LLMs, You Can Evaluate It! Design of Multi-perspective Report Evaluation for Security Operation Centers Authors: Hiroyuki Okada, Tatsumi Oba, Naoto Yanai | Published: 2026-01-06 LLM活用Security Analysis MethodUser Experience Evaluation 2026.01.06 2026.01.08 Literature Database
LAsset: An LLM-assisted Security Asset Identification Framework for System-on-Chip (SoC) Verification Authors: Md Ajoad Hasan, Dipayan Saha, Khan Thamid Hasan, Nashmin Alam, Azim Uddin, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-01-06 LLM活用Security Analysis Method脅威モデリング自動化 2026.01.06 2026.01.08 Literature Database
Quantum AI for Cybersecurity: A hybrid Quantum-Classical models for attack path analysis Authors: Jessica A. Sciammarelli, Waqas Ahmed | Published: 2026-01-05 Security Analysis MethodData PreprocessingQuantum Machine Learning 2026.01.05 2026.01.07 Literature Database
Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation Authors: Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan, Asadullah Abdullah Khan, Saad Said Alqahtani | Published: 2025-12-29 LLM活用Security Analysis Method脆弱性優先順位付け 2025.12.29 2025.12.31 Literature Database
Securing the AI Supply Chain: What Can We Learn From Developer-Reported Security Issues and Solutions of AI Projects? Authors: The Anh Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2025-12-29 Security Analysis MethodData-Driven Vulnerability AssessmentPrompt leaking 2025.12.29 2025.12.31 Literature Database
Assessing the Software Security Comprehension of Large Language Models Authors: Mohammed Latif Siddiq, Natalie Sekerak, Antonio Karam, Maria Leal, Arvin Islam-Gomes, Joanna C. S. Santos | Published: 2025-12-24 Indirect Prompt InjectionSecurity Analysis Method脆弱性優先順位付け 2025.12.24 2025.12.26 Literature Database
Optimistic TEE-Rollups: A Hybrid Architecture for Scalable and Verifiable Generative AI Inference on Blockchain Authors: Aaron Chan, Alex Ding, Frank Chen, Alan Wu, Bruce Zhang, Arther Tian | Published: 2025-12-23 Security Analysis MethodBlockchain TechnologyDiscussion on Protocol Vulnerabilities and Attack Scenarios 2025.12.23 2025.12.25 Literature Database
Fault Injection Attacks on Machine Learning-based Quantum Computer Readout Error Correction Authors: Anthony Etim, Jakub Szefer | Published: 2025-12-23 Security Analysis MethodSignal ProcessingVulnerability Analysis 2025.12.23 2025.12.25 Literature Database
PACEbench: A Framework for Evaluating Practical AI Cyber-Exploitation Capabilities Authors: Zicheng Liu, Lige Huang, Jie Zhang, Dongrui Liu, Yuan Tian, Jing Shao | Published: 2025-10-13 Security Analysis MethodLarge Language ModelDefense Mechanism 2025.10.13 2025.10.15 Literature Database
TypePilot: Leveraging the Scala Type System for Secure LLM-generated Code Authors: Alexander Sternfeld, Andrei Kucharavy, Ljiljana Dolamic | Published: 2025-10-13 Indirect Prompt InjectionSecurity Analysis MethodPrompt leaking 2025.10.13 2025.10.15 Literature Database