Defense Method

Model Inversion Attacks Meet Cryptographic Fuzzy Extractors

Authors: Mallika Prabhakar, Louise Xu, Prateek Saxena | Published: 2025-10-29
Membership Inference
Model Inversion
Defense Method

NetEcho: From Real-World Streaming Side-Channels to Full LLM Conversation Recovery

Authors: Zheng Zhang, Guanlong Wu, Sen Deng, Shuai Wang, Yinqian Zhang | Published: 2025-10-29
Network Traffic Analysis
Model Extraction Attack
Defense Method

An In-Depth Analysis of Cyber Attacks in Secured Platforms

Authors: Parick Ozoh, John K Omoniyi, Bukola Ibitoye | Published: 2025-10-29
Cyber Threat
Privacy Leakage
Defense Method

Rethinking Reasoning: A Survey on Reasoning-based Backdoors in LLMs

Authors: Man Hu, Xinyi Wu, Zuofeng Suo, Jinbo Feng, Linghui Meng, Yanhao Jia, Anh Tuan Luu, Shuai Zhao | Published: 2025-10-09
Prompt leaking
推論に基づくバックドア攻撃
Defense Method

DDoS Attacks in Cloud Computing: Detection and Prevention

Authors: Zain Ahmad, Musab Ahmad, Bilal Ahmad | Published: 2025-08-19
Resource Usage Analysis
Attack Type
Defense Method

Secure Tug-of-War (SecTOW): Iterative Defense-Attack Training with Reinforcement Learning for Multimodal Model Security

Authors: Muzhi Dai, Shixuan Liu, Zhiyuan Zhao, Junyu Gao, Hao Sun, Xuelong Li | Published: 2025-07-29
Reward Mechanism Design
Reinforcement Learning Optimization
Defense Method

Thought Purity: Defense Paradigm For Chain-of-Thought Attack

Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16
Information Security
Threat modeling
Defense Method

Defending Against Prompt Injection With a Few DefensiveTokens

Authors: Sizhe Chen, Yizhu Wang, Nicholas Carlini, Chawin Sitawarin, David Wagner | Published: 2025-07-10
Indirect Prompt Injection
Prompt leaking
Defense Method

May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks

Authors: Nishit V. Pandya, Andrey Labunets, Sicun Gao, Earlence Fernandes | Published: 2025-07-10
Indirect Prompt Injection
Adversarial attack
Defense Method

iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor System-on-Chips

Authors: Mehdi Elahi, Mohamed R. Elshamy, Abdel-Hameed Badawy, Ahmad Patooghy | Published: 2025-07-08
Hardware Trojan Detection
Threat Model
Defense Method