Transformers for Secure Hardware Systems: Applications, Challenges, and Outlook Authors: Banafsheh Saber Latibari, Najmeh Nazari, Avesta Sasan, Houman Homayoun, Pratik Satam, Soheil Salehi, Hossein Sayadi | Published: 2025-05-28 Security AnalysisHardware Trojan DetectionBackdoor Detection 2025.05.28 2025.05.30 Literature Database
CyberLLMInstruct: A Pseudo-malicious Dataset Revealing Safety-performance Trade-offs in Cyber Security LLM Fine-tuning Authors: Adel ElZemity, Budi Arief, Shujun Li | Published: 2025-03-12 | Updated: 2025-09-17 Disabling Safety Mechanisms of LLMSecurity AnalysisPrompt Injection 2025.03.12 2025.09.19 Literature Database
CoreGuard: Safeguarding Foundational Capabilities of LLMs Against Model Stealing in Edge Deployment Authors: Qinfeng Li, Tianyue Luo, Xuhong Zhang, Yangfan Xie, Zhiqiang Shen, Lijun Zhang, Yier Jin, Hao Peng, Xinkui Zhao, Xianwei Zhu, Jianwei Yin | Published: 2024-10-16 | Updated: 2025-10-16 Security AnalysisData ProtectionModel DoS 2024.10.16 2025.10.18 Literature Database
Poster: Developing an O-RAN Security Test Lab Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02 WatermarkingCybersecuritySecurity Analysis 2024.09.02 2025.05.27 Literature Database
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Authors: Niklas Risse, Jing Liu, Marcel Böhme | Published: 2024-08-23 | Updated: 2025-04-23 Security AnalysisVulnerability ManagementEvaluation Method 2024.08.23 2025.05.27 Literature Database
A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality Authors: M. Mehdi Kholoosi, M. Ali Babar, Roland Croft | Published: 2024-08-01 Security AnalysisPrompt InjectionVulnerability Management 2024.08.01 2025.05.27 Literature Database
Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security Verification Authors: Mohammad Akyash, Hadi Mardani Kamali | Published: 2024-05-20 Security AnalysisPrompt InjectionVulnerability Management 2024.05.20 2025.05.27 Literature Database
Detecting Android Malware: From Neural Embeddings to Hands-On Validation with BERTroid Authors: Meryam Chaieb, Mostafa Anouar Ghorab, Mohamed Aymen Saied | Published: 2024-05-06 | Updated: 2024-08-12 Security AnalysisMalware ClassificationModel Performance Evaluation 2024.05.06 2025.05.27 Literature Database
LLM Security Guard for Code Authors: Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari | Published: 2024-05-02 | Updated: 2024-05-03 LLM SecuritySecurity AnalysisPrompt Injection 2024.05.02 2025.05.27 Literature Database
Guardians of the Quantum GAN Authors: Archisman Ghosh, Debarshi Kundu, Avimita Chatterjee, Swaroop Ghosh | Published: 2024-04-24 | Updated: 2024-05-15 WatermarkingSecurity AnalysisQuantum Framework 2024.04.24 2025.05.27 Literature Database