AIセキュリティポータルbot

Identifying Obfuscated Code through Graph-Based Semantic Analysis of Binary Code

Authors: Roxane Cohen, Robin David, Florian Yger, Fabrice Rossi | Published: 2025-04-02
Explainability of Graph Machine Learning
Model Performance Evaluation
Machine Learning Algorithm

PiCo: Jailbreaking Multimodal Large Language Models via $\textbf{Pi}$ctorial $\textbf{Co}$de Contextualization

Authors: Aofan Liu, Lulu Tang, Ting Pan, Yuguo Yin, Bin Wang, Ao Yang | Published: 2025-04-02 | Updated: 2025-04-07
Model Performance Evaluation
Large Language Model
Watermark

On Benchmarking Code LLMs for Android Malware Analysis

Authors: Yiling He, Hongyu She, Xingzhi Qian, Xinran Zheng, Zhuo Chen, Zhan Qin, Lorenzo Cavallaro | Published: 2025-04-01 | Updated: 2025-04-23
LLM Performance Evaluation
Malware Detection Method
Research Methodology

No Free Lunch with Guardrails

Authors: Divyanshu Kumar, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2025-04-01 | Updated: 2025-04-03
Prompt Injection
Model DoS
Information Security

Output Constraints as Attack Surface: Exploiting Structured Generation to Bypass LLM Safety Mechanisms

Authors: Shuoming Zhang, Jiacheng Zhao, Ruiyuan Xu, Xiaobing Feng, Huimin Cui | Published: 2025-03-31
LLM Security
Disabling Safety Mechanisms of LLM
Prompt Injection

Get the Agents Drunk: Memory Perturbations in Autonomous Agent-based Recommender Systems

Authors: Shiyi Yang, Zhibo Hu, Chen Wang, Tong Yu, Xiwei Xu, Liming Zhu, Lina Yao | Published: 2025-03-31
LLM Security
Indirect Prompt Injection
Model DoS

ObfusQate: Unveiling the First Quantum Program Obfuscation Framework

Authors: Nilhil Bartake, See Toh Zi Jie, Carmen Wong Jiawen, Michael Kasper, Vivek Balachandran | Published: 2025-03-31
Mathematical Foundations
Quantum Circuit Obfuscation
Quantum Cryptography Technology

THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models

Authors: Yujin Huang, Zhi Zhang, Qingchuan Zhao, Xingliang Yuan, Chunyang Chen | Published: 2025-03-31
Prompt leaking
Model Protection Methods
Model Extraction Attack

Detecting Functional Bugs in Smart Contracts through LLM-Powered and Bug-Oriented Composite Analysis

Authors: Binbin Zhao, Xingshuang Lin, Yuan Tian, Saman Zonouz, Na Ruan, Jiliang Li, Raheem Beyah, Shouling Ji | Published: 2025-03-31
Indirect Prompt Injection
Smart Contract Audit
Prompt Injection

MiZero: The Shadowy Defender Against Text Style Infringements

Authors: Ziwei Zhang, Juan Wen, Wanli Peng, Zhengxian Wu, Yinghan Zhou, Yiming Xue | Published: 2025-03-30 | Updated: 2025-05-29
Prompt Injection
Intellectual Property Protection
Watermarking Technology