AIセキュリティポータルbot

RLCracker: Exposing the Vulnerability of LLM Watermarks with Adaptive RL Attacks

Authors: Hanbo Huang, Yiran Zhang, Hao Zheng, Xuan Gong, Yihan Li, Lin Liu, Shiyu Liang | Published: 2025-09-25
Disabling Safety Mechanisms of LLM
Prompt Injection
Watermark Design

FlowXpert: Context-Aware Flow Embedding for Enhanced Traffic Detection in IoT Network

Authors: Chao Zha, Haolin Pan, Bing Bai, Jiangxing Wu, Ruyun Zhang | Published: 2025-09-25
トラフィック分類
Network Threat Detection
Analysis of Detection Methods

ExpIDS: A Drift-adaptable Network Intrusion Detection System With Improved Explainability

Authors: Ayush Kumar, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-09-25
XAI (Explainable AI)
Network Threat Detection
Anomaly Detection Method

Cryptographic Backdoor for Neural Networks: Boon and Bane

Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25
Trigger Detection
Backdoor Attack
Watermark Design

Can Federated Learning Safeguard Private Data in LLM Training? Vulnerabilities, Attacks, and Defense Evaluation

Authors: Wenkai Guo, Xuefeng Liu, Haolin Wang, Jianwei Niu, Shaojie Tang, Jing Yuan | Published: 2025-09-25
Privacy Protection Method
Prompt Injection
Poisoning

A Framework for Rapidly Developing and Deploying Protection Against Large Language Model Attacks

Authors: Adam Swanda, Amy Chang, Alexander Chen, Fraser Burch, Paul Kassianik, Konstantin Berlin | Published: 2025-09-25
Indirect Prompt Injection
Security Metric
Prompt Injection

RAG Security and Privacy: Formalizing the Threat Model and Attack Surface

Authors: Atousa Arzanipour, Rouzbeh Behnia, Reza Ebrahimi, Kaushik Dutta | Published: 2025-09-24
RAG
Poisoning attack on RAG
Privacy Protection Method

Investigating Security Implications of Automatically Generated Code on the Software Supply Chain

Authors: Xiaofan Li, Xing Gao | Published: 2025-09-24
Alignment
Indirect Prompt Injection
Vulnerability Research

STAF: Leveraging LLMs for Automated Attack Tree-Based Security Test Generation

Authors: Tanmay Khule, Stefan Marksteiner, Jose Alguindigue, Hannes Fuchs, Sebastian Fischmeister, Apurva Narayan | Published: 2025-09-24
セキュリティ検証手法
Test Case Generation
Model DoS

CyberSOCEval: Benchmarking LLMs Capabilities for Malware Analysis and Threat Intelligence Reasoning

Authors: Lauren Deason, Adam Bali, Ciprian Bejean, Diana Bolocan, James Crnkovich, Ioana Croitoru, Krishna Durai, Chase Midler, Calin Miron, David Molnar, Brad Moon, Bruno Ostarcevic, Alberto Peltea, Matt Rosenberg, Catalin Sandu, Arthur Saputkin, Sagar Shah, Daniel Stan, Ernest Szocs, Shengye Wan, Spencer Whitman, Sven Krasser, Joshua Saxe | Published: 2025-09-24
Security Metric
Dataset for Malware Classification
Information Leakage Analysis