Extending the Formalism and Theoretical Foundations of Cryptography to AI Authors: Federico Villa, F. Betül Durak, Tadayoshi Kohno, Tapdig Maharramli, Franziska Roesner | Published: 2026-03-03 Data Privacy Management安全性評価Threat Model 2026.03.03 2026.03.04 Literature Database
From Secure Agentic AI to Secure Agentic Web: Challenges, Threats, and Future Directions Authors: Zhihang Deng, Jiaping Gui, Weinan Zhang | Published: 2026-03-02 Indirect Prompt Injection安全性評価Threat Model 2026.03.02 2026.03.04 Literature Database
A Content-Based Framework for Cybersecurity Refusal Decisions in Large Language Models Authors: Meirav Segal, Noa Linder, Omer Antverg, Gil Gekker, Tomer Fichman, Omri Bodenheimer, Edan Maor, Omer Nevo | Published: 2026-02-17 Prompt InjectionThreat ModelDefense Method 2026.02.17 2026.02.19 Literature Database
iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor System-on-Chips Authors: Mehdi Elahi, Mohamed R. Elshamy, Abdel-Hameed Badawy, Ahmad Patooghy | Published: 2025-07-08 Hardware Trojan DetectionThreat ModelDefense Method 2025.07.08 2025.07.10 Literature Database
mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications Authors: David Monschein, Oliver P. Waldhorst | Published: 2022-10-07 Privacy Enhancing TechnologyUser Behavior AnalysisThreat Model 2022.10.07 2025.05.28 Literature Database
Threat Assessment in Machine Learning based Systems Authors: Lionel Nganyewou Tidjon, Foutse Khomh | Published: 2022-06-30 Risk ManagementAttacker Behavior AnalysisThreat Model 2022.06.30 2025.05.28 Literature Database
Architectural Backdoors in Neural Networks Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15 Adversarial LearningAdversarial attackThreat Model 2022.06.15 2025.05.28 Literature Database
Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness Authors: Jiankai Jin, Olga Ohrimenko, Benjamin I. P. Rubinstein | Published: 2022-05-20 | Updated: 2024-09-09 Robustness EvaluationAdversarial ExampleThreat Model 2022.05.20 2025.05.28 Literature Database
ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection Authors: Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin | Published: 2021-12-21 Event Trace AnalysisMembership InferenceThreat Model 2021.12.21 2025.05.28 Literature Database
Collaborative Information Sharing for ML-Based Threat Detection Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson | Published: 2021-04-23 Privacy ProtectionMachine Learning TechnologyThreat Model 2021.04.23 2025.05.28 Literature Database