Security Analysis

Transformers for Secure Hardware Systems: Applications, Challenges, and Outlook

Authors: Banafsheh Saber Latibari, Najmeh Nazari, Avesta Sasan, Houman Homayoun, Pratik Satam, Soheil Salehi, Hossein Sayadi | Published: 2025-05-28
Security Analysis
Hardware Trojan Detection
Backdoor Detection

CyberLLMInstruct: A Pseudo-malicious Dataset Revealing Safety-performance Trade-offs in Cyber Security LLM Fine-tuning

Authors: Adel ElZemity, Budi Arief, Shujun Li | Published: 2025-03-12 | Updated: 2025-09-17
Disabling Safety Mechanisms of LLM
Security Analysis
Prompt Injection

CoreGuard: Safeguarding Foundational Capabilities of LLMs Against Model Stealing in Edge Deployment

Authors: Qinfeng Li, Tianyue Luo, Xuhong Zhang, Yangfan Xie, Zhiqiang Shen, Lijun Zhang, Yier Jin, Hao Peng, Xinkui Zhao, Xianwei Zhu, Jianwei Yin | Published: 2024-10-16 | Updated: 2025-10-16
Security Analysis
Data Protection
Model DoS

Poster: Developing an O-RAN Security Test Lab

Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02
Watermarking
Cybersecurity
Security Analysis

Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection

Authors: Niklas Risse, Jing Liu, Marcel Böhme | Published: 2024-08-23 | Updated: 2025-04-23
Security Analysis
Vulnerability Management
Evaluation Method

A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality

Authors: M. Mehdi Kholoosi, M. Ali Babar, Roland Croft | Published: 2024-08-01
Security Analysis
Prompt Injection
Vulnerability Management

Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security Verification

Authors: Mohammad Akyash, Hadi Mardani Kamali | Published: 2024-05-20
Security Analysis
Prompt Injection
Vulnerability Management

Detecting Android Malware: From Neural Embeddings to Hands-On Validation with BERTroid

Authors: Meryam Chaieb, Mostafa Anouar Ghorab, Mohamed Aymen Saied | Published: 2024-05-06 | Updated: 2024-08-12
Security Analysis
Malware Classification
Model Performance Evaluation

LLM Security Guard for Code

Authors: Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari | Published: 2024-05-02 | Updated: 2024-05-03
LLM Security
Security Analysis
Prompt Injection

Guardians of the Quantum GAN

Authors: Archisman Ghosh, Debarshi Kundu, Avimita Chatterjee, Swaroop Ghosh | Published: 2024-04-24 | Updated: 2024-05-15
Watermarking
Security Analysis
Quantum Framework