<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sec4AI4Sec project</title>
	<atom:link href="https://www.sec4ai4sec-project.eu/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.sec4ai4sec-project.eu/</link>
	<description>Cybersecurity for AI-Augmented Systems</description>
	<lastBuildDate>Wed, 29 Apr 2026 10:21:09 +0000</lastBuildDate>
	<language>it-IT</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.5</generator>

<image>
	<url>https://www.sec4ai4sec-project.eu/wp-content/uploads/2024/02/cropped-logo-1-32x32.png</url>
	<title>Sec4AI4Sec project</title>
	<link>https://www.sec4ai4sec-project.eu/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Sec4AI4Sec Tutorial on Experimental Design Presented at ICSE and FSE</title>
		<link>https://www.sec4ai4sec-project.eu/sec4ai4sec-tutorial-on-experimental-design-presented-at-icse-and-fse/</link>
		
		<dc:creator><![CDATA[nikita]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 10:21:07 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<guid isPermaLink="false">https://www.sec4ai4sec-project.eu/?p=4791</guid>

					<description><![CDATA[<p>Fabio Massacci and Katja Tuma recently delivered the Sec4AI4Sec tutorial on orthogonal and cross-over design with human subjects (or LLMs) at the International [&#8230;]</p>
<p>L'articolo <a href="https://www.sec4ai4sec-project.eu/sec4ai4sec-tutorial-on-experimental-design-presented-at-icse-and-fse/">Sec4AI4Sec Tutorial on Experimental Design Presented at ICSE and FSE</a> proviene da <a href="https://www.sec4ai4sec-project.eu">Sec4AI4Sec project</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Paper: Evaluating and Improving the Robustness of Security Attack Detectors Generated by LLMs</title>
		<link>https://www.sec4ai4sec-project.eu/paper-evaluating-and-improving-the-robustness-of-security-attack-detectors-generated-by-llms-2/</link>
		
		<dc:creator><![CDATA[nikita]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 12:51:40 +0000</pubDate>
				<category><![CDATA[Publication]]></category>
		<category><![CDATA[paper]]></category>
		<guid isPermaLink="false">https://www.sec4ai4sec-project.eu/?p=4784</guid>

					<description><![CDATA[<p>On April 15, 2026, the paper “Evaluating and Improving the Robustness of Security Attack Detectors Generated by LLMs” was presented in Rio de [&#8230;]</p>
<p>L'articolo <a href="https://www.sec4ai4sec-project.eu/paper-evaluating-and-improving-the-robustness-of-security-attack-detectors-generated-by-llms-2/">Paper: Evaluating and Improving the Robustness of Security Attack Detectors Generated by LLMs</a> proviene da <a href="https://www.sec4ai4sec-project.eu">Sec4AI4Sec project</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Paper: Evaluating Retrieval-Augmented Generation for LLM-Based Vulnerability Detection: An Empirical Study on Real-World Java Vulnerabilities</title>
		<link>https://www.sec4ai4sec-project.eu/paper-evaluating-retrieval-augmented-generation-for-llm-based-vulnerability-detection-an-empirical-study-on-real-world-java-vulnerabilities/</link>
		
		<dc:creator><![CDATA[nikita]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 09:30:43 +0000</pubDate>
				<category><![CDATA[Publication]]></category>
		<category><![CDATA[paper]]></category>
		<guid isPermaLink="false">https://www.sec4ai4sec-project.eu/?p=4777</guid>

					<description><![CDATA[<p>Software security is becoming increasingly difficult as modern applications grow in size and complexity. Detecting vulnerabilities early before they become real threats is [&#8230;]</p>
<p>L'articolo <a href="https://www.sec4ai4sec-project.eu/paper-evaluating-retrieval-augmented-generation-for-llm-based-vulnerability-detection-an-empirical-study-on-real-world-java-vulnerabilities/">Paper: Evaluating Retrieval-Augmented Generation for LLM-Based Vulnerability Detection: An Empirical Study on Real-World Java Vulnerabilities</a> proviene da <a href="https://www.sec4ai4sec-project.eu">Sec4AI4Sec project</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Can RAG Make LLMs Better Vulnerability Detectors?</title>
		<link>https://www.sec4ai4sec-project.eu/can-rag-make-llms-better-vulnerability-detectors/</link>
		
		<dc:creator><![CDATA[nikita]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 09:13:36 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sec4ai4sec-project.eu/?p=4773</guid>

					<description><![CDATA[<p>Software security continues to be one of the most pressing challenges in modern development. As codebases grow in complexity, automating the detection of [&#8230;]</p>
<p>L'articolo <a href="https://www.sec4ai4sec-project.eu/can-rag-make-llms-better-vulnerability-detectors/">Can RAG Make LLMs Better Vulnerability Detectors?</a> proviene da <a href="https://www.sec4ai4sec-project.eu">Sec4AI4Sec project</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Paper: VulTerminator: Bringing Back Template-Based Automated Repair for Fixing Java Vulnerabilities</title>
		<link>https://www.sec4ai4sec-project.eu/paper-vulterminator-bringing-back-template-based-automated-repair-for-fixing-java-vulnerabilities/</link>
		
		<dc:creator><![CDATA[nikita]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 08:02:54 +0000</pubDate>
				<category><![CDATA[Publication]]></category>
		<category><![CDATA[paper]]></category>
		<guid isPermaLink="false">https://www.sec4ai4sec-project.eu/?p=4766</guid>

