攻撃検出手法

Adversarial Suffix Filtering: a Defense Pipeline for LLMs

Authors: David Khachaturov, Robert Mullins | Published: 2025-05-14
プロンプトの検証
倫理基準遵守
攻撃検出手法

CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations

Authors: Denis Donadel, Kavya Balasubramanian, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran | Published: 2025-05-14
テストベッド
攻撃検出手法
電子制御ユニット

Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems

Authors: Mostafa Jafari, Alireza Shameli-Sendi | Published: 2025-05-14
ロバスト性分析
攻撃検出手法
敵対的学習

Instantiating Standards: Enabling Standard-Driven Text TTP Extraction with Evolvable Memory

Authors: Cheng Meng, ZhengWei Jiang, QiuYun Wang, XinYi Li, ChunYan Ma, FangMing Dong, FangLi Ren, BaoXu Liu | Published: 2025-05-14
プロンプトリーキング
攻撃検出手法
知識抽出手法

I Know What You Said: Unveiling Hardware Cache Side-Channels in Local Large Language Model Inference

Authors: Zibo Gao, Junjie Hu, Feng Guo, Yixin Zhang, Yinglong Han, Siyuan Liu, Haiyang Li, Zhiqiang Lv | Published: 2025-05-10 | Updated: 2025-05-14
LLMの安全機構の解除
プロンプトリーキング
攻撃検出手法

Les Dissonances: Cross-Tool Harvesting and Polluting in Multi-Tool Empowered LLM Agents

Authors: Zichuan Li, Jian Cui, Xiaojing Liao, Luyi Xing | Published: 2025-04-04 | Updated: 2025-04-28
インダイレクトプロンプトインジェクション
ツールの脆弱性
攻撃検出手法

From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models

Authors: Lingzhi Wang, Zhenyuan Li, Yi Jiang, Zhengkai Wang, Zonghan Guo, Jiahui Wang, Yangyang Wei, Xiangmin Shen, Wei Ruan, Yan Chen | Published: 2024-07-24 | Updated: 2025-04-17
プロンプトリーキング
攻撃アクションモデル
攻撃検出手法