Quantifying Return on Security Controls in LLM Systems Authors: Richard Helder Moulton, Austin O'Brien, John D. Hastings | Published: 2025-12-17 Prompt InjectionRisk Analysis Method脆弱性検出手法 2025.12.17 2025.12.19 Literature Database
SeBERTis: A Framework for Producing Classifiers of Security-Related Issue Reports Authors: Sogol Masoumzadeh, Yufei Li, Shane McIntosh, Dániel Varró, Lili Wei | Published: 2025-12-17 Model DoSPerformance EvaluationDeep Learning Technology 2025.12.17 2025.12.19 Literature Database
PerProb: Indirectly Evaluating Memorization in Large Language Models Authors: Yihan Liao, Jacky Keung, Xiaoxue Ma, Jingyu Zhang, Yicheng Sun | Published: 2025-12-16 Indirect Prompt InjectionPrivacy protection frameworkPrompt leaking 2025.12.16 2025.12.18 Literature Database
Reasoning-Style Poisoning of LLM Agents via Stealthy Style Transfer: Process-Level Attacks and Runtime Monitoring in RSV Space Authors: Xingfu Zhou, Pengfei Wang | Published: 2025-12-16 Indirect Prompt Injectionスタイル操作プロセス攻撃 2025.12.16 2025.12.18 Literature Database
Hybrid Ensemble Method for Detecting Cyber-Attacks in Water Distribution Systems Using the BATADAL Dataset Authors: Waqas Ahmed | Published: 2025-12-16 Ensemble LearningFeature Importance AnalysisAnomaly Detection Algorithm 2025.12.16 2025.12.18 Literature Database
PentestEval: Benchmarking LLM-based Penetration Testing with Modular and Stage-Level Design Authors: Ruozhao Yang, Mingfei Cheng, Gelei Deng, Tianwei Zhang, Junjie Wang, Xiaofei Xie | Published: 2025-12-16 Indirect Prompt InjectionPrompt InjectionVulnerability Management 2025.12.16 2025.12.18 Literature Database
IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol Authors: Yunhao Yao, Zhiqiang Wang, Haoran Cheng, Yihang Cheng, Haohua Du, Xiang-Yang Li | Published: 2025-12-16 LLM活用Privacy Enhancing ProtocolFramework 2025.12.16 2025.12.18 Literature Database
From Obfuscated to Obvious: A Comprehensive JavaScript Deobfuscation Tool for Security Analysis Authors: Dongchao Zhou, Lingyun Ying, Huajun Chai, Dongbin Wang | Published: 2025-12-16 JavaScriptの難読化技術Error Handling評価メトリクス 2025.12.16 2025.12.18 Literature Database
A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis Authors: Omar Abusabha, Jiyong Uhm, Tamer Abuhmed, Hyungjoon Koo | Published: 2025-12-16 XAI (Explainable AI)セキュリティ検証手法Vulnerability Assessment Method 2025.12.16 2025.12.18 Literature Database
SEDULity: A Proof-of-Learning Framework for Distributed and Secure Blockchains with Efficient Useful Work Authors: Weihang Cao, Mustafa Doger, Sennur Ulukus | Published: 2025-12-15 セキュリティ検証手法Blockchain TechnologyMachine Learning 2025.12.15 2025.12.17 Literature Database