A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis Authors: Omar Abusabha, Jiyong Uhm, Tamer Abuhmed, Hyungjoon Koo | Published: 2025-12-16 XAI (Explainable AI)セキュリティ検証手法Vulnerability Assessment Method 2025.12.16 2025.12.18 Literature Database
SEDULity: A Proof-of-Learning Framework for Distributed and Secure Blockchains with Efficient Useful Work Authors: Weihang Cao, Mustafa Doger, Sennur Ulukus | Published: 2025-12-15 セキュリティ検証手法Blockchain TechnologyMachine Learning 2025.12.15 2025.12.17 Literature Database
Security and Detectability Analysis of Unicode Text Watermarking Methods Against Large Language Models Authors: Malte Hellmeier | Published: 2025-12-15 セキュリティ検証手法Digital Watermarking for Generative AIWatermark Evaluation 2025.12.15 2025.12.17 Literature Database
STAF: Leveraging LLMs for Automated Attack Tree-Based Security Test Generation Authors: Tanmay Khule, Stefan Marksteiner, Jose Alguindigue, Hannes Fuchs, Sebastian Fischmeister, Apurva Narayan | Published: 2025-09-24 セキュリティ検証手法Test Case GenerationModel DoS 2025.09.24 2025.09.26 Literature Database
SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models Authors: Dipayan Saha, Shams Tarek, Hasan Al Shaikh, Khan Thamid Hasan, Pavan Sai Nalluri, Md. Ajoad Hasan, Nashmin Alam, Jingbo Zhou, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2025-06-25 セキュリティ検証手法Prompt InjectionLarge Language Model 2025.06.25 2025.06.27 Literature Database