Your LLM Agent Can Leak Your Data: Data Exfiltration via Backdoored Tool Use

Authors: Wuyang Zhang, Shichao Pei | Published: 2026-04-07

Attribution-Driven Explainable Intrusion Detection with Encoder-Based Large Language Models

Authors: Umesh Biswas, Shafqat Hasan, Syed Mohammed Farhan, Nisha Pillai, Charan Gudla | Published: 2026-04-07

RuleForge: Automated Generation and Validation for Web Vulnerability Detection at Scale

Authors: Ayush Garg, Sophia Hager, Jacob Montiel, Aditya Tiwari, Michael Gentile, Zach Reavis, David Magnotti, Wayne Fullen | Published: 2026-04-02

Combating Data Laundering in LLM Training

Authors: Muxing Li, Zesheng Ye, Sharon Li, Feng Liu | Published: 2026-04-02

Assertain: Automated Security Assertion Generation Using Large Language Models

Authors: Shams Tarek, Dipayan Saha, Khan Thamid Hasan, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-04-02

AI-Assisted Hardware Security Verification: A Survey and AI Accelerator Case Study

Authors: Khan Thamid Hasan, Md Ajoad Hasan, Nashmin Alam, Md. Touhidul Islam, Upoma Das, Farimah Farahmandi | Published: 2026-04-02

AgentWatcher: A Rule-based Prompt Injection Monitor

Authors: Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia | Published: 2026-04-01

SERSEM: Selective Entropy-Weighted Scoring for Membership Inference in Code Language Models

Authors: Kıvanç Kuzey Dikici, Serdar Kara, Semih Çağlar, Eray Tüzün, Sinem Sav | Published: 2026-04-01

Multi-Agent LLM Governance for Safe Two-Timescale Reinforcement Learning in SDN-IoT Defense

Authors: Saeid Jamshidi, Negar Shahabi, Foutse Khomh, Carol Fung, Mohammad Hamdaqa | Published: 2026-04-01

Automated Framework to Evaluate and Harden LLM System Instructions against Encoding Attacks

Authors: Anubhab Sahu, Diptisha Samanta, Reza Soosahabi | Published: 2026-04-01