AIセキュリティポータルbot

Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection

Authors: Lei Yu, Zhirong Huang, Hang Yuan, Shiqi Cheng, Li Yang, Fengjun Zhang, Chenjie Shen, Jiajia Ma, Jingyuan Zhang, Junyi Lu, Chun Zuo | Published: 2025-06-23
スマートコントラクト脆弱性
プロンプトリーキング
大規模言語モデル

Byzantine Failures Harm the Generalization of Robust Distributed Learning Algorithms More Than Data Poisoning

Authors: Thomas Boudou, Batiste Le Bars, Nirupam Gupta, Aurélien Bellet | Published: 2025-06-22 | Updated: 2025-10-16
データセットの影響
ビザンチン耐性
ポイズニング

SAVANT: Vulnerability Detection in Application Dependencies through Semantic-Guided Reachability Analysis

Authors: Wang Lingxiang, Quanzhi Fu, Wenjia Song, Gelei Deng, Yi Liu, Dan Williams, Ying Zhang | Published: 2025-06-21 | Updated: 2025-07-24
コード変更分析
ソフトウェアセキュリティ
脆弱性分析

VReaves: Eavesdropping on Virtual Reality App Identity and Activity via Electromagnetic Side Channels

Authors: Wei Sun, Minghong Fang, Mengyuan Li | Published: 2025-06-21 | Updated: 2025-06-24
信号処理技術
実験設定
環境干渉抑制

Sharpening Kubernetes Audit Logs with Context Awareness

Authors: Matteo Franzil, Valentino Armani, Luis Augusto Dias Knob, Domenico Siracusa | Published: 2025-06-19 | Updated: 2025-10-27
ログ分析の課題
性能評価手法
監査手法

PRISON: Unmasking the Criminal Potential of Large Language Models

Authors: Xinyi Wu, Geng Hong, Pei Chen, Yueyue Chen, Xudong Pan, Min Yang | Published: 2025-06-19 | Updated: 2025-08-04
LLMの安全機構の解除
法執行回避
研究方法論

Privacy-Preserving LLM Interaction with Socratic Chain-of-Thought Reasoning and Homomorphically Encrypted Vector Databases

Authors: Yubeen Bae, Minchan Kim, Jaejin Lee, Sangbum Kim, Jaehyung Kim, Yejin Choi, Niloofar Mireshghallah | Published: 2025-06-19 | Updated: 2025-07-01
プライバシー保護
プロンプトインジェクション
大規模言語モデル

ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis

Authors: Chenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan, Yitao Zhao, Ting Liu | Published: 2025-06-18 | Updated: 2025-07-08
イベント識別
情報セキュリティ
脆弱性攻撃手法

Evaluating Large Language Models for Phishing Detection, Self-Consistency, Faithfulness, and Explainability

Authors: Shova Kuikel, Aritran Piplai, Palvi Aggarwal | Published: 2025-06-16
アライメント
プロンプトインジェクション
大規模言語モデル

Weakest Link in the Chain: Security Vulnerabilities in Advanced Reasoning Models

Authors: Arjun Krishna, Aaditya Rastogi, Erick Galinkin | Published: 2025-06-16
プロンプトインジェクション
大規模言語モデル
敵対的攻撃手法