脅威モデリング

TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans

Authors: Fangzhou Wang, Qijing Wang, Lilas Alrahis, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Ozgur Sinanoglu, Tsung-Yi Ho, Evangeline F. Y. Young, Johann Knechtel | Published: 2024-05-09
レイアウトセキュリティ
脅威モデリング
防御手法

AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models

Authors: Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang | Published: 2024-05-08
サイバーセキュリティ
脅威モデリング
評価手法

Enhancing O-RAN Security: Evasion Attacks and Robust Defenses for Graph Reinforcement Learning-based Connection Management

Authors: Ravikumar Balakrishnan, Marius Arvinte, Nageen Himayat, Hosein Nikopour, Hassnaa Moustafa | Published: 2024-05-06
物理攻撃
脅威モデリング
防御手法

Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security

Authors: Yihe Fan, Yuxin Cao, Ziyu Zhao, Ziyao Liu, Shaofeng Li | Published: 2024-04-08 | Updated: 2024-08-11
LLMセキュリティ
プロンプトインジェクション
脅威モデリング

CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

Authors: Francesco Marchiori, Mauro Conti | Published: 2024-04-06
侵入検知システム
敵対的訓練
脅威モデリング

SunBlock: Cloudless Protection for IoT Systems

Authors: Vadim Safronov, Anna Maria Mandalari, Daniel J. Dubois, David Choffnes, Hamed Haddadi | Published: 2024-01-25
リソース最適化
家庭ルーターでのIoT脅威検出
脅威モデリング

ADMIn: Attacks on Dataset, Model and Input. A Threat Model for AI Based Software

Authors: Vimal Kumar, Juliette Mayo, Khadija Bahiss | Published: 2024-01-15
サイバー攻撃
モデル性能評価
脅威モデリング

Survey of Security Issues in Memristor-based Machine Learning Accelerators for RF Analysis

Authors: William Lillis, Max Cohen Hoffing, Wayne Burleson | Published: 2023-12-01
セキュリティ分析
脅威モデリング
透かしの耐久性

AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

Authors: Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde | Published: 2023-10-04
データ生成
脅威モデリング
評価指標

Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection

Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02
ウォーターマーキング
セキュリティ分析
脅威モデリング