Vulnerability Analysis

Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains

Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23
Poisoning attack on RAG
データ毒性
Vulnerability Analysis

Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments

Authors: Kunal Mukherjee | Published: 2026-02-23
LLM Performance Evaluation
Prompt leaking
Vulnerability Analysis

QRS: A Rule-Synthesizing Neuro-Symbolic Triad for Autonomous Vulnerability Discovery

Authors: George Tsigkourakos, Constantinos Patsakis | Published: 2026-02-10
データ流出に関する分析手法
Vulnerability Analysis
脆弱性検出手法

Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks

Authors: Hayfa Dhabhi, Kashyap Thimmaraju | Published: 2026-02-10
Indirect Prompt Injection
Prompt Injection
Vulnerability Analysis

Fault Injection Attacks on Machine Learning-based Quantum Computer Readout Error Correction

Authors: Anthony Etim, Jakub Szefer | Published: 2025-12-23
Security Analysis Method
Signal Processing
Vulnerability Analysis

On the Effectiveness of Instruction-Tuning Local LLMs for Identifying Software Vulnerabilities

Authors: Sangryu Park, Gihyuk Ko, Homook Cho | Published: 2025-12-23
Prompt Injection
Large Language Model
Vulnerability Analysis

Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations

Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28
RAG
TCP Connection Characteristics
Vulnerability Analysis

VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities

Authors: Weizhe Wang, Wei Ma, Qiang Hu, Yao Zhang, Jianfei Sun, Bin Wu, Yang Liu, Guangquan Xu, Lingxiao Jiang | Published: 2025-09-03
Prompt Injection
Large Language Model
Vulnerability Analysis

AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning

Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28
Poisoning attack on RAG
Indirect Prompt Injection
Vulnerability Analysis

Multi-Agent Penetration Testing AI for the Web

Authors: Isaac David, Arthur Gervais | Published: 2025-08-28
Indirect Prompt Injection
Security Testing
Vulnerability Analysis