Literature Database

PentestEval: Benchmarking LLM-based Penetration Testing with Modular and Stage-Level Design

Authors: Ruozhao Yang, Mingfei Cheng, Gelei Deng, Tianwei Zhang, Junjie Wang, Xiaofei Xie | Published: 2025-12-16
Indirect Prompt Injection
Prompt Injection
Vulnerability Management

IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol

Authors: Yunhao Yao, Zhiqiang Wang, Haoran Cheng, Yihang Cheng, Haohua Du, Xiang-Yang Li | Published: 2025-12-16
LLM活用
Privacy Enhancing Protocol
Framework

From Obfuscated to Obvious: A Comprehensive JavaScript Deobfuscation Tool for Security Analysis

Authors: Dongchao Zhou, Lingyun Ying, Huajun Chai, Dongbin Wang | Published: 2025-12-16
JavaScriptの難読化技術
Error Handling
評価メトリクス

A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis

Authors: Omar Abusabha, Jiyong Uhm, Tamer Abuhmed, Hyungjoon Koo | Published: 2025-12-16
XAI (Explainable AI)
セキュリティ検証手法
Vulnerability Assessment Method

SEDULity: A Proof-of-Learning Framework for Distributed and Secure Blockchains with Efficient Useful Work

Authors: Weihang Cao, Mustafa Doger, Sennur Ulukus | Published: 2025-12-15
セキュリティ検証手法
Blockchain Technology
Machine Learning

Behavior-Aware and Generalizable Defense Against Black-Box Adversarial Attacks for ML-Based IDS

Authors: Sabrine Ennaji, Elhadj Benkhelifa, Luigi Vincenzo Mancini | Published: 2025-12-15
Backdoor Attack
Anomaly Detection Method
Vulnerability Assessment Method

On the Effectiveness of Membership Inference in Targeted Data Extraction from Large Language Models

Authors: Ali Al Sahili, Ali Chehab, Razane Tajeddine | Published: 2025-12-15
Data Extraction and Analysis
Prompt leaking
評価メトリクス

Security and Detectability Analysis of Unicode Text Watermarking Methods Against Large Language Models

Authors: Malte Hellmeier | Published: 2025-12-15
セキュリティ検証手法
Digital Watermarking for Generative AI
Watermark Evaluation

Cisco Integrated AI Security and Safety Framework Report

Authors: Amy Chang, Tiffany Saade, Sanket Mendapara, Adam Swanda, Ankit Garg | Published: 2025-12-15
Indirect Prompt Injection
サイバーセキュリティの脅威
セキュリティ考慮

CTIGuardian: A Few-Shot Framework for Mitigating Privacy Leakage in Fine-Tuned LLMs

Authors: Shashie Dilhara Batan Arachchige, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Dinusha Vatsalan, Dali Kaafar | Published: 2025-12-15
Trade-off Analysis
Privacy Protection Method
Prompt leaking