Similar Items: How Code Representation Shapes False-Positive Dynamics in Cross-Language LLM Vulnerability Detection
- MOSAIC-Bench: Measuring Compositional Vulnerability Induction in Coding Agents
- Tailored Prompts, Targeted Protection: Vulnerability-Specific LLM Analysis for Smart Contracts
- The Infinite Mutation Engine? Measuring Polymorphism in LLM-Generated Offensive Code
- Secret Stealing Attacks on Local LLM Fine-Tuning through Supply-Chain Model Code Backdoors
- SkCC: Portable and Secure Skill Compilation for Cross-Framework LLM Agents
- Resilience of IEC 61850 Sampled Values-Based Protection Systems Under Coordinated False Data Injections