AIセキュリティポータルbot

TracLLM: A Generic Framework for Attributing Long Context LLMs

Authors: Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia | Published: 2025-06-04
LLMとの協力効果
RAGへのポイズニング攻撃
効率評価

Privacy and Security Threat for OpenAI GPTs

Authors: Wei Wenying, Zhao Kaifa, Xue Lei, Fan Ming | Published: 2025-06-04
LLMの安全機構の解除
プライバシー問題
防御メカニズム

Evaluating Apple Intelligence’s Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets

Authors: Mohd. Farhan Israk Soumik, Syed Mhamudul Hasan, Abdur R. Shahid | Published: 2025-06-04
テキスト分類の応用
プライバシー問題
プロンプトインジェクション

Client-Side Zero-Shot LLM Inference for Comprehensive In-Browser URL Analysis

Authors: Avihay Cohen | Published: 2025-06-04
アライメント
プロンプトインジェクション
動的分析

A Threat Intelligence Event Extraction Conceptual Model for Cyber Threat Intelligence Feeds

Authors: Jamal H. Al-Yasiri, Mohamad Fadli Bin Zolkipli, Nik Fatinah N Mohd Farid, Mohammed Alsamman, Zainab Ali Mohammed | Published: 2025-06-04
サイバー脅威
効率評価
情報抽出手法

Software Bill of Materials in Software Supply Chain Security A Systematic Literature Review

Authors: Eric O'Donoghue, Yvette Hastings, Ernesto Ortiz, A. Redempta Manzi Muneza | Published: 2025-06-04
SBOM分析
リスク評価
情報漏洩の原因

Differentially Private Distribution Release of Gaussian Mixture Models via KL-Divergence Minimization

Authors: Hang Liu, Anna Scaglione, Sean Peisert | Published: 2025-06-04
匿名化技術
差分プライバシー
最適化問題

ATAG: AI-Agent Application Threat Assessment with Attack Graphs

Authors: Parth Atulbhai Gandhi, Akansha Shukla, David Tayouri, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai | Published: 2025-06-03
インダイレクトプロンプトインジェクション
グラフ構築
リスク評価

Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack

Authors: Jing Xue, Zhishen Sun, Haishan Ye, Luo Luo, Xiangyu Chang, Ivor Tsang, Guang Dai | Published: 2025-06-03
プライバシー分析
敵対的サンプル
透かし評価

Tarallo: Evading Behavioral Malware Detectors in the Problem Space

Authors: Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero | Published: 2025-06-03
APIセキュリティ
動的分析手法
行動解析手法