Security Assurance

Ensuring superior learning outcomes and data security for authorized learner

Authors: Jeongho Bang, Wooyeong Song, Kyujin Shin, Yong-Su Kim | Published: 2025-01-01
Security Assurance
Improvement of Learning

SoK: Verifiable Cross-Silo FL

Authors: Aleksei Korneev, Jan Ramon | Published: 2024-10-11
Security Assurance
Cryptography

The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems

Authors: Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou | Published: 2024-09-30 | Updated: 2025-08-13
Security Assurance
Prompt leaking
攻撃戦略分析

FullCert: Deterministic End-to-End Certification for Training and Inference of Neural Networks

Authors: Tobias Lorenz, Marta Kwiatkowska, Mario Fritz | Published: 2024-06-17 | Updated: 2024-09-11
Security Assurance
Convergence Analysis
Optimization Problem

Whispers in the Machine: Confidentiality in Agentic Systems

Authors: Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer | Published: 2024-02-10 | Updated: 2025-08-12
Security Assurance
Prompt Injection
攻撃戦略分析

Secure Software Development: Issues and Challenges

Authors: Sam Wen Ping, Jeffrey Cheok Jun Wah, Lee Wen Jie, Jeremy Bong Yong Han, Saira Muzafar | Published: 2023-11-18
Security Assurance
Software Security
Resource Scarcity Issues

Attesting Distributional Properties of Training Data for Machine Learning

Authors: Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan | Published: 2023-08-18 | Updated: 2024-04-09
Security Assurance
Model Performance Evaluation
Robustness Evaluation

Diff-CAPTCHA: An Image-based CAPTCHA with Security Enhanced by Denoising Diffusion Model

Authors: Ran Jiang, Sanfeng Zhang, Linfeng Liu, Yanbing Peng | Published: 2023-08-16
Security Assurance
Attack Evaluation
Watermark Robustness

DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection

Authors: Sudipta Paria, Aritra Dasgupta, Swarup Bhunia | Published: 2023-08-14
LLM Security
Security Assurance
Vulnerability Mitigation Technique

S3C2 Summit 2023-06: Government Secure Supply Chain Summit

Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams | Published: 2023-08-13
SBOM Practices
Cybersecurity
Security Assurance