all InfoSec news
How well does LLM generate security tests?. (arXiv:2310.00710v2 [cs.CR] UPDATED)
cs.CR updates on arXiv.org arxiv.org
Developers often build software on top of third-party libraries (Libs) to
improve programmer productivity and software quality. The libraries may contain
vulnerabilities exploitable by hackers to attack the applications (Apps) built
on top of them. People refer to such attacks as supply chain attacks, the
documented number of which has increased 742% in 2022. People created tools to
mitigate such attacks, by scanning the library dependencies of Apps,
identifying the usage of vulnerable library versions, and suggesting secure
alternatives to …
applications apps attack attacks build developers hackers llm may party people productivity programmer quality security software software quality supply supply chain supply chain attacks tests third third-party vulnerabilities