Literature Database

Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs

Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28
Prompt Injection
Large Language Model
Vulnerability Management

Characterizing the Sensitivity to Individual Bit Flips in Client-Side Operations of the CKKS Scheme

Authors: Matias Mazzanti, Augusto Vega, Esteban Mocskos | Published: 2025-07-28
エラー解析
Process Environment
Watermark Evaluation

Scout: Leveraging Large Language Models for Rapid Digital Evidence Discovery

Authors: Shariq Murtuza | Published: 2025-07-24
デジタル証拠
Network Traffic Analysis
Network Forensics

On Reconstructing Training Data From Bayesian Posteriors and Trained Models

Authors: George Wynne | Published: 2025-07-24
Reconstruction Attack
Adversarial Learning
Watermark Evaluation

Regression-aware Continual Learning for Android Malware Detection

Authors: Daniele Ghiani, Daniele Angioni, Giorgio Piras, Angelo Sotgiu, Luca Minnei, Srishti Gupta, Maura Pintor, Fabio Roli, Battista Biggio | Published: 2025-07-24
Security Strategy Generation
Software Security
Drift Detection Method

Information Security Based on LLM Approaches: A Review

Authors: Chang Gong, Zhongwen Li, Xiaoqi Li | Published: 2025-07-24
Network Traffic Analysis
Prompt Injection
Prompt leaking

Understanding the Supply Chain and Risks of Large Language Model Applications

Authors: Yujie Ma, Lili Quan, Xiaofei Xie, Qiang Hu, Jiongchi Yu, Yao Zhang, Sen Chen | Published: 2025-07-24
Indirect Prompt Injection
Software Security
Risk Assessment

RECALLED: An Unbounded Resource Consumption Attack on Large Vision-Language Models

Authors: Haoran Gao, Yuanhe Zhang, Zhenhong Zhou, Lei Jiang, Fanyu Meng, Yujia Xiao, Kun Wang, Yang Liu, Junlan Feng | Published: 2025-07-24
Security Strategy Generation
攻撃戦略分析
Visual Techniques

MeAJOR Corpus: A Multi-Source Dataset for Phishing Email Detection

Authors: Paulo Mendes, Eva Maia, Isabel Praça | Published: 2025-07-23 | Updated: 2025-11-06
Dataset Integration
Information Security
Deep Learning Method

Enabling Cyber Security Education through Digital Twins and Generative AI

Authors: Vita Santa Barletta, Vito Bavaro, Miriana Calvano, Antonio Curci, Antonio Piccinno, Davide Pio Posa | Published: 2025-07-23
Security Strategy Generation
攻撃戦略分析
Educational Approach