Security Analysis Method

PACEbench: A Framework for Evaluating Practical AI Cyber-Exploitation Capabilities

Authors: Zicheng Liu, Lige Huang, Jie Zhang, Dongrui Liu, Yuan Tian, Jing Shao | Published: 2025-10-13
Security Analysis Method
Large Language Model
Defense Mechanism

TypePilot: Leveraging the Scala Type System for Secure LLM-generated Code

Authors: Alexander Sternfeld, Andrei Kucharavy, Ljiljana Dolamic | Published: 2025-10-13
Indirect Prompt Injection
Security Analysis Method
Prompt leaking

Fewer Weights, More Problems: A Practical Attack on LLM Pruning

Authors: Kazuki Egashira, Robin Staab, Thibaud Gloaguen, Mark Vero, Martin Vechev | Published: 2025-10-09
Security Analysis Method
Prompt Injection
Defense Effectiveness Analysis

Defending against Stegomalware in Deep Neural Networks with Permutation Symmetry

Authors: Birk Torpmann-Hagen, Michael A. Riegler, Pål Halvorsen, Dag Johansen | Published: 2025-09-23 | Updated: 2025-10-15
Security Analysis Method
Certified Robustness
Information Hiding Techniques

SPARK: Static Program Analysis Reasoning and Retrieving Knowledge

Authors: Wasuwee Sodsong, Bernhard Scholz, Sanjay Chawla | Published: 2017-11-03
Security Analysis Method
Machine Learning
Knowledge Extraction Method

Semi-supervised classification for dynamic Android malware detection

Authors: Li Chen, Mingwei Zhang, Chih-Yuan Yang, Ravi Sahita | Published: 2017-04-19
Online Malware Detection
Security Analysis Method
Dataset Generation

A Security Monitoring Framework For Virtualization Based HEP Infrastructures

Authors: A. Gomez Ramirez, M. Martinez Pedreira, C. Grigoras, L. Betev, C. Lara, U. Kebschull | Published: 2017-04-16
Security Analysis Method
Dataset Analysis
Attack Detection

Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress)

Authors: Ashish Kundu, Chinmay Kundu, Karan K. Budhraja | Published: 2017-04-10
Security Analysis Method
Device Sensitivity Analysis
Vulnerability Analysis

A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization

Authors: Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu | Published: 2017-04-06 | Updated: 2017-04-08
Security Analysis Method
Program Analysis
Malware Detection Method

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be

Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin | Published: 2017-03-28
IoT Security Issues
Security Analysis Method
Attack Method