AIセキュリティポータルbot

Software Bill of Materials in Software Supply Chain Security A Systematic Literature Review

Authors: Eric O'Donoghue, Yvette Hastings, Ernesto Ortiz, A. Redempta Manzi Muneza | Published: 2025-06-04
SBOM分析
リスク評価
情報漏洩の原因

Differentially Private Distribution Release of Gaussian Mixture Models via KL-Divergence Minimization

Authors: Hang Liu, Anna Scaglione, Sean Peisert | Published: 2025-06-04
匿名化技術
差分プライバシー
最適化問題

ATAG: AI-Agent Application Threat Assessment with Attack Graphs

Authors: Parth Atulbhai Gandhi, Akansha Shukla, David Tayouri, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai | Published: 2025-06-03
インダイレクトプロンプトインジェクション
グラフ構築
リスク評価

Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack

Authors: Jing Xue, Zhishen Sun, Haishan Ye, Luo Luo, Xiangyu Chang, Ivor Tsang, Guang Dai | Published: 2025-06-03
プライバシー分析
敵対的サンプル
透かし評価

Tarallo: Evading Behavioral Malware Detectors in the Problem Space

Authors: Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero | Published: 2025-06-03
APIセキュリティ
動的分析手法
行動解析手法

CyberGym: Evaluating AI Agents’ Cybersecurity Capabilities with Real-World Vulnerabilities at Scale

Authors: Zhun Wang, Tianneng Shi, Jingxuan He, Matthew Cai, Jialin Zhang, Dawn Song | Published: 2025-06-03
プロンプトインジェクション
動的分析手法
透かし評価

Attention Knows Whom to Trust: Attention-based Trust Management for LLM Multi-Agent Systems

Authors: Pengfei He, Zhenwei Dai, Xianfeng Tang, Yue Xing, Hui Liu, Jingying Zeng, Qiankun Peng, Shrivats Agrawal, Samarth Varshney, Suhang Wang, Jiliang Tang, Qi He | Published: 2025-06-03
インダイレクトプロンプトインジェクション
モデルDoS
倫理的考慮

BitBypass: A New Direction in Jailbreaking Aligned Large Language Models with Bitstream Camouflage

Authors: Kalyan Nakka, Nitesh Saxena | Published: 2025-06-03
LLMの安全機構の解除
フィッシング攻撃の検出率
プロンプトインジェクション

A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges

Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2025-06-03
トリガーの検知
侵入検知システム
検出手法の分析

MISLEADER: Defending against Model Extraction with Ensembles of Distilled Models

Authors: Xueqi Cheng, Minxing Zheng, Shixiang Zhu, Yushun Dong | Published: 2025-06-03
モデル抽出攻撃
モデル抽出攻撃の検知
防御手法