Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23 Poisoning attack on RAGデータ毒性Vulnerability Analysis 2026.02.23 2026.02.25 Literature Database
Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments Authors: Kunal Mukherjee | Published: 2026-02-23 LLM Performance EvaluationPrompt leakingVulnerability Analysis 2026.02.23 2026.02.25 Literature Database
QRS: A Rule-Synthesizing Neuro-Symbolic Triad for Autonomous Vulnerability Discovery Authors: George Tsigkourakos, Constantinos Patsakis | Published: 2026-02-10 データ流出に関する分析手法Vulnerability Analysis脆弱性検出手法 2026.02.10 2026.02.12 Literature Database
Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks Authors: Hayfa Dhabhi, Kashyap Thimmaraju | Published: 2026-02-10 Indirect Prompt InjectionPrompt InjectionVulnerability Analysis 2026.02.10 2026.02.12 Literature Database
Fault Injection Attacks on Machine Learning-based Quantum Computer Readout Error Correction Authors: Anthony Etim, Jakub Szefer | Published: 2025-12-23 Security Analysis MethodSignal ProcessingVulnerability Analysis 2025.12.23 2025.12.25 Literature Database
On the Effectiveness of Instruction-Tuning Local LLMs for Identifying Software Vulnerabilities Authors: Sangryu Park, Gihyuk Ko, Homook Cho | Published: 2025-12-23 Prompt InjectionLarge Language ModelVulnerability Analysis 2025.12.23 2025.12.25 Literature Database
Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28 RAGTCP Connection CharacteristicsVulnerability Analysis 2025.10.28 2025.10.30 Literature Database
VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities Authors: Weizhe Wang, Wei Ma, Qiang Hu, Yao Zhang, Jianfei Sun, Bin Wu, Yang Liu, Guangquan Xu, Lingxiao Jiang | Published: 2025-09-03 Prompt InjectionLarge Language ModelVulnerability Analysis 2025.09.03 2025.09.05 Literature Database
AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28 Poisoning attack on RAGIndirect Prompt InjectionVulnerability Analysis 2025.08.28 2025.09.01 Literature Database
Multi-Agent Penetration Testing AI for the Web Authors: Isaac David, Arthur Gervais | Published: 2025-08-28 Indirect Prompt InjectionSecurity TestingVulnerability Analysis 2025.08.28 2025.09.01 Literature Database