DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection Authors: Sudipta Paria, Aritra Dasgupta, Swarup Bhunia | Published: 2023-08-14 LLM SecuritySecurity AssuranceVulnerability Mitigation Technique 2023.08.14 2025.05.28 Literature Database
S3C2 Summit 2023-06: Government Secure Supply Chain Summit Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams | Published: 2023-08-13 SBOM PracticesCybersecuritySecurity Assurance 2023.08.13 2025.05.28 Literature Database
Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08 Algorithm DesignSecurity AssuranceData Obfuscation 2023.07.08 2025.05.28 Literature Database
Jailbroken: How Does LLM Safety Training Fail? Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05 Security AssurancePrompt InjectionAdversarial Attack Methods 2023.07.05 2025.05.28 Literature Database
Vulnerable Source Code Detection using SonarCloud Code Analysis Authors: Alifia Puspaningrum, Muhammad Anis Al Hilmi, Darsih, Muhamad Mustamiin, Maulana Ilham Ginanjar | Published: 2023-07-05 Code Change AnalysisSystem ObservabilitySecurity Assurance 2023.07.05 2025.05.28 Literature Database
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04 Security AssuranceData LeakageMembership Inference 2023.07.04 2025.05.28 Literature Database
New intelligent defense systems to reduce the risks of Selfish Mining and Double-Spending attacks using Learning Automata Authors: Seyed Ardalan Ghoreishi, Mohammad Reza Meybodi | Published: 2023-07-02 | Updated: 2024-03-08 Algorithm DesignSecurity AssuranceReinforcement Learning Environment 2023.07.02 2025.05.28 Literature Database
Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD Authors: Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot | Published: 2023-07-01 | Updated: 2024-07-16 Security AssuranceData ObfuscationPrivacy Analysis 2023.07.01 2025.05.28 Literature Database
Large Language Models for Code: Security Hardening and Adversarial Testing Authors: Jingxuan He, Martin Vechev | Published: 2023-02-10 | Updated: 2024-08-16 Security AssurancePrompt InjectionVulnerability Analysis 2023.02.10 2025.05.28 Literature Database
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13 Security AssuranceSoftware SecurityEvaluation Method 2022.12.07 2025.05.28 Literature Database