AIセキュリティポータルbot

InjecAgent: Benchmarking Indirect Prompt Injections in Tool-Integrated Large Language Model Agents

Authors: Qiusi Zhan, Zhixiang Liang, Zifan Ying, Daniel Kang | Published: 2024-03-05 | Updated: 2024-08-04
Indirect Prompt Injection
Taxonomy of Attacks
Vulnerability Analysis

Catch’em all: Classification of Rare, Prominent, and Novel Malware Families

Authors: Maksim E. Eren, Ryan Barron, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Rasmussen, Boian S. Alexandrov, Charles Nicholas | Published: 2024-03-04
Class Imbalance
Prompt Injection
Malware Classification

KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection

Authors: Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Hoon Wei Lim, Bryan Hooi | Published: 2024-03-04 | Updated: 2024-06-15
Phishing Detection
Brand Recognition Problem
Prompt Injection

Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks

Authors: Sayedeh Leila Noorbakhsh, Binghui Zhang, Yuan Hong, Binghui Wang | Published: 2024-03-04
Privacy Protection Method
Prompt Injection
Membership Inference

Unveiling Hidden Links Between Unseen Security Entities

Authors: Daniel Alfasi, Tal Shapira, Anat Bremler Barr | Published: 2024-03-04
Link Prediction Method
Knowledge Graph Inference
Vulnerability Management

Robustness bounds on the successful adversarial examples in probabilistic models: Implications from Gaussian processes

Authors: Hiroaki Maeshima, Akira Otsuka | Published: 2024-03-04 | Updated: 2025-03-19
Attack Method
Adversarial Example
Watermark Evaluation

MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs

Authors: Lilas Alrahis, Hassan Nassar, Jonas Krautter, Dennis Gnad, Lars Bauer, Jorg Henkel, Mehdi Tahoori | Published: 2024-03-04
FPGA
Graph Neural Network
Multi-Tenancy

DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks

Authors: Yinghua Hu, Kaixin Yang, Subhajit Dutta Chowdhury, Pierluigi Nuzzo | Published: 2024-03-04
Watermarking
Watermark Robustness
Defense Method

Using LLMs for Tabletop Exercises within the Security Domain

Authors: Sam Hays, Jules White | Published: 2024-03-03
Cybersecurity
Tabletop Exercise Challenges
Prompt Injection

IoT Device Labeling Using Large Language Models

Authors: Bar Meyuhas, Anat Bremler-Barr, Tal Shapira | Published: 2024-03-03
IoT Device Identification
Data Collection
Label