Literature Database

Quantifying Return on Security Controls in LLM Systems

Authors: Richard Helder Moulton, Austin O'Brien, John D. Hastings | Published: 2025-12-17
Prompt Injection
Risk Analysis Method
脆弱性検出手法

SeBERTis: A Framework for Producing Classifiers of Security-Related Issue Reports

Authors: Sogol Masoumzadeh, Yufei Li, Shane McIntosh, Dániel Varró, Lili Wei | Published: 2025-12-17
Model DoS
Performance Evaluation
Deep Learning Technology

PerProb: Indirectly Evaluating Memorization in Large Language Models

Authors: Yihan Liao, Jacky Keung, Xiaoxue Ma, Jingyu Zhang, Yicheng Sun | Published: 2025-12-16
Indirect Prompt Injection
Privacy protection framework
Prompt leaking

Reasoning-Style Poisoning of LLM Agents via Stealthy Style Transfer: Process-Level Attacks and Runtime Monitoring in RSV Space

Authors: Xingfu Zhou, Pengfei Wang | Published: 2025-12-16
Indirect Prompt Injection
スタイル操作
プロセス攻撃

Hybrid Ensemble Method for Detecting Cyber-Attacks in Water Distribution Systems Using the BATADAL Dataset

Authors: Waqas Ahmed | Published: 2025-12-16
Ensemble Learning
Feature Importance Analysis
Anomaly Detection Algorithm

PentestEval: Benchmarking LLM-based Penetration Testing with Modular and Stage-Level Design

Authors: Ruozhao Yang, Mingfei Cheng, Gelei Deng, Tianwei Zhang, Junjie Wang, Xiaofei Xie | Published: 2025-12-16
Indirect Prompt Injection
Prompt Injection
Vulnerability Management

IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol

Authors: Yunhao Yao, Zhiqiang Wang, Haoran Cheng, Yihang Cheng, Haohua Du, Xiang-Yang Li | Published: 2025-12-16
LLM活用
Privacy Enhancing Protocol
Framework

From Obfuscated to Obvious: A Comprehensive JavaScript Deobfuscation Tool for Security Analysis

Authors: Dongchao Zhou, Lingyun Ying, Huajun Chai, Dongbin Wang | Published: 2025-12-16
JavaScriptの難読化技術
Error Handling
評価メトリクス

A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis

Authors: Omar Abusabha, Jiyong Uhm, Tamer Abuhmed, Hyungjoon Koo | Published: 2025-12-16
XAI (Explainable AI)
セキュリティ検証手法
Vulnerability Assessment Method

SEDULity: A Proof-of-Learning Framework for Distributed and Secure Blockchains with Efficient Useful Work

Authors: Weihang Cao, Mustafa Doger, Sennur Ulukus | Published: 2025-12-15
セキュリティ検証手法
Blockchain Technology
Machine Learning