The Promptware Kill Chain: How Prompt Injections Gradually Evolved Into a Multi-Step Malware Authors: Ben Nassi, Bruce Schneier, Oleg Brodt | Published: 2026-01-14 LLM活用Indirect Prompt InjectionPrompt Injection 2026.01.14 2026.01.16 Literature Database
SpatialJB: How Text Distribution Art Becomes the “Jailbreak Key” for LLM Guardrails Authors: Zhiyi Mou, Jingyuan Yang, Zeheng Qian, Wangze Ni, Tianfang Xiao, Ning Liu, Chen Zhang, Zhan Qin, Kui Ren | Published: 2026-01-14 LLM活用Prompt InjectionLarge Language Model 2026.01.14 2026.01.16 Literature Database
KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14 LLM活用RAGPoisoning attack on RAG 2026.01.14 2026.01.16 Literature Database
A Decompilation-Driven Framework for Malware Detection with Large Language Models Authors: Aniesh Chawla, Udbhav Prasad | Published: 2026-01-14 LLM活用Prompt InjectionMulti-Domain Data Analysis 2026.01.14 2026.01.16 Literature Database
Evaluating Implicit Regulatory Compliance in LLM Tool Invocation via Logic-Guided Synthesis Authors: Da Song, Yuheng Huang, Boqi Chen, Tianshuo Cong, Randy Goebel, Lei Ma, Foutse Khomh | Published: 2026-01-13 LLM活用Prompt InjectionPerformance Evaluation 2026.01.13 2026.01.15 Literature Database
Towards Automating Blockchain Consensus Verification with IsabeLLM Authors: Elliot Jones, William Knottenbelt | Published: 2026-01-12 LLM活用Integration of Blockchain and FLFormal Verification 2026.01.12 2026.01.14 Literature Database
Enhancing Cloud Network Resilience via a Robust LLM-Empowered Multi-Agent Reinforcement Learning Framework Authors: Yixiao Peng, Hao Hu, Feiyang Li, Xinye Cao, Yingchang Jiang, Jipeng Tang, Guoshun Nan, Yuling Liu | Published: 2026-01-12 LLM活用Security AssurancePerformance Evaluation 2026.01.12 2026.01.14 Literature Database
Knowledge-to-Data: LLM-Driven Synthesis of Structured Network Traffic for Testbed-Free IDS Evaluation Authors: Konstantinos E. Kampourakis, Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Stefanos Gritzalis | Published: 2026-01-08 LLM活用Prompt InjectionIntrusion Detection System 2026.01.08 2026.01.10 Literature Database
CurricuLLM: Designing Personalized and Workforce-Aligned Cybersecurity Curricula Using Fine-Tuned LLMs Authors: Arthur Nijdam, Harri Kähkönen, Valtteri Niemi, Paul Stankovski Wagner, Sara Ramezanian | Published: 2026-01-08 LLM活用カリキュラム設計Security Analysis 2026.01.08 2026.01.10 Literature Database
LLMs, You Can Evaluate It! Design of Multi-perspective Report Evaluation for Security Operation Centers Authors: Hiroyuki Okada, Tatsumi Oba, Naoto Yanai | Published: 2026-01-06 LLM活用Security Analysis MethodUser Experience Evaluation 2026.01.06 2026.01.08 Literature Database