Evaluation Method

Chain of trust: Unraveling references among Common Criteria certified products

Authors: Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas | Published: 2024-04-22 | Updated: 2024-08-19
Dependency Risk Assessment
Evaluation Method
Watermark Evaluation

JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models

Authors: Yingchaojie Feng, Zhizhang Chen, Zhining Kang, Sijia Wang, Minfeng Zhu, Wei Zhang, Wei Chen | Published: 2024-04-12
LLM Performance Evaluation
Prompt Injection
Evaluation Method

Rethinking How to Evaluate Language Model Jailbreak

Authors: Hongyu Cai, Arjun Arunasalam, Leo Y. Lin, Antonio Bianchi, Z. Berkay Celik | Published: 2024-04-09 | Updated: 2024-05-07
Prompt Injection
Classification of Malicious Actors
Evaluation Method

Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets

Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson | Published: 2024-04-08
Watermarking
Malware Classification
Evaluation Method

Contextual Chart Generation for Cyber Deception

Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba | Published: 2024-04-07
Data Preprocessing
Model Design
Evaluation Method

PoLLMgraph: Unraveling Hallucinations in Large Language Models via State Transition Dynamics

Authors: Derui Zhu, Dingfan Chen, Qing Li, Zongxiong Chen, Lei Ma, Jens Grossklags, Mario Fritz | Published: 2024-04-06
LLM Security
LLM Performance Evaluation
Evaluation Method

SSCAE — Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator

Authors: Javad Rafiei Asl, Mohammad H. Rafiei, Manar Alohaly, Daniel Takabi | Published: 2024-03-18
Dynamic Threshold Calculation
Adversarial Example
Evaluation Method

An Extensive Comparison of Static Application Security Testing Tools

Authors: Matteo Esposito, Valentina Falaschi, Davide Falessi | Published: 2024-03-14
Toolkit Comparison
Vulnerability Management
Evaluation Method

CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation

Authors: Jueon Eom, Seyeon Jeong, Taekyoung Kwon | Published: 2024-02-19
Fuzzing
Reinforcement Learning
Evaluation Method

Maatphor: Automated Variant Analysis for Prompt Injection Attacks

Authors: Ahmed Salem, Andrew Paverd, Boris Köpf | Published: 2023-12-12
LLM Security
Prompt Injection
Evaluation Method