AIセキュリティポータルbot

The Steganographic Potentials of Language Models

Authors: Artem Karpov, Tinuade Adeleke, Seong Hah Cho, Natalia Perez-Campanero | Published: 2025-05-06
RAG
著者貢献
透かし

Directed Greybox Fuzzing via Large Language Model

Authors: Hanxiang Xu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-06
RAG
プロンプトインジェクション
脆弱性分析

Elevating Cyber Threat Intelligence against Disinformation Campaigns with LLM-based Concept Extraction and the FakeCTI Dataset

Authors: Domenico Cotroneo, Roberto Natella, Vittorio Orbinato | Published: 2025-05-06
AIによる出力のバイアスの検出
偽情報の検出
情報抽出手法

Bridging Expertise Gaps: The Role of LLMs in Human-AI Collaboration for Cybersecurity

Authors: Shahroz Tariq, Ronal Singh, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris | Published: 2025-05-06
LLMとの協力効果
アライメント
参加者の質問分析

An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks

Authors: Qi Qin, Xinye Cao, Guoshun Nan, Sihan Chen, Rushan Li, Li Su, Haitao Du, Qimei Cui, Pengxuan Mao, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-05-06 | Updated: 2025-05-07
RAGへのポイズニング攻撃
セキュリティ戦略生成
自己進化型フレームワーク

Towards Effective Identification of Attack Techniques in Cyber Threat Intelligence Reports using Large Language Models

Authors: Hoang Cuong Nguyen, Shahroz Tariq, Mohan Baruwal Chhetri, Bao Quoc Vo | Published: 2025-05-06
プロンプトリーキング
攻撃タイプ
攻撃の分類

Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems

Authors: Abdul Mustafa, Muhammad Talha Khan, Muhammad Azmi Umer, Zaki Masood, Chuadhry Mujeeb Ahmed | Published: 2025-05-06
攻撃タイプ
敵対的サンプル
機械学習技術

Towards a standardized methodology and dataset for evaluating LLM-based digital forensic timeline analysis

Authors: Hudan Studiawan, Frank Breitinger, Mark Scanlon | Published: 2025-05-06
LLM性能評価
大規模言語モデル
評価手法

Acoustic Side-Channel Attacks on a Computer Mouse

Authors: Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik | Published: 2025-05-05
ユーザー行動の変化
機械学習技術
音声認識システム

Unveiling the Landscape of LLM Deployment in the Wild: An Empirical Study

Authors: Xinyi Hou, Jiahao Han, Yanjie Zhao, Haoyu Wang | Published: 2025-05-05
APIセキュリティ
インダイレクトプロンプトインジェクション
プロンプトリーキング