Information Security

Large Language Models for Cyber Security

Authors: Raunak Somani, Aswani Kumar Cherukuri | Published: 2025-11-06
Poisoning attack on RAG
Indirect Prompt Injection
Information Security

Black-Box Guardrail Reverse-engineering Attack

Authors: Hongwei Yao, Yun Xia, Shuo Shao, Haoran Shi, Tong Qiao, Cong Wang | Published: 2025-11-06
Disabling Safety Mechanisms of LLM
Prompt leaking
Information Security

Hybrid Fuzzing with LLM-Guided Input Mutation and Semantic Feedback

Authors: Shiyin Lin | Published: 2025-11-06
Prompt Injection
Dynamic Analysis
Information Security

Measuring the Security of Mobile LLM Agents under Adversarial Prompts from Untrusted Third-Party Channels

Authors: Chenghao Du, Quanfeng Huang, Tingxuan Tang, Zihao Wang, Adwait Nadkarni, Yue Xiao | Published: 2025-10-31 | Updated: 2025-11-06
Indirect Prompt Injection
Prompt Injection
Information Security

SimKey: A Semantically Aware Key Module for Watermarking Language Models

Authors: Shingo Kodama, Haya Diwan, Lucas Rosenblatt, R. Teal Witter, Niv Cohen | Published: 2025-10-11 | Updated: 2025-11-03
Privacy Protection
Information Security
Generative Adversarial Network

MeAJOR Corpus: A Multi-Source Dataset for Phishing Email Detection

Authors: Paulo Mendes, Eva Maia, Isabel Praça | Published: 2025-07-23 | Updated: 2025-11-06
Dataset Integration
Information Security
Deep Learning Method

Thought Purity: Defense Paradigm For Chain-of-Thought Attack

Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16
Information Security
Threat modeling
Defense Method

ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis

Authors: Chenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan, Yitao Zhao, Ting Liu | Published: 2025-06-18 | Updated: 2025-07-08
Event Identification
Information Security
Vulnerability Attack Method

Quantum Computing and Cybersecurity in Accounting and Finance: Current and Future Challenges and the Opportunities for Securing Accounting and Finance Systems in the Post-Quantum World

Authors: Huma Habib Shadan, Sardar Islam | Published: 2025-06-12 | Updated: 2025-07-08
Risk Management
Information Security
量子コンピューティング

LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy

Authors: Muhammed Golec, Yaser Khamayseh, Suhib Bani Melhem, Abdulmalik Alwarafy | Published: 2025-05-24 | Updated: 2025-06-23
LLMとAPTの関係
Information Security
Research Methodology