAML
ArXiv (abs)PDFHTML

Papers citing "Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection"

25 / 25 papers shown
Title
VULPO: Context-Aware Vulnerability Detection via On-Policy LLM Optimization
VULPO: Context-Aware Vulnerability Detection via On-Policy LLM Optimization
Youpeng Li
Fuxun Yu
Xinda Wang
OffRL
112
0
0
14 Nov 2025
Real-VulLLM: An LLM Based Assessment Framework in the Wild
Real-VulLLM: An LLM Based Assessment Framework in the Wild
Rijha Safdar
Danyail Mateen
Syed Taha Ali
Wajahat Hussain
88
0
0
05 Oct 2025
From CVE Entries to Verifiable Exploits: An Automated Multi-Agent Framework for Reproducing CVEs
From CVE Entries to Verifiable Exploits: An Automated Multi-Agent Framework for Reproducing CVEs
Saad Ullah
Praneeth Balasubramanian
Wenbo Guo
Amanda Burnett
Hammond Pearce
Christopher Kruegel
Giovanni Vigna
Gianluca Stringhini
149
3
0
01 Sep 2025
Data and Context Matter: Towards Generalizing AI-based Software Vulnerability Detection
Data and Context Matter: Towards Generalizing AI-based Software Vulnerability Detection
Rijha Safdar
Danyail Mateen
Syed Taha Ali
M. Umer Ashfaq
Wajahat Hussain
136
1
0
14 Aug 2025
Think Broad, Act Narrow: CWE Identification with Multi-Agent Large Language Models
Think Broad, Act Narrow: CWE Identification with Multi-Agent Large Language Models
Mohammed Sayagh
Mohammad Ghafari
AAML
82
0
0
02 Aug 2025
Out of Distribution, Out of Luck: How Well Can LLMs Trained on Vulnerability Datasets Detect Top 25 CWE Weaknesses?
Out of Distribution, Out of Luck: How Well Can LLMs Trained on Vulnerability Datasets Detect Top 25 CWE Weaknesses?
Yikun Li
Ngoc Tan Bui
Ting Zhang
Martin Weyssow
Chengran Yang
...
Han Wei Ang
Frank Liauw
Eng Lieh Ouh
Lwin Khin Shar
David Lo
AAML
386
1
0
29 Jul 2025
Revisiting Pre-trained Language Models for Vulnerability Detection
Revisiting Pre-trained Language Models for Vulnerability Detection
Youpeng Li
Weiliang Qi
Xuyu Wang
Fuxun Yu
Xinda Wang
AAML
160
1
0
22 Jul 2025
Today's Cat Is Tomorrow's Dog: Accounting for Time-Based Changes in the Labels of ML Vulnerability Detection Approaches
Today's Cat Is Tomorrow's Dog: Accounting for Time-Based Changes in the Labels of ML Vulnerability Detection Approaches
Ranindya Paramitha
Yuan Feng
Fabio Massacci
MLAU
157
0
0
13 Jun 2025
A Multi-Dataset Evaluation of Models for Automated Vulnerability RepairARES (ARES), 2025
Zanis Ali Khan
Aayush Garg
Qiang Tang
275
1
0
05 Jun 2025
SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability Analysis
SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability AnalysisIEEE Symposium on Security and Privacy (S&P), 2025
Yansong Li
Paula Branco
Alexander M. Hoole
Manish Marwah
Hari Manassery Koduvely
Guy-Vincent Jourdan
Stephan Jou
ELMLRM
134
6
0
27 May 2025
Let the Trial Begin: A Mock-Court Approach to Vulnerability Detection using LLM-Based Agents
Let the Trial Begin: A Mock-Court Approach to Vulnerability Detection using LLM-Based Agents
Ratnadira Widyasari
Martin Weyssow
Ivana Clairine Irsan
Han Wei Ang
Frank Liauw
Eng Lieh Ouh
Lwin Khin Shar
Hong Jin Kang
David Lo
LLMAG
275
6
0
16 May 2025
Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation
Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver GenerationInternational Conference on Detection of intrusions and malware, and vulnerability assessment (DIMVA), 2025
Gianpietro Castiglione
Marcello Maugeri
G. Bella
