AIセキュリティポータルbot

Threat Modelling using Domain-Adapted Language Models: Empirical Evaluation and Insights

Authors: Saba Pourhanifeh, AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2026-05-11
Prompt Injection
Prompt leaking
Taxonomy of Attacks

LLMs for Secure Hardware Design and Related Problems: Opportunities and Challenges

Authors: Johann Knechtel, Ozgur Sinanoglu, Ramesh Karri | Published: 2026-05-11
Prompt Injection
Vulnerability Analysis
Design Optimization Methods

Re-Triggering Safeguards within LLMs for Jailbreak Detection

Authors: Zheng Lin, Zhenxing Niu, Haoxuan Ji, Yuzhe Huang, Haichang Gao | Published: 2026-05-11
Prompt Injection
Model Robustness
Large Language Model

Guaranteed Jailbreaking Defense via Disrupt-and-Rectify Smoothing

Authors: Zheng Lin, Zhenxing Niu, Haoxuan Ji, Haichang Gao | Published: 2026-05-11
Disabling Safety Mechanisms of LLM
Prompt Injection
Model Robustness

When Prompts Become Payloads: A Framework for Mitigating SQL Injection Attacks in Large Language Model-Driven Applications

Authors: Farzad Nourmohammadzadeh Motlagh, Mehrdad Hajizadeh, Mehryar Majd, Pejman Najafi, Feng Cheng, Christoph Meinel | Published: 2026-05-11
Indirect Prompt Injection
Prompt validation
Vulnerability Analysis

Benchmarking Safety Risks of Knowledge-Intensive Reasoning under Malicious Knowledge Editing

Authors: Qinghua Mao, Xi Lin, Jinze Gu, Jun Wu, Siyuan Li, Yuliang Chen | Published: 2026-05-11
Prompt leaking
Risk Analysis Method
Knowledge Embedding Algorithm

Usability as a Weapon: Attacking the Safety of LLM-Based Code Generation via Usability Requirements

Authors: Yue Li, Xiao Li, Hao Wu, Yue Zhang, Yechao Zhang, Yating Liu, Fengyuan Xu, Sheng Zhong | Published: 2026-05-11
Disabling Safety Mechanisms of LLM
セキュリティとユーザビリティのトレードオフ
Attack Evaluation

Sketch-based Access Control: A Multimodal Interface for Translating User Preferences into Intent-Aligned Policies

Authors: Kyzyl Monteiro, Sauvik Das | Published: 2026-05-11
アクセス制御モデル
Data Privacy Management
Risk Management

Probabilistic-bit Guided CDCL for SAT Solving using Ising Consensus Assumptions

Authors: Melki Bino | Published: 2026-05-05
SATソルバー
実験設定
Machine Learning Technology

Generating Proof-of-Vulnerability Tests to Help Enhance the Security of Complex Software

Authors: Shravya Kanchi, Xiaoyan Zang, Ying Zhang, Danfeng Yao, Na Meng | Published: 2026-05-05
Prompt Injection
Large Language Model
脆弱性検出手法