LLM活用

Knowledge-to-Data: LLM-Driven Synthesis of Structured Network Traffic for Testbed-Free IDS Evaluation

Authors: Konstantinos E. Kampourakis, Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Stefanos Gritzalis | Published: 2026-01-08
LLM活用
プロンプトインジェクション
侵入検知システム

CurricuLLM: Designing Personalized and Workforce-Aligned Cybersecurity Curricula Using Fine-Tuned LLMs

Authors: Arthur Nijdam, Harri Kähkönen, Valtteri Niemi, Paul Stankovski Wagner, Sara Ramezanian | Published: 2026-01-08
LLM活用
カリキュラム設計
セキュリティ分析

LLMs, You Can Evaluate It! Design of Multi-perspective Report Evaluation for Security Operation Centers

Authors: Hiroyuki Okada, Tatsumi Oba, Naoto Yanai | Published: 2026-01-06
LLM活用
セキュリティ分析手法
ユーザー体験評価

LAsset: An LLM-assisted Security Asset Identification Framework for System-on-Chip (SoC) Verification

Authors: Md Ajoad Hasan, Dipayan Saha, Khan Thamid Hasan, Nashmin Alam, Azim Uddin, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-01-06
LLM活用
セキュリティ分析手法
脅威モデリング自動化

Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation

Authors: Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan, Asadullah Abdullah Khan, Saad Said Alqahtani | Published: 2025-12-29
LLM活用
セキュリティ分析手法
脆弱性優先順位付け

EquaCode: A Multi-Strategy Jailbreak Approach for Large Language Models via Equation Solving and Code Completion

Authors: Zhen Liang, Hai Huang, Zhengkui Chen | Published: 2025-12-29
LLMの安全機構の解除
LLM活用
プロンプトインジェクション

The Erasure Illusion: Stress-Testing the Generalization of LLM Forgetting Evaluation

Authors: Hengrui Jia, Taoran Li, Jonas Guan, Varun Chandrasekaran | Published: 2025-12-22
LLM活用
生成モデルの課題
透明性と検証

Large Language Models as a (Bad) Security Norm in the Context of Regulation and Compliance

Authors: Kaspar Rosager Ludvigsen | Published: 2025-12-18
LLM活用
インダイレクトプロンプトインジェクション
大規模言語モデル

Love, Lies, and Language Models: Investigating AI’s Role in Romance-Baiting Scams

Authors: Gilad Gressel, Rahul Pankajakshan, Shir Rozenfeld, Ling Li, Ivan Franceschini, Krishnahsree Achuthan, Yisroel Mirsky | Published: 2025-12-18
LLM活用
インダイレクトプロンプトインジェクション
社会的影響

IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol

Authors: Yunhao Yao, Zhiqiang Wang, Haoran Cheng, Yihang Cheng, Haohua Du, Xiang-Yang Li | Published: 2025-12-16
LLM活用
プライバシー保護プロトコル
フレームワーク