AIセキュリティポータルbot

Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration

Authors: Francesco Greco, Giuseppe Desolda, Cesare Tucci, Andrea Esposito, Antonio Curci, Antonio Piccinno | Published: 2025-12-01
Indirect Prompt Injection
Cybersecurity
Training Method

AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data

Authors: Benjamin Blakely, Yeni Li, Akshay Dave, Derek Kultgen, Rick Vilim | Published: 2025-12-01
Cybersecurity
Anomaly Detection Method
Watermarking Technology

Demystifying Feature Engineering in Malware Analysis of API Call Sequences

Authors: Tianheng Qu, Hongsong Zhu, Limin Sun, Haining Wang, Haiqiang Fei, Zheng He, Zhi Li | Published: 2025-12-01
Cybersecurity
Dataset Generation
Feature Extraction

A Wolf in Sheep’s Clothing: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search

Authors: Rongzhe Wei, Peizhi Niu, Xinjie Shen, Tony Tu, Yifan Li, Ruihan Wu, Eli Chien, Olgica Milenkovic, Pan Li | Published: 2025-12-01
Training Method
Prompt Injection
Ethical Considerations

EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations

Authors: Xinyun Zhou, Xinfeng Li, Yinan Peng, Ming Xu, Xuanwang Zhang, Miao Yu, Yidong Wang, Xiaojun Jia, Kun Wang, Qingsong Wen, XiaoFeng Wang, Wei Dong | Published: 2025-12-01
Poisoning attack on RAG
Cybersecurity
Data Contamination Detection

Securing Large Language Models (LLMs) from Prompt Injection Attacks

Authors: Omar Farooq Khan Suri, John McCrae | Published: 2025-12-01
Indirect Prompt Injection
Cybersecurity
Effectiveness Analysis of Defense Methods

Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation

Authors: Qingyuan Fei, Xin Liu, Song Li, Shujiang Wu, Jianwei Hou, Ping Chen, Zifeng Kang | Published: 2025-12-01
Cybersecurity
Data-Driven Vulnerability Assessment
Hallucination

Benchmarking and Understanding Safety Risks in AI Character Platforms

Authors: Yiluo Wei, Peixian Zhang, Gareth Tyson | Published: 2025-12-01
キャラクターのメタデータ収集
Risk Assessment
Large Language Model

DefenSee: Dissecting Threat from Sight and Text – A Multi-View Defensive Pipeline for Multi-modal Jailbreaks

Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-12-01
Prompt Injection
Model DoS
Robustness Improvement Method

Constructing and Benchmarking: a Labeled Email Dataset for Text-Based Phishing and Spam Detection Framework

Authors: Rebeka Toth, Tamas Bisztray, Richard Dubniczky | Published: 2025-11-26
Social Engineering Attack
Dataset Integration
Prompt Injection