Towards the Development of an LLM-Based Methodology for Automated Security Profiling in Compliance with Ukrainian Cybersecurity Regulations

Authors: Daniil Shafranskyi, Iryna Stopochkina, Mykola Ilin | Published: 2026-04-07

AttnDiff: Attention-based Differential Fingerprinting for Large Language Models

Authors: Haobo Zhang, Zhenhua Xu, Junxian Li, Shangfeng Sheng, Dezhang Kong, Meng Han | Published: 2026-04-07

MA-IDS: Multi-Agent RAG Framework for IoT Network Intrusion Detection with an Experience Library

Authors: Md Shamimul Islam, Luis G. Jaimes, Ayesha S. Dina | Published: 2026-04-07

Your LLM Agent Can Leak Your Data: Data Exfiltration via Backdoored Tool Use

Authors: Wuyang Zhang, Shichao Pei | Published: 2026-04-07

Attribution-Driven Explainable Intrusion Detection with Encoder-Based Large Language Models

Authors: Umesh Biswas, Shafqat Hasan, Syed Mohammed Farhan, Nisha Pillai, Charan Gudla | Published: 2026-04-07

RuleForge: Automated Generation and Validation for Web Vulnerability Detection at Scale

Authors: Ayush Garg, Sophia Hager, Jacob Montiel, Aditya Tiwari, Michael Gentile, Zach Reavis, David Magnotti, Wayne Fullen | Published: 2026-04-02

Combating Data Laundering in LLM Training

Authors: Muxing Li, Zesheng Ye, Sharon Li, Feng Liu | Published: 2026-04-02

Assertain: Automated Security Assertion Generation Using Large Language Models

Authors: Shams Tarek, Dipayan Saha, Khan Thamid Hasan, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-04-02

AI-Assisted Hardware Security Verification: A Survey and AI Accelerator Case Study

Authors: Khan Thamid Hasan, Md Ajoad Hasan, Nashmin Alam, Md. Touhidul Islam, Upoma Das, Farimah Farahmandi | Published: 2026-04-02

AgentWatcher: A Rule-based Prompt Injection Monitor

Authors: Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia | Published: 2026-04-01