An Empirical Evaluation of LLMs for Solving Offensive Security Challenges.
Minghao ShaoBoyuan ChenSofija JancheskaBrendan Dolan-GavittSiddharth GargRamesh KarriMuhammad ShafiquePublished in: CoRR (2024)
Keyphrases
- security problems
- security issues
- lessons learned
- security and privacy issues
- security concerns
- access control
- technical challenges
- intrusion detection
- information security
- key issues
- computer security
- information technology
- security policies
- information assurance
- neural network
- intelligence community
- functional requirements
- data security
- real world
- data sets
- security management
- malware detection
- privacy preserving
- security requirements
- data mining
- empirical evaluation