RAG

ARGUS: Defending LLM Agents Against Context-Aware Prompt Injection

Authors: Shihao Weng, Yang Feng, Jinrui Zhang, Xiaofei Xie, Jiongchi Yu, Jia Liu | Published: 2026-05-05
RAG
Indirect Prompt Injection
Evaluation Method

PRAG End-to-End Privacy-Preserving Retrieval-Augmented Generation

Authors: Zhijun Li, Minghui Xu, Huayi Qi, Wenxuan Yu, Tingchuang Zhang, Qiao Zhang, GuangYong Shang, Zhen Ma, Xiuzhen Cheng | Published: 2026-04-29
RAG
Poisoning attack on RAG
Privacy Protection Method

RAVEN: Retrieval-Augmented Vulnerability Exploration Network for Memory Corruption Analysis in User Code and Binary Programs

Authors: Parteek Jamwal, Minghao Shao, Boyuan Chen, Achyuta Muthuvelan, Asini Subanya, Boubacar Ballo, Kashish Satija, Mariam Shafey, Mohamed Mahmoud, Moncif Dahaji Bouffi, Pasindu Wickramasinghe, Siyona Goel, Yaakulya Sabbani, Hakim Hacid, Mthandazo Ndhlovu, Eleanna Kafeza, Sanjay Rawat, Muhammad Shafique | Published: 2026-04-20
LLM Performance Evaluation
RAG
Poisoning attack on RAG

Securing Retrieval-Augmented Generation: A Taxonomy of Attacks, Defenses, and Future Directions

Authors: Yuming Xu, Mingtao Zhang, Zhuohan Ge, Haoyang Li, Nicole Hu, Jason Chen Zhang, Qing Li, Lei Chen | Published: 2026-04-09
RAG
Poisoning attack on RAG
Privacy Management

Argus: Reorchestrating Static Analysis via a Multi-Agent Ensemble for Full-Chain Security Vulnerability Detection

Authors: Zi Liang, Qipeng Xie, Jun He, Bohuan Xue, Weizheng Wang, Yuandao Cai, Fei Luo, Boxian Zhang, Haibo Hu, Kaishun Wu | Published: 2026-04-08
LLM Performance Evaluation
RAG
Data-Driven Vulnerability Assessment

Hackers or Hallucinators? A Comprehensive Analysis of LLM-Based Automated Penetration Testing

Authors: Jiaren Peng, Zeqin Li, Chang You, Yan Wang, Hanlin Sun, Xuan Tian, Shuqiao Zhang, Junyi Liu, Jianguo Zhao, Renyang Liu, Haoran Ou, Yuqiang Sun, Jiancheng Zhang, Yutong Jiao, Kunshu Song, Chao Zhang, Fan Shi, Hongda Sun, Rui Yan, Cheng Huang | Published: 2026-04-07
RAG
Poisoning attack on RAG
Framework

Towards the Development of an LLM-Based Methodology for Automated Security Profiling in Compliance with Ukrainian Cybersecurity Regulations

Authors: Daniil Shafranskyi, Iryna Stopochkina, Mykola Ilin | Published: 2026-04-07
LLM Performance Evaluation
RAG
セキュリティプロファイリング

MA-IDS: Multi-Agent RAG Framework for IoT Network Intrusion Detection with an Experience Library

Authors: Md Shamimul Islam, Luis G. Jaimes, Ayesha S. Dina | Published: 2026-04-07
IoT Security Framework
RAG
Poisoning attack on RAG

Your LLM Agent Can Leak Your Data: Data Exfiltration via Backdoored Tool Use

Authors: Wuyang Zhang, Shichao Pei | Published: 2026-04-07
RAG
Data Leakage
攻撃手法評価

ORACAL: A Robust and Explainable Multimodal Framework for Smart Contract Vulnerability Detection with Causal Graph Enrichment

Authors: Tran Duong Minh Dai, Triet Huynh Minh Le, M. Ali Babar, Van-Hau Pham, Phan The Duy | Published: 2026-03-30
RAG
Vulnerability detection
評価メトリクス