When Secure Isn’t: Assessing the Security of Machine Learning Model Sharing Authors: Gabriele Digregorio, Marco Di Gennaro, Stefano Zanero, Stefano Longari, Michele Carminati | Published: 2025-09-08 Software SecurityModel Extraction AttackDetection of Model Extraction Attacks 2025.09.08 2025.09.10 Literature Database
LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop? Authors: Irdin Pekaric, Philipp Zech, Tom Mattson | Published: 2025-09-08 人間とAIの協力実験設定Expert Opinion Collection 2025.09.08 2025.09.10 Literature Database
Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem Authors: Shuli Zhao, Qinsheng Hou, Zihan Zhan, Yanhao Wang, Yuchong Xie, Yu Guo, Libo Chen, Shenghong Li, Zhi Xue | Published: 2025-09-08 Data LeakagePrivacy ManagementVulnerability Management 2025.09.08 2025.09.10 Literature Database
Contrastive Self-Supervised Network Intrusion Detection using Augmented Negative Pairs Authors: Jack Wilkie, Hanan Hindy, Christos Tachtatzis, Robert Atkinson | Published: 2025-09-08 ML-Based IDS異常検知Self-Supervised Learning 2025.09.08 2025.09.10 Literature Database
Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak Attacks? Authors: Junjie Mu, Zonghao Ying, Zhekui Fan, Zonglei Jing, Yaoyuan Zhang, Zhengmin Yu, Wenxin Zhang, Quanchen Zou, Xiangzheng Zhang | Published: 2025-09-08 Token Processing and CollectionPruning MethodPrompt Injection 2025.09.08 2025.09.10 Literature Database
Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic Shift Authors: Shuai Yuan, Zhibo Zhang, Yuxi Li, Guangdong Bai, Wang Kailong | Published: 2025-09-08 Disabling Safety Mechanisms of LLMCalculation of Output HarmfulnessAttack Detection Method 2025.09.08 2025.09.10 Literature Database
AttestLLM: Efficient Attestation Framework for Billion-scale On-device LLMs Authors: Ruisi Zhang, Yifei Zhao, Neusha Javidnia, Mengxin Zheng, Farinaz Koushanfar | Published: 2025-09-08 Security Strategy GenerationEfficiency EvaluationLarge Language Model 2025.09.08 2025.09.10 Literature Database
Exploit Tool Invocation Prompt for Tool Behavior Hijacking in LLM-Based Agentic System Authors: Yu Liu, Yuchong Xie, Mingyu Luo, Zesen Liu, Zhixiang Zhang, Kaikai Zhang, Zongjie Li, Ping Chen, Shuai Wang, Dongdong She | Published: 2025-09-06 | Updated: 2025-09-15 Prompt InjectionModel DoSAttack Evaluation 2025.09.06 2025.09.17 Literature Database
Self-adaptive Dataset Construction for Real-World Multimodal Safety Scenarios Authors: Jingen Qu, Lijun Li, Bo Zhang, Yichen Yan, Jing Shao | Published: 2025-09-04 Prompt InjectionRisk Analysis Method安全性評価手法 2025.09.04 2025.09.06 Literature Database
An Automated, Scalable Machine Learning Model Inversion Assessment Pipeline Authors: Tyler Shumaker, Jessica Carpenter, David Saranchak, Nathaniel D. Bastian | Published: 2025-09-04 Model InversionModel Extraction AttackRisk Analysis Method 2025.09.04 2025.09.06 Literature Database