文献データベース

MirageBackdoor: A Stealthy Attack that Induces Think-Well-Answer-Wrong Reasoning

Authors: Yizhe Zeng, Wei Zhang, Yunpeng Li, Juxin Xiao, Xiao Wang, Yuling Liu | Published: 2026-04-08
データ毒性攻撃
バックドアモデルの検知
攻撃戦略分析

Argus: Reorchestrating Static Analysis via a Multi-Agent Ensemble for Full-Chain Security Vulnerability Detection

Authors: Zi Liang, Qipeng Xie, Jun He, Bohuan Xue, Weizheng Wang, Yuandao Cai, Fei Luo, Boxian Zhang, Haibo Hu, Kaishun Wu | Published: 2026-04-08
LLM性能評価
RAG
データ駆動型脆弱性評価

PoC-Adapt: Semantic-Aware Automated Vulnerability Reproduction with LLM Multi-Agents and Reinforcement Learning-Driven Adaptive Policy

Authors: Phan The Duy, Nguyen Viet Duy, Khoa Ngo-Khanh, Nguyen Huu Quyen, Van-Hau Pham | Published: 2026-04-08
LLM性能評価
エージェント協調
自動化された脅威帰属

Can Drift-Adaptive Malware Detectors Be Made Robust? Attacks and Defenses Under White-Box and Black-Box Threats

Authors: Adrian Shuai Li, Md Ajwad Akil, Elisa Bertino | Published: 2026-04-08
バックドアモデルの検知
モデルの堅牢性
攻撃手法

WebSP-Eval: Evaluating Web Agents on Website Security and Privacy Tasks

Authors: Guruprasad Viswanathan Ramesh, Asmit Nayak, Basieem Siddique, Kassem Fawaz | Published: 2026-04-07
UI要素の性能分析
インダイレクトプロンプトインジェクション
プライバシー評価

Blockchain and AI: Securing Intelligent Networks for the Future

Authors: Joy Dutta, Hossien B. Eldeeb, Tu Dac Ho | Published: 2026-04-07
AIによる出力のバイアスの検出
アライメント
ブロックチェーン

FedSpy-LLM: Towards Scalable and Generalizable Data Reconstruction Attacks from Gradients on LLMs

Authors: Syed Irfan Ali Meerza, Feiyi Wang, Jian Liu | Published: 2026-04-07
LLM性能評価
プロンプトリーキング
攻撃手法の効果

LLM4CodeRE: Generative AI for Code Decompilation Analysis and Reverse Engineering

Authors: Hamed Jelodar, Samita Bai, Tochukwu Emmanuel Nwankwo, Parisa Hamedi, Mohammad Meymani, Roozbeh Razavi-Far, Ali A. Ghorbani | Published: 2026-04-07
LLM性能評価
プロンプトリーキング
リバースエンジニアリング

CritBench: A Framework for Evaluating Cybersecurity Capabilities of Large Language Models in IEC 61850 Digital Substation Environments

Authors: Gustav Keppler, Moritz Gstür, Veit Hagenmeyer | Published: 2026-04-07
LLM性能評価
データ収集手法
モデル評価

A Formal Security Framework for MCP-Based AI Agents: Threat Taxonomy, Verification Models, and Defense Mechanisms

Authors: Nirajan Acharya, Gaurav Kumar Gupta | Published: 2026-04-07
セキュリティフレームワーク
攻撃手法の説明
防御手法