In-depth articles on Vulnerability Tesearch and Artificial Intelligence
What if we could determine the performance of a fuzzer by just looking at its compiled source code? It turns out we can!
There is a lot of code reuse in software,
Gwen2.5 Coder is an amazing piece of LLM, lets discover what makes it so good. An hint? Synthetic Data!
Merging Graph Neural Networks with LLMs for improved Source Code Understanding! GALLa is an excellent example of how we can extend LLMs and their superior Sequence Processing capabilities with something complementary.
Because of Fuzz blockers fuzzing may stop sooner than needed, delaying vulnerability detection, in some cases even for years to come.
A collection of articles on application of AI for Vulnerability Research
Articles covering general artificial intelligence topics, techniques, and applications