AIセキュリティポータルbot

Systematic Analysis of MCP Security

Authors: Yongjian Guo, Puzhuo Liu, Wanlun Ma, Zehang Deng, Xiaogang Zhu, Peng Di, Xi Xiao, Sheng Wen | Published: 2025-08-18
Prompt Injection
Attack Chain Analysis
Vulnerability Assessment Method

MCPSecBench: A Systematic Security Benchmark and Playground for Testing Model Context Protocols

Authors: Yixuan Yang, Daoyuan Wu, Yufan Chen | Published: 2025-08-17 | Updated: 2025-10-09
Prompt leaking
Large Language Model
Defense Mechanism

CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning

Authors: Saisai Xia, Wenhao Wang, Zihao Wang, Yuhui Zhang, Yier Jin, Dan Meng, Rui Hou | Published: 2025-08-17 | Updated: 2025-11-06
Backdoor Detection
Privacy Protection
Deep Learning Method

SoK: Data Minimization in Machine Learning

Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14
RAG
Privacy Assessment
Differential Privacy

Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence

Authors: Amine Tellache, Abdelaziz Amara Korba, Amdjed Mokhtari, Horea Moldovan, Yacine Ghamri-Doudane | Published: 2025-08-14
LLM活用
RAG
Framework

A Transformer-Based Approach for DDoS Attack Detection in IoT Networks

Authors: Sandipan Dey, Payal Santosh Kate, Vatsala Upadhyay, Abhishek Vaish | Published: 2025-08-14
Data Collection
Performance Evaluation
Research Methodology

Jailbreaking Commercial Black-Box LLMs with Explicitly Harmful Prompts

Authors: Chiyu Zhang, Lu Zhou, Xiaogang Xu, Jiafei Wu, Liming Fang, Zhe Liu | Published: 2025-08-14
Social Engineering Attack
Prompt Injection
Large Language Model

Extending the OWASP Multi-Agentic System Threat Modeling Guide: Insights from Multi-Agent Security Research

Authors: Klaudia Krawiecka, Christian Schroeder de Witt | Published: 2025-08-13
Framework
マルチエージェントシステム
Consensus Formation Algorithm

Demystifying the Role of Rule-based Detection in AI Systems for Windows Malware Detection

Authors: Andrea Ponte, Luca Demetrio, Luca Oneto, Ivan Tesfai Ogbu, Battista Biggio, Fabio Roli | Published: 2025-08-13
Prompt Injection
Malware Detection Method
Imbalanced Dataset

Causal Graph Profiling via Structural Divergence for Robust Anomaly Detection in Cyber-Physical Systems

Authors: Arun Vignesh Malarkkan, Haoyue Bai, Dongjie Wang, Yanjie Fu | Published: 2025-08-13
Sensor Array Design
Framework
Dynamic Graph Processing