Security Assurance

DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection

Authors: Sudipta Paria, Aritra Dasgupta, Swarup Bhunia | Published: 2023-08-14
LLM Security
Security Assurance
Vulnerability Mitigation Technique

S3C2 Summit 2023-06: Government Secure Supply Chain Summit

Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams | Published: 2023-08-13
SBOM Practices
Cybersecurity
Security Assurance

Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy

Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08
Algorithm Design
Security Assurance
Data Obfuscation

Jailbroken: How Does LLM Safety Training Fail?

Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05
Security Assurance
Prompt Injection
Adversarial Attack Methods

Vulnerable Source Code Detection using SonarCloud Code Analysis

Authors: Alifia Puspaningrum, Muhammad Anis Al Hilmi, Darsih, Muhamad Mustamiin, Maulana Ilham Ginanjar | Published: 2023-07-05
Code Change Analysis
System Observability
Security Assurance

Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction

Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04
Security Assurance
Data Leakage
Membership Inference

New intelligent defense systems to reduce the risks of Selfish Mining and Double-Spending attacks using Learning Automata

Authors: Seyed Ardalan Ghoreishi, Mohammad Reza Meybodi | Published: 2023-07-02 | Updated: 2024-03-08
Algorithm Design
Security Assurance
Reinforcement Learning Environment

Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD

Authors: Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot | Published: 2023-07-01 | Updated: 2024-07-16
Security Assurance
Data Obfuscation
Privacy Analysis

Large Language Models for Code: Security Hardening and Adversarial Testing

Authors: Jingxuan He, Martin Vechev | Published: 2023-02-10 | Updated: 2024-08-16
Security Assurance
Prompt Injection
Vulnerability Analysis

RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection

Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13
Security Assurance
Software Security
Evaluation Method