Whispers in the Machine: Confidentiality in Agentic Systems Authors: Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer | Published: 2024-02-10 | Updated: 2025-08-12 Security AssurancePrompt Injection攻撃戦略分析 2024.02.10 2025.08.14 Literature Database
Secure Software Development: Issues and Challenges Authors: Sam Wen Ping, Jeffrey Cheok Jun Wah, Lee Wen Jie, Jeremy Bong Yong Han, Saira Muzafar | Published: 2023-11-18 Security AssuranceSoftware SecurityResource Scarcity Issues 2023.11.18 2025.05.28 Literature Database
Attesting Distributional Properties of Training Data for Machine Learning Authors: Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan | Published: 2023-08-18 | Updated: 2024-04-09 Security AssuranceModel Performance EvaluationRobustness Evaluation 2023.08.18 2025.05.28 Literature Database
Diff-CAPTCHA: An Image-based CAPTCHA with Security Enhanced by Denoising Diffusion Model Authors: Ran Jiang, Sanfeng Zhang, Linfeng Liu, Yanbing Peng | Published: 2023-08-16 Security AssuranceAttack EvaluationWatermark Robustness 2023.08.16 2025.05.28 Literature Database
DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection Authors: Sudipta Paria, Aritra Dasgupta, Swarup Bhunia | Published: 2023-08-14 LLM SecuritySecurity AssuranceVulnerability Mitigation Technique 2023.08.14 2025.05.28 Literature Database
S3C2 Summit 2023-06: Government Secure Supply Chain Summit Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams | Published: 2023-08-13 SBOM PracticesCybersecuritySecurity Assurance 2023.08.13 2025.05.28 Literature Database
Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08 Algorithm DesignSecurity AssuranceData Obfuscation 2023.07.08 2025.05.28 Literature Database
Jailbroken: How Does LLM Safety Training Fail? Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05 Security AssurancePrompt InjectionAdversarial Attack Methods 2023.07.05 2025.05.28 Literature Database
Vulnerable Source Code Detection using SonarCloud Code Analysis Authors: Alifia Puspaningrum, Muhammad Anis Al Hilmi, Darsih, Muhamad Mustamiin, Maulana Ilham Ginanjar | Published: 2023-07-05 Code Change AnalysisSystem ObservabilitySecurity Assurance 2023.07.05 2025.05.28 Literature Database
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04 Security AssuranceData LeakageMembership Inference 2023.07.04 2025.05.28 Literature Database