Can We End the Cat-and-Mouse Game? Simulating Self-Evolving Phishing Attacks with LLMs and Genetic Algorithms Authors: Seiji Sato, Tetsushi Ohki, Masakatsu Nishigaki | Published: 2025-07-29 Prompt InjectionPrompt leaking心理学理論 2025.07.29 2025.07.31 Literature Database
Cascading and Proxy Membership Inference Attacks Authors: Yuntao Du, Jiacheng Li, Yuetian Chen, Kaiyuan Zhang, Zhizhen Yuan, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-07-29 Poisoningメンバーシップ推定Evaluation Method 2025.07.29 2025.07.31 Literature Database
Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28 Prompt InjectionLarge Language ModelVulnerability Management 2025.07.28 2025.07.30 Literature Database
Characterizing the Sensitivity to Individual Bit Flips in Client-Side Operations of the CKKS Scheme Authors: Matias Mazzanti, Augusto Vega, Esteban Mocskos | Published: 2025-07-28 エラー解析Process EnvironmentWatermark Evaluation 2025.07.28 2025.07.30 Literature Database
Scout: Leveraging Large Language Models for Rapid Digital Evidence Discovery Authors: Shariq Murtuza | Published: 2025-07-24 デジタル証拠Network Traffic AnalysisNetwork Forensics 2025.07.24 2025.07.26 Literature Database
On Reconstructing Training Data From Bayesian Posteriors and Trained Models Authors: George Wynne | Published: 2025-07-24 Reconstruction AttackAdversarial LearningWatermark Evaluation 2025.07.24 2025.07.26 Literature Database
Regression-aware Continual Learning for Android Malware Detection Authors: Daniele Ghiani, Daniele Angioni, Giorgio Piras, Angelo Sotgiu, Luca Minnei, Srishti Gupta, Maura Pintor, Fabio Roli, Battista Biggio | Published: 2025-07-24 Security Strategy GenerationSoftware SecurityDrift Detection Method 2025.07.24 2025.07.26 Literature Database
Information Security Based on LLM Approaches: A Review Authors: Chang Gong, Zhongwen Li, Xiaoqi Li | Published: 2025-07-24 Network Traffic AnalysisPrompt InjectionPrompt leaking 2025.07.24 2025.07.26 Literature Database
Understanding the Supply Chain and Risks of Large Language Model Applications Authors: Yujie Ma, Lili Quan, Xiaofei Xie, Qiang Hu, Jiongchi Yu, Yao Zhang, Sen Chen | Published: 2025-07-24 Indirect Prompt InjectionSoftware SecurityRisk Assessment 2025.07.24 2025.07.26 Literature Database
RECALLED: An Unbounded Resource Consumption Attack on Large Vision-Language Models Authors: Haoran Gao, Yuanhe Zhang, Zhenhong Zhou, Lei Jiang, Fanyu Meng, Yujia Xiao, Kun Wang, Yang Liu, Junlan Feng | Published: 2025-07-24 Security Strategy Generation攻撃戦略分析Visual Techniques 2025.07.24 2025.07.26 Literature Database