					<description><![CDATA[<p>Overview: As part of our research efforts in Automated Vulnerability Repair (AVR), we introduce VulTerminator, a novel approach that combines heuristic-based techniques with [&#8230;]</p>
<p>L'articolo <a href="https://www.sec4ai4sec-project.eu/paper-vulterminator-bringing-back-template-based-automated-repair-for-fixing-java-vulnerabilities/">Paper: VulTerminator: Bringing Back Template-Based Automated Repair for Fixing Java Vulnerabilities</a> proviene da <a href="https://www.sec4ai4sec-project.eu">Sec4AI4Sec project</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Paper: Domain-aware graph neural networks for source code vulnerability detection</title>
		<link>https://www.sec4ai4sec-project.eu/paper-domain-aware-graph-neural-networks-for-source-code-vulnerability-detection/</link>
		
		<dc:creator><![CDATA[nikita]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 17:03:53 +0000</pubDate>
				<category><![CDATA[Publication]]></category>
		<category><![CDATA[paper]]></category>
		<guid isPermaLink="false">https://www.sec4ai4sec-project.eu/?p=4757</guid>

					<description><![CDATA[<p>As software systems become more complex, detecting vulnerabilities early remains a major challenge. Traditional tools often generate too many false positives, while AI [&#8230;]</p>
<p>L'articolo <a href="https://www.sec4ai4sec-project.eu/paper-domain-aware-graph-neural-networks-for-source-code-vulnerability-detection/">Paper: Domain-aware graph neural networks for source code vulnerability detection</a> proviene da <a href="https://www.sec4ai4sec-project.eu">Sec4AI4Sec project</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>If You Can Understand It, You Can Trust It</title>
		<link>https://www.sec4ai4sec-project.eu/if-you-can-understand-it-you-can-trust-it/</link>
		
		<dc:creator><![CDATA[nikita]]></dc:creator>
		<pubDate>Mon, 23 Feb 2026 16:49:49 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<category><![CDATA[Comics]]></category>
		<guid isPermaLink="false">https://www.sec4ai4sec-project.eu/?p=4737</guid>

					<description><![CDATA[<p>The @SEC4AI4SEC initiative promotes trustworthy, transparent, and secure AI systems. As illustrated in our comic, AI decisions can sometimes appear restrictive or overly [&#8230;]</p>
<p>L'articolo <a href="https://www.sec4ai4sec-project.eu/if-you-can-understand-it-you-can-trust-it/">If You Can Understand It, You Can Trust It</a> proviene da <a href="https://www.sec4ai4sec-project.eu">Sec4AI4Sec project</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Paper: Leveraging GPT‑4 for Vulnerability‑Witnessing Unit Test Generation</title>
		<link>https://www.sec4ai4sec-project.eu/paper-leveraging-gpt%e2%80%914-for-vulnerability%e2%80%91witnessing-unit-test-generation/</link>
		
		<dc:creator><![CDATA[nikita]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 11:27:42 +0000</pubDate>
				<category><![CDATA[Publication]]></category>
		<category><![CDATA[paper]]></category>
		<guid isPermaLink="false">https://www.sec4ai4sec-project.eu/?p=4723</guid>

					<description><![CDATA[<p>Creating effective unit tests that expose known software vulnerabilities is a critical yet time‑consuming step in secure software development. Manual test creation requires [&#8230;]</p>
<p>L'articolo <a href="https://www.sec4ai4sec-project.eu/paper-leveraging-gpt%e2%80%914-for-vulnerability%e2%80%91witnessing-unit-test-generation/">Paper: Leveraging GPT‑4 for Vulnerability‑Witnessing Unit Test Generation</a> proviene da <a href="https://www.sec4ai4sec-project.eu">Sec4AI4Sec project</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Paper: σ-zero: Gradient-based Optimization of ℓ0-norm Adversarial Examples</title>
		<link>https://www.sec4ai4sec-project.eu/paper-%cf%83-zero-gradient-based-optimization-of-%e2%84%930-norm-adversarial-examples/</link>
		
		<dc:creator><![CDATA[nikita]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 11:07:37 +0000</pubDate>
				<category><![CDATA[Publication]]></category>
		<category><![CDATA[paper]]></category>
		<guid isPermaLink="false">https://www.sec4ai4sec-project.eu/?p=4706</guid>

					<description><![CDATA[<p>Generating adversarial examples — small perturbations to inputs that cause machine learning models to misclassify — is a central task in evaluating and [&#8230;]</p>
<p>L'articolo <a href="https://www.sec4ai4sec-project.eu/paper-%cf%83-zero-gradient-based-optimization-of-%e2%84%930-norm-adversarial-examples/">Paper: σ-zero: Gradient-based Optimization of ℓ0-norm Adversarial Examples</a> proviene da <a href="https://www.sec4ai4sec-project.eu">Sec4AI4Sec project</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Paper: AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples</title>
		<link>https://www.sec4ai4sec-project.eu/paper-attackbench-evaluating-gradient-based-attacks-for-adversarial-examples/</link>
		
		<dc:creator><![CDATA[nikita]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 11:03:31 +0000</pubDate>
				<category><![CDATA[Publication]]></category>
		<category><![CDATA[paper]]></category>
		<guid isPermaLink="false">https://www.sec4ai4sec-project.eu/?p=4699</guid>

					<description><![CDATA[<p>Evaluating machine learning model robustness against adversarial examples often relies on gradient‑based attacks. However, existing research typically compares these attacks under inconsistent experimental [&#8230;]</p>
<p>L'articolo <a href="https://www.sec4ai4sec-project.eu/paper-attackbench-evaluating-gradient-based-attacks-for-adversarial-examples/">Paper: AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples</a> proviene da <a href="https://www.sec4ai4sec-project.eu">Sec4AI4Sec project</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
