{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:15:30Z","timestamp":1773195330835,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsacw69556.2025.00065","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:56:13Z","timestamp":1773086173000},"page":"562-568","source":"Crossref","is-referenced-by-count":0,"title":["Autopwn: Automatic Code-Reuse Exploit Generation Framework with Agentic AI"],"prefix":"10.1109","author":[{"given":"Kaleb","family":"Bacztub","sequence":"first","affiliation":[{"name":"Purdue University,Indianapolis,IN,USA"}]},{"given":"Dylan","family":"Christensen","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte,Charlotte,NC,USA"}]},{"given":"Arun","family":"Ravindran","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte,Charlotte,NC,USA"}]},{"given":"Meera","family":"Sridhar","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte,Charlotte,NC,USA"}]}],"member":"263","reference":[{"key":"ref1","year":"2025","journal-title":"angrop: A rop gadget finder and chain builder"},{"key":"ref2","year":"2024","journal-title":"Model context protocol (mcp)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2560217.2560219"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2560217.2560219"},{"key":"ref5","article-title":"A systematic literature review on automated exploit and security test generation","author":"Bui","year":"2025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3797277"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00036"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46598-2_15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274723"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2299198"},{"key":"ref11","article-title":"Iris: Llm-assisted static analysis for detecting security vulnerabilities","author":"Li","year":"2024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISPRAS53967.2021.00011"},{"key":"ref13","article-title":"Automatic exploit generation using reachability logic","author":"Rocha","year":"2022"},{"key":"ref14","author":"Salwan","year":"2025","journal-title":"Ropgadget: A gadget search tool for rop exploitation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_11"},{"key":"ref16","article-title":"A survey of automatic exploit generation techniques with a focus on code-reuse attacks","author":"Shoshitaishvili","year":"2020"},{"key":"ref17","article-title":"On the feasibility of using llms to autonomously execute multi-host network attacks","author":"Singer","year":"2025"},{"key":"ref18","article-title":"Streamlining security vulnerability triage with large language models","author":"Torkamani","year":"2025"},{"key":"ref19","article-title":"Anvil: Anomaly-based vulnerability identification without labelled training data","author":"Wang","year":"2024"},{"key":"ref20","author":"Wang","year":"2025","journal-title":"Cybergym: Evaluating ai agents\u2019 real-world cybersecurity capabilities at scale"},{"key":"ref21","article-title":"Cybench: A framework for evaluating cybersecurity capabilities and risks of language models","author":"Zhang","year":"2024"}],"event":{"name":"2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,9]]}},"container-title":["2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417955\/11417996\/11418056.pdf?arnumber=11418056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:32:26Z","timestamp":1773120746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/acsacw69556.2025.00065","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}