AIセキュリティポータルbot

CAM-LDS: Cyber Attack Manifestations for Automatic Interpretation of System Logs and Security Alerts

Authors: Max Landauer, Wolfgang Hotwagner, Thorina Boenke, Florian Skopik, Markus Wurzenberger | Published: 2026-03-04
Prompt Injection
Malware Classification
Attack Method

A Multi-Dimensional Quality Scoring Framework for Decentralized LLM Inference with Proof of Quality

Authors: Arther Tian, Alex Ding, Frank Chen, Simon Wu, Aaron Chan | Published: 2026-03-04
LLM Performance Evaluation
Alignment
evaluation metrics

When Safety Becomes a Vulnerability: Exploiting LLM Alignment Homogeneity for Transferable Blocking in RAG

Authors: Junchen Li, Chao Qi, Rongzheng Wang, Qizhi Chen, Liang Xu, Di Liang, Bob Simons, Shuang Liang | Published: 2026-03-04
LLM Performance Evaluation
RAG
Poisoning attack on RAG

Measuring Privacy vs. Fidelity in Synthetic Social Media Datasets

Authors: Henry Tari, Adriana Iamnitchi | Published: 2026-03-04
LLM Performance Evaluation
Data Privacy Management
Prompt leaking

Image-based Prompt Injection: Hijacking Multimodal LLMs through Visually Embedded Adversarial Instructions

Authors: Neha Nagaraja, Lan Zhang, Zhilong Wang, Bo Zhang, Pawan Patil | Published: 2026-03-04
Indirect Prompt Injection
プロンプト埋め込み手法
Visual Techniques

Gravity Falls: A Comparative Analysis of Domain-Generation Algorithm (DGA) Detection Methods for Mobile Device Spearphishing

Authors: Adam Dorian Wong, John D. Hastings | Published: 2026-03-03
フィッシング検出手法
Malware Detection

Kraken: Higher-order EM Side-Channel Attacks on DNNs in Near and Far Field

Authors: Peter Horvath, Ilia Shumailov, Lukasz Chmielewski, Lejla Batina, Yuval Yarom | Published: 2026-03-03
LLM Performance Evaluation
Model Extraction Attack

Understanding the Resource Cost of Fully Homomorphic Encryption in Quantum Federated Learning

Authors: Lukas Böhm, Arjhun Swaminathan, Anika Hannemann, Erik Buchmann | Published: 2026-03-03
Secure Aggregation
Data Privacy Management
Quantum Blockchain Technology

Extending the Formalism and Theoretical Foundations of Cryptography to AI

Authors: Federico Villa, F. Betül Durak, Tadayoshi Kohno, Tapdig Maharramli, Franziska Roesner | Published: 2026-03-03
Data Privacy Management
安全性評価
Threat Model

ZeroDayBench: Evaluating LLM Agents on Unseen Zero-Day Vulnerabilities for Cyberdefense

Authors: Nancy Lau, Louis Sloot, Jyoutir Raj, Giuseppe Marco Boscardin, Evan Harris, Dylan Bowman, Mario Brajkovski, Jaideep Chawla, Dan Zhao | Published: 2026-03-02
LLM Performance Evaluation
Indirect Prompt Injection
Vulnerability Assessment Method