PoC-Adapt: Semantic-Aware Automated Vulnerability Reproduction with LLM Multi-Agents and Reinforcement Learning-Driven Adaptive Policy

📅 2026-04-07
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Current large language model–driven approaches to automatic exploit generation are hindered by unreliable surface-level execution validation and high trial-and-error costs. This work proposes an end-to-end framework that introduces a semantic oracle mechanism to accurately discern genuine vulnerability behaviors. By integrating a multi-agent architecture—comprising root cause analysis, environment construction, exploit generation, and semantic verification—with a reinforcement learning–driven adaptive strategy, the framework substantially reduces ineffective exploration. Experimental results demonstrate a 25% improvement in validation reliability on the CWE-Bench-Java and PrimeVul benchmarks, lowers the cost of generating a single proof-of-concept (PoC) to \$0.42, and successfully reproduces 12 real-world CVE vulnerabilities within 80 attempts.
📝 Abstract
While recent approaches leverage large language models (LLMs) and multi-agent pipelines to automatically generate proof-of-concept (PoC) exploits from vulnerability reports, existing systems often suffer from two fundamental limitations: unreliable validation based on surface-level execution signals and high operational cost caused by extensive trial-and-error during exploit generation. In this paper, we present PoC-Adapt, an end-to-end framework for automated PoC generation and verification, architected upon a foundation semantic runtime validation and adaptive policy learning. At the core of PoC-Adapt is a Semantic Oracle that validates exploits by comparing structured pre- and post-execution system states, enabling reliable distinction between true vulnerability exploitation and incidental behavioral changes. To reduce exploration cost, we further introduce an Adaptive Policy Learning mechanism that learns an exploitation policy over semantic states and actions, guiding the exploit agent toward effective strategies with fewer failed attempts. PoC-Adapt is implemented as a multi-agent system comprising specialized agents for root cause analysis, environment building, exploit generation, and semantic validation, coordinated through structured feedback loops. Experimenting on the CWE-Bench-Java and PrimeVul benchmarks shows that PoC-Adapt significantly improves verification reliability by 25% and reduces exploit generation cost compared to prior LLM-based systems, highlighting the importance of semantic validation and learned action policies in automated vulnerability reproduction. Applied to the latest CVE corpus, PoC-Adapt confirmed 12 verified PoC out of 80 reproduce attempts at a cost of $0.42 per generated exploit
Problem

Research questions and friction points this paper is trying to address.

automated vulnerability reproduction
proof-of-concept generation
semantic validation
exploit reliability
operational cost
Innovation

Methods, ideas, or system contributions that make the work stand out.

Semantic Oracle
Adaptive Policy Learning
Multi-Agent LLM System
Automated Vulnerability Reproduction
Proof-of-Concept Generation
🔎 Similar Papers
No similar papers found.
Phan The Duy
Phan The Duy
University of Information Technology, VNU-HCM, Ho Chi Minh city
Cybersecurityblockchainmachine learningsoftware securitymalware detection
N
Nguyen Viet Duy
Information Security Lab, University of Information Technology, Ho Chi Minh City, Vietnam; Vietnam National University, Ho Chi Minh City, Vietnam
K
Khoa Ngo-Khanh
Information Security Lab, University of Information Technology, Ho Chi Minh City, Vietnam; Vietnam National University, Ho Chi Minh City, Vietnam
N
Nguyen Huu Quyen
Information Security Lab, University of Information Technology, Ho Chi Minh City, Vietnam; Vietnam National University, Ho Chi Minh City, Vietnam
Van-Hau Pham
Van-Hau Pham
Lecturer of Information Security, University of Information Technology - VNU
Network & application securityAI for securitysecurity of AIblockchaincloud computing