An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks Authors: Sawera Shahid, Umara Noor, Zahid Rashid | Published: 2025-09-15 AlgorithmMalware Classification攻撃戦略分析 2025.09.15 2025.09.17 Literature Database
JPS: Jailbreak Multimodal Large Language Models with Collaborative Visual Perturbation and Textual Steering Authors: Renmiao Chen, Shiyao Cui, Xuancheng Huang, Chengwei Pan, Victor Shea-Jay Huang, QingLin Zhang, Xuan Ouyang, Zhexin Zhang, Hongning Wang, Minlie Huang | Published: 2025-08-07 Prompt InjectionInappropriate Content Generation攻撃戦略分析 2025.08.07 2025.08.09 Literature Database
RECALLED: An Unbounded Resource Consumption Attack on Large Vision-Language Models Authors: Haoran Gao, Yuanhe Zhang, Zhenhong Zhou, Lei Jiang, Fanyu Meng, Yujia Xiao, Kun Wang, Yang Liu, Junlan Feng | Published: 2025-07-24 Security Strategy Generation攻撃戦略分析Visual Techniques 2025.07.24 2025.07.26 Literature Database
Enabling Cyber Security Education through Digital Twins and Generative AI Authors: Vita Santa Barletta, Vito Bavaro, Miriana Calvano, Antonio Curci, Antonio Piccinno, Davide Pio Posa | Published: 2025-07-23 Security Strategy Generation攻撃戦略分析Educational Approach 2025.07.23 2025.07.25 Literature Database
AI Agent Smart Contract Exploit Generation Authors: Arthur Gervais, Liyi Zhou | Published: 2025-07-08 | Updated: 2025-08-07 Indirect Prompt Injection攻撃戦略分析経済的実現可能性 2025.07.08 2025.08.09 Literature Database
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs Authors: Xin Fan Guo, Albert Merono Penuela, Sergio Maffeis, Fabio Pierazzi | Published: 2025-06-24 Model Inversion攻撃戦略分析Feature Extraction 2025.06.24 2025.06.26 Literature Database
Can LLMs Hack Enterprise Networks? Autonomous Assumed Breach Penetration-Testing Active Directory Networks Authors: Andreas Happe, Jürgen Cito | Published: 2025-02-06 | Updated: 2025-09-11 Indirect Prompt InjectionPrompt Injection攻撃戦略分析 2025.02.06 2025.09.13 Literature Database
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems Authors: Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou | Published: 2024-09-30 | Updated: 2025-08-13 Security AssurancePrompt leaking攻撃戦略分析 2024.09.30 2025.08.15 Literature Database
Whispers in the Machine: Confidentiality in Agentic Systems Authors: Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer | Published: 2024-02-10 | Updated: 2025-08-12 Security AssurancePrompt Injection攻撃戦略分析 2024.02.10 2025.08.14 Literature Database