An LLM Agent-based Framework for Whaling Countermeasures Authors: Daisuke Miyamoto, Takuji Iimura, Narushige Michishita | Published: 2026-01-21 Indirect Prompt InjectionEmail Securityリスクシナリオ生成 2026.01.21 2026.01.23 Literature Database
Constructing Multi-label Hierarchical Classification Models for MITRE ATT&CK Text Tagging Authors: Andrew Crossman, Jonah Dodd, Viralam Ramamurthy Chaithanya Kumar, Riyaz Mohammed, Andrew R. Plummer, Chandra Sekharudu, Deepak Warrier, Mohammad Yekrangian | Published: 2026-01-21 Threat Actor SupportWatermarking TechnologyHierarchical Classification Methods 2026.01.21 2026.01.23 Literature Database
An Empirical Study on Remote Code Execution in Machine Learning Model Hosting Ecosystems Authors: Mohammed Latif Siddiq, Tanzim Hossain Romel, Natalie Sekerak, Beatrice Casey, Joanna C. S. Santos | Published: 2026-01-20 Security AssuranceData-Driven Vulnerability AssessmentModel Extraction Attack 2026.01.20 2026.01.22 Literature Database
PAC-Private Responses with Adversarial Composition Authors: Xiaochen Zhu, Mayuri Sridhar, Srinivas Devadas | Published: 2026-01-20 Trigger DetectionPrivacy ProtectionDifferential Privacy 2026.01.20 2026.01.22 Literature Database
VirtualCrime: Evaluating Criminal Potential of Large Language Models via Sandbox Simulation Authors: Yilin Tang, Yu Wang, Lanlan Qiu, Wenchang Gao, Yunfei Ma, Baicheng Chen, Tianxing He | Published: 2026-01-20 Indirect Prompt InjectionRisk Assessment犯罪シミュレーション 2026.01.20 2026.01.22 Literature Database
HardSecBench: Benchmarking the Security Awareness of LLMs for Hardware Code Generation Authors: Qirui Chen, Jingxian Shuai, Shuangwu Chen, Shenghao Ye, Zijian Wen, Xufei Su, Jie Jin, Jiangming Li, Jun Chen, Xiaobin Tan, Jian Yang | Published: 2026-01-20 コード生成手法Security AssurancePrompt leaking 2026.01.20 2026.01.22 Literature Database
PINA: Prompt Injection Attack against Navigation Agents Authors: Jiani Liu, Yixin He, Lanlan Fan, Qidi Zhong, Yushi Cheng, Meng Zhang, Yanjiao Chen, Wenyuan Xu | Published: 2026-01-20 Indirect Prompt InjectionPerformance EvaluationAdversarial attack 2026.01.20 2026.01.22 Literature Database
Automatic Adjustment of HPA Parameters and Attack Prevention in Kubernetes Using Random Forests Authors: Hanlin Zhou, Huah Yong Chan, Jingfei Ni, Mengchun Wu, Qing Deng | Published: 2026-01-20 Performance Evaluation攻撃トラフィック管理機械学習応用 2026.01.20 2026.01.22 Literature Database
Be Your Own Red Teamer: Safety Alignment via Self-Play and Reflective Experience Replay Authors: Hao Wang, Yanting Wang, Hao Li, Rui Li, Lei Sha | Published: 2026-01-15 Prompt InjectionAdversarial Attack AnalysisSelf-Learning Method 2026.01.15 2026.01.17 Literature Database
LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15 RAGPoisoning attack on RAGPrivacy Protection 2026.01.15 2026.01.17 Literature Database