AIセキュリティポータルbot

MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs

Authors: Lilas Alrahis, Hassan Nassar, Jonas Krautter, Dennis Gnad, Lars Bauer, Jorg Henkel, Mehdi Tahoori | Published: 2024-03-04
FPGA
Graph Neural Network
Multi-Tenancy

DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks

Authors: Yinghua Hu, Kaixin Yang, Subhajit Dutta Chowdhury, Pierluigi Nuzzo | Published: 2024-03-04
Watermarking
Watermark Robustness
Defense Method

Using LLMs for Tabletop Exercises within the Security Domain

Authors: Sam Hays, Jules White | Published: 2024-03-03
Cybersecurity
Tabletop Exercise Challenges
Prompt Injection

IoT Device Labeling Using Large Language Models

Authors: Bar Meyuhas, Anat Bremler-Barr, Tal Shapira | Published: 2024-03-03
IoT Device Identification
Data Collection
Label

Enhancing Data Provenance and Model Transparency in Federated Learning Systems — A Database Approach

Authors: Michael Gu, Ramasoumya Naraparaju, Dongfang Zhao | Published: 2024-03-03
Data Origins and Evolution
Poisoning
Federated Learning

Analysis of Privacy Leakage in Federated Large Language Models

Authors: Minh N. Vu, Truc Nguyen, Tre' R. Jeter, My T. Thai | Published: 2024-03-02
Privacy Protection Method
Poisoning
Federated Learning

A Photonic Physically Unclonable Function’s Resilience to Multiple-Valued Machine Learning Attacks

Authors: Jessie M. Henderson, Elena R. Henderson, Clayton A. Harper, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-03-02
Watermarking
Model Performance Evaluation
Machine Learning Method

Employing LLMs for Incident Response Planning and Review

Authors: Sam Hays, Jules White | Published: 2024-03-02
Incident Response Plan
Cybersecurity
Risk Management

Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach

Authors: Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu | Published: 2024-03-02
Privacy Protection Method
Poisoning
Federated Learning

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

Authors: Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li | Published: 2024-03-02
LLM Security
Prompt Injection
Attack Method