AIセキュリティポータルbot

The Promptware Kill Chain: How Prompt Injections Gradually Evolved Into a Multi-Step Malware

Authors: Ben Nassi, Bruce Schneier, Oleg Brodt | Published: 2026-01-14
LLM活用
Indirect Prompt Injection
Prompt Injection

SoK: Enhancing Cryptographic Collaborative Learning with Differential Privacy

Authors: Francesco Capano, Jonas Böhler, Benjamin Weggenmann | Published: 2026-01-14
Privacy Protection
Differential Privacy
Federated Learning

SpatialJB: How Text Distribution Art Becomes the “Jailbreak Key” for LLM Guardrails

Authors: Zhiyi Mou, Jingyuan Yang, Zeheng Qian, Wangze Ni, Tianfang Xiao, Ning Liu, Chen Zhang, Zhan Qin, Kui Ren | Published: 2026-01-14
LLM活用
Prompt Injection
Large Language Model

KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation

Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14
LLM活用
RAG
Poisoning attack on RAG

A Decompilation-Driven Framework for Malware Detection with Large Language Models

Authors: Aniesh Chawla, Udbhav Prasad | Published: 2026-01-14
LLM活用
Prompt Injection
Multi-Domain Data Analysis

DNF: Dual-Layer Nested Fingerprinting for Large Language Model Intellectual Property Protection

Authors: Zhenhua Xu, Yiran Zhao, Mengting Zhong, Dezhang Kong, Changting Lin, Tong Qiao, Meng Han | Published: 2026-01-13
Fingerprinting Method
Privacy Protection
Robustness of Watermarking Techniques

Evaluating Implicit Regulatory Compliance in LLM Tool Invocation via Logic-Guided Synthesis

Authors: Da Song, Yuheng Huang, Boqi Chen, Tianshuo Cong, Randy Goebel, Lei Ma, Foutse Khomh | Published: 2026-01-13
LLM活用
Prompt Injection
Performance Evaluation

SecureCAI: Injection-Resilient LLM Assistants for Cybersecurity Operations

Authors: Mohammed Himayath Ali, Mohammed Aqib Abdullah, Mohammed Mudassir Uddin, Shahnawaz Alam | Published: 2026-01-12
Indirect Prompt Injection
Prompt Injection
Adversarial Attack Analysis

Towards Automating Blockchain Consensus Verification with IsabeLLM

Authors: Elliot Jones, William Knottenbelt | Published: 2026-01-12
LLM活用
Integration of Blockchain and FL
Formal Verification

A Protocol-Aware P4 Pipeline for MQTT Security and Anomaly Mitigation in Edge IoT Systems

Authors: Bui Ngoc Thanh Binh, Pham Hoai Luan, Le Vu Trung Duong, Vu Tuan Hai, Yasuhiko Nakashima | Published: 2026-01-12
Intrusion Detection System
Performance Evaluation
Anomaly Detection Method