SOTAVerified

Vulnerability Detection

Vulnerability detection plays a crucial role in safeguarding against these threats by identifying weaknesses and potential entry points that malicious actors could exploit. Through advanced scanning techniques and penetration testing, vulnerability detection tools meticulously analyze web applications and websites for vulnerabilities such as SQL injection, cross-site scripting (XSS), and insecure authentication mechanisms.

By proactively identifying and addressing vulnerabilities, organizations can strengthen their online security posture and mitigate the risk of data breaches, financial loss, and reputational damage. Additionally, vulnerability detection empowers businesses to stay compliant with industry regulations and standards, demonstrating their commitment to safeguarding sensitive information and maintaining the trust of their customers. With the evolving threat landscape and increasingly sophisticated attack vectors, investing in robust vulnerability detection measures is paramount for staying one step ahead of cyber threats and ensuring the resilience of web-based platforms and services.

Papers

Showing 151160 of 216 papers

TitleStatusHype
Vulnerability Detection: From Formal Verification to Large Language Models and Hybrid Approaches: A Comprehensive Overview0
Vulnerability Detection in Ethereum Smart Contracts via Machine Learning: A Qualitative Analysis0
Vulnerability Detection in Smart Contracts: A Comprehensive Survey0
Vulnerability Detection Using Two-Stage Deep Learning Models0
Vulnerability Detection in C/C++ Code with Deep Learning0
VulnLLMEval: A Framework for Evaluating Large Language Models in Software Vulnerability Detection and Patching0
VulnSense: Efficient Vulnerability Detection in Ethereum Smart Contracts by Multimodal Learning with Graph Neural Network and Language Model0
Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG0
XGV-BERT: Leveraging Contextualized Language Model and Graph Neural Network for Efficient Software Vulnerability Detection0
Your Instructions Are Not Always Helpful: Assessing the Efficacy of Instruction Fine-tuning for Software Vulnerability Detection0
Show:102550
← PrevPage 16 of 22Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Reveal Model - Tested on Reveal (Training on Devign + VulScribeR 20K + Extra Cleans)F1 Score26.18Unverified
2Devign Model - Tested on Reveal (Training on Devign + VulScribeR 20K + Extra Cleans)F1 Score24.99Unverified
3Reveal Model - Tested on Bigvul (Training on Devign + VulScribeR 20K + Extra Cleans)F1 Score18.98Unverified
4Devign Model - Tested on Bigvul (Training on Devign + VulScribeR 20K + Extra Cleans)F1 Score18.51Unverified
5LineVul - Tested on Reveal (Training on Devign + VulScribeR 20K + Extra Cleans)F1 Score17.38Unverified
6LineVul - Tested on BigVul (Training on Devign + VulScribeR 20K+ Extra Cleans)F1 Score16.23Unverified
#ModelMetricClaimedVerifiedStatus
1WizardCoderAUC0.86Unverified
2ContraBERTAUC0.85Unverified