Login / Signup
Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs.
Trevor Dunlap
John Speed Meyers
Bradley Reaves
William Enck
Published in:
DIMVA (2024)
Keyphrases
</>
open source
access control
information security
open source software
security issues
source code
security problems
computer security
security risks
network management
cryptographic protocols
sensitive data
rfid tags
security management
security properties
security model
data security
security requirements
real world
security policies
intrusion detection
wireless sensor networks
case study