Model Extraction Attack

From Legacy to Standard: LLM-Assisted Transformation of Cybersecurity Playbooks into CACAO Format

Authors: Mehdi Akbari Gurabi, Lasse Nitz, Radu-Mihai Castravet, Roman Matzutt, Avikarsha Mandal, Stefan Decker | Published: 2025-08-05
Security Analysis
Text Generation Method
Model Extraction Attack

Distilled Large Language Model in Confidential Computing Environment for System-on-Chip Design

Authors: Dong Ben, Hui Feng, Qian Wang | Published: 2025-07-22
Prompt leaking
Model Extraction Attack
Factors of Performance Degradation

BarkBeetle: Stealing Decision Tree Models with Fault Injection

Authors: Qifan Wang, Jonas Sander, Minmin Jiang, Thomas Eisenbarth, David Oswald | Published: 2025-07-09
Model Extraction Attack
Adversarial attack
Feature Selection Method

Taming Data Challenges in ML-based Security Tasks: Lessons from Integrating Generative AI

Authors: Shravya Kanchi, Neal Mangaokar, Aravind Cheruvu, Sifat Muhammad Abdullah, Shirin Nilizadeh, Atul Prakash, Bimal Viswanath | Published: 2025-07-08
Data Augmentation Method
Bias
Model Extraction Attack

MISLEADER: Defending against Model Extraction with Ensembles of Distilled Models

Authors: Xueqi Cheng, Minxing Zheng, Shixiang Zhu, Yushun Dong | Published: 2025-06-03
Model Extraction Attack
Detection of Model Extraction Attacks
Defense Method

TrojanStego: Your Language Model Can Secretly Be A Steganographic Privacy Leaking Agent

Authors: Dominik Meier, Jan Philip Wahle, Paul Röttger, Terry Ruas, Bela Gipp | Published: 2025-05-26
Prompt Injection
Model Extraction Attack
Watermarking Technology

Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning

Authors: Francesco Diana, André Nusser, Chuan Xu, Giovanni Neglia | Published: 2025-05-15
Prompt leaking
Model Extraction Attack
Exploratory Attack

THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models

Authors: Yujin Huang, Zhi Zhang, Qingchuan Zhao, Xingliang Yuan, Chunyang Chen | Published: 2025-03-31
Prompt leaking
Model Protection Methods
Model Extraction Attack

Model-Guardian: Protecting against Data-Free Model Stealing Using Gradient Representations and Deceptive Predictions

Authors: Yunfei Yang, Xiaojun Chen, Yuexin Xuan, Zhendong Zhao | Published: 2025-03-23
Model Extraction Attack
Malicious Client
Defense Effectiveness Analysis

Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots

Authors: Xiaoqun Liu, Jiacheng Liang, Qiben Yan, Jiyong Jang, Sicheng Mao, Muchao Ye, Jinyuan Jia, Zhaohan Xi | Published: 2025-02-28 | Updated: 2025-04-16
Cyber Threat Intelligence
Prompt leaking
Model Extraction Attack