Similar Items: Integrating Log-Based Security Analytics in Agile Workflows: A Real-World Experience Report
- When the Ruler is Broken: Parsing-Induced Suppression in LLM-Based Security Log Evaluation
- Heimdallr: Characterizing and Detecting LLM-Induced Security Risks in GitHub CI Workflows
- From Controlled to the Wild: Evaluation of Pentesting Agents for the Real-World
- KingsGuard: Enclave Data Protection Under Real-World TEE Vulnerabilities
- Engineering Robustness into Personal Agents with the AI Workflow Store
- From TinyGo to gc Compiler: Extending Zorya's Concolic Framework to Real-World Go Binaries