OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs Authors: Ahmed Aly, Essam Mansour, Amr Youssef | Published: 2025-10-16 | Updated: 2025-10-20 2025.10.16 文献データベース
A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems Authors: Zixuan Liu, Yi Zhao, Zhuotao Liu, Qi Li, Chuanpu Fu, Guangmeng Zhou, Ke Xu | Published: 2025-10-16 2025.10.16 文献データベース
Secure Sparse Matrix Multiplications and their Applications to Privacy-Preserving Machine Learning Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2025-10-16 2025.10.16 文献データベース
LLM Agents for Automated Web Vulnerability Reproduction: Are We There Yet? Authors: Bin Liu, Yanjie Zhao, Guoai Xu, Haoyu Wang | Published: 2025-10-16 2025.10.16 文献データベース
LLMに対するポイズニング攻撃 本記事では、LLMに対するポイズニング攻撃の最新動向について解説します。LLMに対するポイズニング攻撃の特徴や攻撃方法について概観し、その後主要な防御技術の概要や課題、今後の展望について説明します。 2025.10.16 専門家向け解説記事
Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program Regeneration Authors: Evangelos Lamprou, Julian Dai, Grigoris Ntousakis, Martin C. Rinard, Nikos Vasilakis | Published: 2025-10-16 2025.10.16 文献データベース
Are My Optimized Prompts Compromised? Exploring Vulnerabilities of LLM-based Optimizers Authors: Andrew Zhao, Reshmi Ghosh, Vitor Carvalho, Emily Lawton, Keegan Hines, Gao Huang, Jack W. Stokes | Published: 2025-10-16 2025.10.16 文献データベース
Terrarium: Revisiting the Blackboard for Multi-Agent Safety, Privacy, and Security Studies Authors: Mason Nakamura, Abhinav Kumar, Saaduddin Mahmud, Sahar Abdelnabi, Shlomo Zilberstein, Eugene Bagdasarian | Published: 2025-10-16 2025.10.16 文献データベース
RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics and Techniques with Large Language Models Authors: Fanchao Meng, Jiaping Gui, Yunbo Li, Yue Wu | Published: 2025-10-16 2025.10.16 文献データベース
In-Browser LLM-Guided Fuzzing for Real-Time Prompt Injection Testing in Agentic AI Browsers Authors: Avihay Cohen | Published: 2025-10-15 2025.10.15 文献データベース