Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs.
Trevor DunlapJohn Speed MeyersBradley ReavesWilliam EnckPublished in: DIMVA (2024)
Keyphrases
- open source
- access control
- information security
- open source software
- security issues
- source code
- security problems
- computer security
- security risks
- network management
- cryptographic protocols
- sensitive data
- rfid tags
- security management
- security properties
- security model
- data security
- security requirements
- real world
- security policies
- intrusion detection
- wireless sensor networks
- case study