SoK: The Attack Surface of Agentic AI — Tools, and Autonomy

Authors: Ali Dehghantanha, Sajad Homayoun | Published: 2026-03-24

Explainable Threat Attribution for IoT Networks Using Conditional SHAP and Flow Behavior Modelling

Authors: Samuel Ozechi, Jennifer Okonkwoabutu | Published: 2026-03-24

CIPL: A Target-Independent Framework for Channel-Inversion Privacy Leakage in Agents

Authors: Tao Huang, Chen Hou, Jiayang Meng | Published: 2026-03-24

Does Teaming-Up LLMs Improve Secure Code Generation? A Comprehensive Evaluation with Multi-LLMSecCodeEval

Authors: Bushra Sabir, Shigang Liu, Seung Ick Jang, Sharif Abuadbba, Yansong Gao, Kristen Moore, SangCheol Kim, Hyoungshick Kim, Surya Nepal | Published: 2026-03-24

Structured Visual Narratives Undermine Safety Alignment in Multimodal Large Language Models

Authors: Rui Yang Tan, Yujia Hu, Roy Ka-Wei Lee | Published: 2026-03-23

Towards Secure Retrieval-Augmented Generation: A Comprehensive Review of Threats, Defenses and Benchmarks

Authors: Yanming Mu, Hao Hu, Feiyang Li, Qiao Yuan, Jiang Wu, Zichuan Liu, Pengcheng Liu, Mei Wang, Hongwei Zhou, Yuling Liu | Published: 2026-03-23

Auditing MCP Servers for Over-Privileged Tool Capabilities

Authors: Charoes Huang, Xin Huang, Amin Milani Fard | Published: 2026-03-23

Functional Subspace Watermarking for Large Language Models

Authors: Zikang Ding, Junhao Li, Suling Wu, Junchi Yao, Hongbo Liu, Lijie Hu | Published: 2026-03-19

Measuring and Exploiting Confirmation Bias in LLM-Assisted Security Code Review

Authors: Dimitris Mitropoulos, Nikolaos Alexopoulos, Georgios Alexopoulos, Diomidis Spinellis | Published: 2026-03-19

CNT: Safety-oriented Function Reuse across LLMs via Cross-Model Neuron Transfer

Authors: Yue Zhao, Yujia Gong, Ruigang Liang, Shenchen Zhu, Kai Chen, Xuejing Yuan, Wangjun Zhang | Published: 2026-03-19