KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs Authors: Xin Fan Guo, Albert Merono Penuela, Sergio Maffeis, Fabio Pierazzi | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures Authors: Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Muhammad Khurram Khan, Ningyu Zhang, Chaochao Chen, Meng Han | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
Decompiling Smart Contracts with a Large Language Model Authors: Isaac David, Liyi Zhou, Dawn Song, Arthur Gervais, Kaihua Qin | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty Authors: Jinwen He, Yiyang Lu, Zijin Lin, Kai Chen, Yue Zhao | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes Authors: Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk Authors: Sajal Halder, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
Amplifying Machine Learning Attacks Through Strategic Compositions Authors: Yugeng Liu, Zheng Li, Hai Huang, Michael Backes, Yang Zhang | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
Security Assessment of DeepSeek and GPT Series Models against Jailbreak Attacks Authors: Xiaodong Wu, Xiangman Li, Jianbing Ni | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? Authors: Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection Authors: Lei Yu, Zhirong Huang, Hang Yuan, Shiqi Cheng, Li Yang, Fengjun Zhang, Chenjie Shen, Jiajia Ma, Jingyuan Zhang, Junyi Lu, Chun Zuo | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database