{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:08:06Z","timestamp":1772935686041,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004692","name":"Vietnam National University Ho Chi Minh City (VNU-HCM)","doi-asserted-by":"publisher","award":["NCM2025-26-01"],"award-info":[{"award-number":["NCM2025-26-01"]}],"id":[{"id":"10.13039\/501100004692","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11402114","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"5527-5534","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging LLM Agents for Autonomous Web Penetration Testing Targeting SQL Injection Vulnerability"],"prefix":"10.1109","author":[{"given":"Phong Tran","family":"Thanh","sequence":"first","affiliation":[{"name":"University of Information Technology (UIT), Vietnam National University Ho Chi Minh City (VNU-HCM),Information Security Lab,Ho Chi Minh City,Vietnam"}]},{"given":"Phuc Nguyen Le","family":"Bao","sequence":"additional","affiliation":[{"name":"University of Information Technology (UIT), Vietnam National University Ho Chi Minh City (VNU-HCM),Information Security Lab,Ho Chi Minh City,Vietnam"}]},{"given":"Trong-Nghia","family":"To","sequence":"additional","affiliation":[{"name":"University of Information Technology (UIT), Vietnam National University Ho Chi Minh City (VNU-HCM),Information Security Lab,Ho Chi Minh City,Vietnam"}]},{"given":"Van-Hau","family":"Pham","sequence":"additional","affiliation":[{"name":"University of Information Technology (UIT), Vietnam National University Ho Chi Minh City (VNU-HCM),Information Security Lab,Ho Chi Minh City,Vietnam"}]},{"given":"Phan The","family":"Duy","sequence":"additional","affiliation":[{"name":"University of Information Technology (UIT), Vietnam National University Ho Chi Minh City (VNU-HCM),Information Security Lab,Ho Chi Minh City,Vietnam"}]}],"member":"263","reference":[{"key":"ref1","article-title":"OWASP Top 10:2021","year":"2021","journal-title":"OWASP Foundation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.103731"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/app15169096"},{"key":"ref4","article-title":"Autopt: How far are we from the end2end automated web penetration testing?","author":"Wu","year":"2024","journal-title":"arXiv preprint arXiv"},{"key":"ref5","first-page":"847","article-title":"PentestGPT: Evaluating and harnessing large language models for automated penetration testing","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Deng"},{"key":"ref6","article-title":"Vulnbot: Autonomous penetration testing for a multi-agent collaborative framework","author":"Kong","year":"2025","journal-title":"arXiv preprint arXiv"},{"key":"ref7","article-title":"AutoPentest: Enhancing Vulnerability Management With Autonomous LLM Agents","author":"Henke","year":"2025","journal-title":"arXiv preprint arXiv"},{"key":"ref8","article-title":"Hacksynth: Llm agent and evaluation framework for autonomous penetration testing","author":"Muzsai","year":"2024","journal-title":"arXiv preprint arXiv"},{"key":"ref9","article-title":"BreachSeek: A Multi-Agent Automated Penetration Tester","author":"AlShehri","year":"2024","journal-title":"arXiv preprint arXiv"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3708821.3733882"},{"key":"ref11","article-title":"RedTeamLLM: an Agentic AI framework for offensive security","author":"Challita","year":"2025","journal-title":"arXiv preprint arXiv"},{"key":"ref12","article-title":"EnIGMA: Interactive Tools Substantially Assist LM Agents in Finding Security Vulnerabilities","volume-title":"Forty-second International Conference On Machine Learning","author":"Abramovich"},{"key":"ref13","article-title":"AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks","author":"Xu","year":"2024","journal-title":"arXiv preprint arXiv"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/icrito48877.2020.9197961"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3355547"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2018.80610"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11402114.pdf?arnumber=11402114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:38:20Z","timestamp":1772869100000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11402114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11402114","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}