A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis Authors: Omar Abusabha, Jiyong Uhm, Tamer Abuhmed, Hyungjoon Koo | Published: 2025-12-16 XAI (Explainable AI)セキュリティ検証手法Vulnerability Assessment Method 2025.12.16 2025.12.18 Literature Database
Behavior-Aware and Generalizable Defense Against Black-Box Adversarial Attacks for ML-Based IDS Authors: Sabrine Ennaji, Elhadj Benkhelifa, Luigi Vincenzo Mancini | Published: 2025-12-15 Backdoor AttackAnomaly Detection MethodVulnerability Assessment Method 2025.12.15 2025.12.17 Literature Database
FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning Authors: Khurram Khalil, Khaza Anuarul Hoque | Published: 2025-12-10 Prompt InjectionLarge Language ModelVulnerability Assessment Method 2025.12.10 2025.12.12 Literature Database
LLMs as verification oracles for Solidity Authors: Massimo Bartoletti, Enrico Lipparini, Livio Pompianu | Published: 2025-09-23 Prompt InjectionModel DoSVulnerability Assessment Method 2025.09.23 2025.09.25 Literature Database
LLM-Driven SAST-Genius: A Hybrid Static Analysis Framework for Comprehensive and Actionable Security Authors: Vaibhav Agrawal, Kiarash Ahi | Published: 2025-09-18 | Updated: 2025-09-23 Prompt InjectionVulnerability Assessment MethodStatic Analysis 2025.09.18 2025.09.25 Literature Database
What You Code Is What We Prove: Translating BLE App Logic into Formal Models with LLMs for Vulnerability Detection Authors: Biwei Yan, Yue Zhang, Minghui Xu, Runyu Pan, Jinku Li, Xiuzhen Cheng | Published: 2025-09-11 Vulnerabilities of IoT Devices形式モデルVulnerability Assessment Method 2025.09.11 2025.09.13 Literature Database
Systematic Analysis of MCP Security Authors: Yongjian Guo, Puzhuo Liu, Wanlun Ma, Zehang Deng, Xiaogang Zhu, Peng Di, Xi Xiao, Sheng Wen | Published: 2025-08-18 Prompt InjectionAttack Chain AnalysisVulnerability Assessment Method 2025.08.18 2025.08.20 Literature Database
A Large Language Model-Supported Threat Modeling Framework for Transportation Cyber-Physical Systems Authors: M Sabbir Salek, Mashrur Chowdhury, Muhaimin Bin Munir, Yuchen Cai, Mohammad Imtiaz Hasan, Jean-Michel Tine, Latifur Khan, Mizanur Rahman | Published: 2025-06-01 | Updated: 2025-07-28 Bias Detection in AI OutputPoisoning attack on RAGVulnerability Assessment Method 2025.06.01 2025.07.30 Literature Database
Unlocking User-oriented Pages: Intention-driven Black-box Scanner for Real-world Web Applications Authors: Weizhe Wang, Yao Zhang, Kaitai Liang, Guangquan Xu, Hongpeng Bai, Qingyang Yan, Xi Zheng, Bin Wu | Published: 2025-04-29 | Updated: 2025-04-30 Content Compression TechniquesUser Behavior AnalysisVulnerability Assessment Method 2025.04.29 2025.05.27 Literature Database
The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models Authors: Swaroop Dora, Deven Lunkad, Naziya Aslam, S. Venkatesan, Sandeep Kumar Shukla | Published: 2025-04-29 Indirect Prompt InjectionSecure Communication ChannelVulnerability Assessment Method 2025.04.29 2025.05.27 Literature Database