TY - GEN
T1 - Large Language Model-enabled Vulnerability Investigation
T2 - 3rd International Conference on Intelligent Computing and Next Generation Networks, ICNGN 2024
AU - Pan, Zhoujin
AU - Liu, Jia
AU - Dai, Yifan
AU - Fan, Wenjun
N1 - Publisher Copyright:
©2024 IEEE.
PY - 2024/11/23
Y1 - 2024/11/23
N2 - In recent years, the integration of large language models (LLMs) into cybersecurity has demonstrated significant potential in enhancing vulnerability analysis. This paper provides a comprehensive review of current literature, focusing on the applications of LLMs in vulnerability discovery, exploitation, and validation. We examine various LLM-powered frameworks that have automated aspects of vulnerability analysis, reduced the time required for vulnerability identification, and improved the precision of vulnerability assessment. In addition, we discuss LLM-driven advancements in security vulnerability exploitation and validation, which facilitate more efficient and accurate mitigation. The contributions of this review include an extensive synthesis of existing studies, a proposed framework that highlights the role of LLMs across different stages of the vulnerability lifecycle, and an outline of future research directions in LLM-based cybersecurity. Our findings aim to guide researchers and practitioners in developing robust, scalable, and automated cybersecurity solutions powered by LLMs.
AB - In recent years, the integration of large language models (LLMs) into cybersecurity has demonstrated significant potential in enhancing vulnerability analysis. This paper provides a comprehensive review of current literature, focusing on the applications of LLMs in vulnerability discovery, exploitation, and validation. We examine various LLM-powered frameworks that have automated aspects of vulnerability analysis, reduced the time required for vulnerability identification, and improved the precision of vulnerability assessment. In addition, we discuss LLM-driven advancements in security vulnerability exploitation and validation, which facilitate more efficient and accurate mitigation. The contributions of this review include an extensive synthesis of existing studies, a proposed framework that highlights the role of LLMs across different stages of the vulnerability lifecycle, and an outline of future research directions in LLM-based cybersecurity. Our findings aim to guide researchers and practitioners in developing robust, scalable, and automated cybersecurity solutions powered by LLMs.
KW - Large Language Models
KW - Vulnerability Discovery
KW - Vulnerability Exploitation
KW - Vulnerability Validation
UR - http://www.scopus.com/inward/record.url?scp=86000001409&partnerID=8YFLogxK
U2 - 10.1109/ICNGN63705.2024.10871716
DO - 10.1109/ICNGN63705.2024.10871716
M3 - Conference Proceeding
AN - SCOPUS:86000001409
T3 - Proceedings of the 3rd International Conference on Intelligent Computing and Next Generation Networks, ICNGN 2024
BT - Proceedings of the 3rd International Conference on Intelligent Computing and Next Generation Networks, ICNGN 2024
A2 - Lee, Gyu Myoung
A2 - Loskot, Pavel
A2 - Yang, Qinmin
A2 - Su, Ruidan
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 23 November 2024 through 25 November 2024
ER -