[HTML][HTML] A survey on large language model (llm) security and privacy: The good, the bad, and the ugly

Y Yao, J Duan, K Xu, Y Cai, Z Sun, Y Zhang - High-Confidence Computing, 2024 - Elsevier
Abstract Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized
natural language understanding and generation. They possess deep language …

Applying generative machine learning to intrusion detection: A systematic mapping study and review

J Halvorsen, C Izurieta, H Cai… - ACM Computing …, 2024 - dl.acm.org
Intrusion Detection Systems (IDSs) are an essential element of modern cyber defense,
alerting users to when and where cyber-attacks occur. Machine learning can enable IDSs to …

Black-box access is insufficient for rigorous ai audits

S Casper, C Ezell, C Siegmann, N Kolt… - The 2024 ACM …, 2024 - dl.acm.org
External audits of AI systems are increasingly recognized as a key mechanism for AI
governance. The effectiveness of an audit, however, depends on the degree of access …

Large language models in cybersecurity: State-of-the-art

FN Motlagh, M Hajizadeh, M Majd, P Najafi… - arXiv preprint arXiv …, 2024 - arxiv.org
The rise of Large Language Models (LLMs) has revolutionized our comprehension of
intelligence bringing us closer to Artificial Intelligence. Since their introduction, researchers …

Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

JH Klemmer, SA Horstmann, N Patnaik… - Proceedings of the …, 2024 - dl.acm.org
Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub
Copilot, the software industry quickly utilized these tools for software development tasks, eg …

[HTML][HTML] Large language models meet next-generation networking technologies: A review

CN Hang, PD Yu, R Morabito, CW Tan - Future Internet, 2024 - mdpi.com
The evolution of network technologies has significantly transformed global communication,
information sharing, and connectivity. Traditional networks, relying on static configurations …

Autoattacker: A large language model guided system to implement automatic cyber-attacks

J Xu, JW Stokes, G McDonald, X Bai, D Marshall… - arXiv preprint arXiv …, 2024 - arxiv.org
Large language models (LLMs) have demonstrated impressive results on natural language
tasks, and security researchers are beginning to employ them in both offensive and …

An empirical evaluation of llms for solving offensive security challenges

M Shao, B Chen, S Jancheska, B Dolan-Gavitt… - arXiv preprint arXiv …, 2024 - arxiv.org
Capture The Flag (CTF) challenges are puzzles related to computer security scenarios. With
the advent of large language models (LLMs), more and more CTF participants are using …

When llms meet cybersecurity: A systematic literature review

J Zhang, H Bu, H Wen, Y Chen, L Li, H Zhu - arXiv preprint arXiv …, 2024 - arxiv.org
The rapid advancements in large language models (LLMs) have opened new avenues
across various fields, including cybersecurity, which faces an ever-evolving threat landscape …

[HTML][HTML] A Survey on Penetration Path Planning in Automated Penetration Testing

Z Chen, F Kang, X Xiong, H Shu - Applied Sciences, 2024 - mdpi.com
Penetration Testing (PT) is an effective proactive security technique that simulates hacker
attacks to identify vulnerabilities in networks or systems. However, traditional PT relies on …