AIセキュリティポータルbot

Jolt Atlas: Verifiable Inference via Lookup Arguments in Zero Knowledge

Authors: Wyatt Benno, Alberto Centelles, Antoine Douchet, Khalil Gibran | Published: 2026-02-19
Secure Arithmetic Computation
Machine Learning Technology
Watermark

What Breaks Embodied AI Security:LLM Vulnerabilities, CPS Flaws,or Something Else?

Authors: Boyang Ma, Hechuan Guo, Peizhuo Lv, Minghui Xu, Xuelong Dai, YeChao Zhang, Yijun Yang, Yue Zhang | Published: 2026-02-19
Indirect Prompt Injection
セキュリティ課題
Prompt Injection

Privacy-Preserving Mechanisms Enable Cheap Verifiable Inference of LLMs

Authors: Arka Pal, Louai Zahran, William Gvozdjak, Akilesh Potti, Micah Goldblum | Published: 2026-02-19
Privacy Risk Management
Differential Privacy
Defense Method

Fail-Closed Alignment for Large Language Models

Authors: Zachary Coalson, Beth Sohler, Aiden Gabriel, Sanghyun Hong | Published: 2026-02-19
Prompt Injection
Robustness Evaluation
Defense Method

Sequential Membership Inference Attacks

Authors: Thomas Michel, Debabrota Basu, Emilie Kaufmann | Published: 2026-02-18
Privacy Risk Management
Membership Inference
Defense Method

Recursive language models for jailbreak detection: a procedural defense for tool-augmented agents

Authors: Doron Shavit | Published: 2026-02-18
Large Language Model
Analysis of Detection Methods
評価メトリクス

Phase-Based Bit Commitment Protocol

Authors: Janis Nötzel, Anshul Singhal, Peter van Loock | Published: 2026-02-18
Data Protection
Physical layer security
Quantum Information and Quantum Computing

Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification

Authors: Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Akond Ashfaque Ur Rahman, Md Rayhanur Rahman | Published: 2026-02-18
LLM Performance Evaluation
Indirect Prompt Injection
Prompt Injection

A Content-Based Framework for Cybersecurity Refusal Decisions in Large Language Models

Authors: Meirav Segal, Noa Linder, Omer Antverg, Gil Gekker, Tomer Fichman, Omri Bodenheimer, Edan Maor, Omer Nevo | Published: 2026-02-17
Prompt Injection
Threat Model
Defense Method

SecCodeBench-V2 Technical Report

Authors: Longfei Chen, Ji Zhao, Lanxiao Cui, Tong Su, Xingbo Pan, Ziyang Li, Yongxing Wu, Qijiang Cao, Qiyao Cai, Jing Zhang, Yuandong Ni, Junyao He, Zeyu Zhang, Chao Ge, Xuhuai Lu, Zeyu Gao, Yuxin Cui, Weisen Chen, Yuxuan Peng, Shengping Wang, Qi Li, Yukai Huang, Yukun Liu, Tuo Zhou, Terry Yue Zhuo, Junyang Lin, Chao Zhang | Published: 2026-02-17
Test Case Generation
Vulnerability Mitigation Technique
評価メトリクス