Shadow in the Cache: Unveiling and Mitigating Privacy Risks of KV-cache in LLM Inference Authors: Zhifan Luo, Shuo Shao, Su Zhang, Lijing Zhou, Yuke Hu, Chenxu Zhao, Zhihao Liu, Zhan Qin | Published: 2025-08-13 Security AssuranceReconstruction AttackWatermark Design 2025.08.13 2025.08.15 Literature Database
Understanding, Implementing, and Supporting Security Assurance Cases in Safety-Critical Domains Authors: Mazen Mohamad | Published: 2025-01-08 Security AssuranceRisk ManagementWorkshop Survey 2025.01.08 2025.05.27 Literature Database
Ensuring superior learning outcomes and data security for authorized learner Authors: Jeongho Bang, Wooyeong Song, Kyujin Shin, Yong-Su Kim | Published: 2025-01-01 Security AssuranceImprovement of Learning 2025.01.01 2025.05.27 Literature Database
SoK: Verifiable Cross-Silo FL Authors: Aleksei Korneev, Jan Ramon | Published: 2024-10-11 Security AssuranceCryptography 2024.10.11 2025.05.27 Literature Database
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems Authors: Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou | Published: 2024-09-30 | Updated: 2025-08-13 Security AssurancePrompt leaking攻撃戦略分析 2024.09.30 2025.08.15 Literature Database
FullCert: Deterministic End-to-End Certification for Training and Inference of Neural Networks Authors: Tobias Lorenz, Marta Kwiatkowska, Mario Fritz | Published: 2024-06-17 | Updated: 2024-09-11 Security AssuranceConvergence AnalysisOptimization Problem 2024.06.17 2025.05.27 Literature Database
Whispers in the Machine: Confidentiality in Agentic Systems Authors: Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer | Published: 2024-02-10 | Updated: 2025-08-12 Security AssurancePrompt Injection攻撃戦略分析 2024.02.10 2025.08.14 Literature Database
Secure Software Development: Issues and Challenges Authors: Sam Wen Ping, Jeffrey Cheok Jun Wah, Lee Wen Jie, Jeremy Bong Yong Han, Saira Muzafar | Published: 2023-11-18 Security AssuranceSoftware SecurityResource Scarcity Issues 2023.11.18 2025.05.28 Literature Database
Attesting Distributional Properties of Training Data for Machine Learning Authors: Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan | Published: 2023-08-18 | Updated: 2024-04-09 Security AssuranceModel Performance EvaluationRobustness Evaluation 2023.08.18 2025.05.28 Literature Database
Diff-CAPTCHA: An Image-based CAPTCHA with Security Enhanced by Denoising Diffusion Model Authors: Ran Jiang, Sanfeng Zhang, Linfeng Liu, Yanbing Peng | Published: 2023-08-16 Security AssuranceAttack EvaluationWatermark Robustness 2023.08.16 2025.05.28 Literature Database