How well does LLM generate security tests?
Ying ZhangWenjia SongZhengjie JiDanfeng YaoNa MengPublished in: CoRR (2023)
Keyphrases
- information security
- security systems
- key management
- access control
- automatically generate
- security issues
- security problems
- data sets
- computer security
- security mechanisms
- information assurance
- cyber security
- security protocols
- security analysis
- security requirements
- security policies
- computer systems
- malware detection
- low cost
- security vulnerabilities
- genetic algorithm