An LLM Agent-based Framework for Whaling Countermeasures

Authors: Daisuke Miyamoto, Takuji Iimura, Narushige Michishita | Published: 2026-01-21

Constructing Multi-label Hierarchical Classification Models for MITRE ATT&CK Text Tagging

Authors: Andrew Crossman, Jonah Dodd, Viralam Ramamurthy Chaithanya Kumar, Riyaz Mohammed, Andrew R. Plummer, Chandra Sekharudu, Deepak Warrier, Mohammad Yekrangian | Published: 2026-01-21

An Empirical Study on Remote Code Execution in Machine Learning Model Hosting Ecosystems

Authors: Mohammed Latif Siddiq, Tanzim Hossain Romel, Natalie Sekerak, Beatrice Casey, Joanna C. S. Santos | Published: 2026-01-20

PAC-Private Responses with Adversarial Composition

Authors: Xiaochen Zhu, Mayuri Sridhar, Srinivas Devadas | Published: 2026-01-20

VirtualCrime: Evaluating Criminal Potential of Large Language Models via Sandbox Simulation

Authors: Yilin Tang, Yu Wang, Lanlan Qiu, Wenchang Gao, Yunfei Ma, Baicheng Chen, Tianxing He | Published: 2026-01-20

HardSecBench: Benchmarking the Security Awareness of LLMs for Hardware Code Generation

Authors: Qirui Chen, Jingxian Shuai, Shuangwu Chen, Shenghao Ye, Zijian Wen, Xufei Su, Jie Jin, Jiangming Li, Jun Chen, Xiaobin Tan, Jian Yang | Published: 2026-01-20

PINA: Prompt Injection Attack against Navigation Agents

Authors: Jiani Liu, Yixin He, Lanlan Fan, Qidi Zhong, Yushi Cheng, Meng Zhang, Yanjiao Chen, Wenyuan Xu | Published: 2026-01-20

Automatic Adjustment of HPA Parameters and Attack Prevention in Kubernetes Using Random Forests

Authors: Hanlin Zhou, Huah Yong Chan, Jingfei Ni, Mengchun Wu, Qing Deng | Published: 2026-01-20

Be Your Own Red Teamer: Safety Alignment via Self-Play and Reflective Experience Replay

Authors: Hao Wang, Yanting Wang, Hao Li, Rui Li, Lei Sha | Published: 2026-01-15

LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies

Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15