[HTML][HTML] A survey on large language model (llm) security and privacy: The good, the bad, and the ugly

Y Yao, J Duan, K Xu, Y Cai, Z Sun, Y Zhang - High-Confidence Computing, 2024 - Elsevier
Abstract Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized
natural language understanding and generation. They possess deep language …

[PDF][PDF] Large language model guided protocol fuzzing

R Meng, M Mirchev, M Böhme… - Proceedings of the …, 2024 - ndss-symposium.org
How to find security flaws in a protocol implementation without a machine-readable
specification of the protocol? Facing the internet, protocol implementations are particularly …

Large language models based fuzzing techniques: A survey

L Huang, P Zhao, H Chen, L Ma - arXiv preprint arXiv:2402.00350, 2024 - arxiv.org
In the modern era where software plays a pivotal role, software security and vulnerability
analysis have become essential for software development. Fuzzing test, as an efficient …

Generative AI and Large Language Models for Cyber Security: All Insights You Need

MA Ferrag, F Alwahedi, A Battah, B Cherif… - arXiv preprint arXiv …, 2024 - arxiv.org
This paper provides a comprehensive review of the future of cybersecurity through
Generative AI and Large Language Models (LLMs). We explore LLM applications across …

Stateful black-box fuzzing for encryption protocols and its application in IPsec

J Guo, C Gu, X Chen, X Zhang, K Tian, J Li - Computer Networks, 2024 - Elsevier
Owing to the rapid development of information security technology, the security analysis of
encryption protocols has received widespread attention. In this paper, we propose a stateful …

A Framework of High-Speed Network Protocol Fuzzing Based on Shared Memory

J Fu, S Xiong, N Wang, R Ren, A Zhou… - … on Dependable and …, 2023 - ieeexplore.ieee.org
In recent years, security test of network protocols based on fuzzing has been attracting more
and more attentions. This is very challenging compared with the stateless software fuzzing …

CatchFuzz: Reliable active anti-fuzzing techniques against coverage-guided fuzzer

HY Kim, DH Lee - Computers & Security, 2024 - Elsevier
Fuzzing techniques that can automatically detect software vulnerabilities are used widely
today. However, attackers also abuse these fuzzing techniques to find software …

[PDF][PDF] Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls

Q Wang, J Chen, Z Jiang, R Guo, X Liu… - … IEEE Symposium on …, 2024 - jianjunchen.com
Web Application Firewalls (WAFs) are a crucial line of defense against web-based attacks.
However, an emerging threat comes from protocol-level evasion vulnerabilities, in which …

A Survey of Protocol Fuzzing

X Zhang, C Zhang, X Li, Z Du, Y Li, Y Zheng… - arXiv preprint arXiv …, 2024 - arxiv.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

A Survey of Network Protocol Fuzzing: Model, Techniques and Directions

S Jiang, Y Zhang, J Li, H Yu, L Luo, G Sun - arXiv preprint arXiv …, 2024 - arxiv.org
As one of the most successful and effective software testing techniques in recent years, fuzz
testing has uncovered numerous bugs and vulnerabilities in modern software, including …