114
0
0
02 May 2025
Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction
Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction
Felix Mächtle
Nils Loose
Tim Schulz
Florian Sieck
Jan-Niclas Serr
Ralf Möller
T. Eisenbarth
207
2
0
18 Apr 2025
Semantic-Preserving Transformations as Mutation Operators: A Study on Their Effectiveness in Defect Detection
Semantic-Preserving Transformations as Mutation Operators: A Study on Their Effectiveness in Defect Detection
Max Hort
Linas Vidziunas
Leon Moonen
215
1
0
30 Mar 2025
Vulnerability Detection: From Formal Verification to Large Language Models and Hybrid Approaches: A Comprehensive Overview
Norbert Tihanyi
Tamás Bisztray
M. Ferrag
Bilel Cherif
Richard A. Dubniczky
Ridhi Jain
Lucas C. Cordeiro
200
7
0
13 Mar 2025
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code RepositoriesAnnual Meeting of the Association for Computational Linguistics (ACL), 2025
Alperen Yildiz
Sin G. Teo
Yiling Lou
Yebo Feng
Chong Wang
Dinil M. Divakaran
377
12
0
05 Mar 2025
LessLeak-Bench: A First Investigation of Data Leakage in LLMs Across 83 Software Engineering Benchmarks
LessLeak-Bench: A First Investigation of Data Leakage in LLMs Across 83 Software Engineering Benchmarks
Xin Zhou
Martin Weyssow
Ratnadira Widyasari
Ting Zhang
Junda He
Yunbo Lyu
Jianming Chang
Beiqi Zhang
Dan Huang
David Lo
PILM
945
26
0
10 Feb 2025
How Should We Build A Benchmark? Revisiting 274 Code-Related Benchmarks For LLMs
How Should We Build A Benchmark? Revisiting 274 Code-Related Benchmarks For LLMs
Jialun Cao
Yuk-Kit Chan
Zixuan Ling
Wenxuan Wang
Shuqing Li
...
Pinjia He
Shuai Wang
Zibin Zheng
Michael R. Lyu
Shing-Chi Cheung
ALM
581
2
0
18 Jan 2025
Software Security Analysis in 2030 and Beyond: A Research Roadmap
Software Security Analysis in 2030 and Beyond: A Research RoadmapACM Transactions on Software Engineering and Methodology (TOSEM), 2024
Marcel Böhme
Eric Bodden
Tevfik Bultan
Cristian Cadar
Yang Liu
Giuseppe Scanniello
201
6
0
26 Sep 2024
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection
Niklas Risse
Marcel Bohme
Marcel Böhme
235
20
0
23 Aug 2024
An Empirical Study on Capability of Large Language Models in
  Understanding Code Semantics
An Empirical Study on Capability of Large Language Models in Understanding Code Semantics
Thu-Trang Nguyen
Thanh Trong Vu
H. Vo
Son Nguyen
ELM
191
7
0
04 Jul 2024
Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG
Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG
Xueying Du
Geng Zheng
Kaixin Wang
Yi Zou
Wentai Deng
...
Mingwei Liu
Bihuan Chen
Xin Peng
Tao Ma
Yiling Lou
253
76
0
17 Jun 2024
Vulnerability Detection with Code Language Models: How Far Are We?
Vulnerability Detection with Code Language Models: How Far Are We?
Yangruibo Ding
Yanjun Fu
Omniyyah Ibrahim
Chawin Sitawarin
Xinyun Chen
Basel Alomair
David Wagner
Baishakhi Ray
Yizheng Chen
AAML
229
133
0
27 Mar 2024
Evaluating Program Repair with Semantic-Preserving Transformations: A
  Naturalness Assessment
Evaluating Program Repair with Semantic-Preserving Transformations: A Naturalness Assessment
Thanh Le-Cong
Dat Nguyen
Bach Le
Toby Murray
131
1
0
19 Feb 2024
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities
  (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks
Saad Ullah
Mingji Han
Saurabh Pujar
Hammond Pearce
Ayse K. Coskun
Gianluca Stringhini
ELMLRM
221
122
0
19 Dec 2023
1