RAG

ARGUS: Defending LLM Agents Against Context-Aware Prompt Injection

Authors: Shihao Weng, Yang Feng, Jinrui Zhang, Xiaofei Xie, Jiongchi Yu, Jia Liu | Published: 2026-05-05
RAG
インダイレクトプロンプトインジェクション
評価手法

PRAG End-to-End Privacy-Preserving Retrieval-Augmented Generation

Authors: Zhijun Li, Minghui Xu, Huayi Qi, Wenxuan Yu, Tingchuang Zhang, Qiao Zhang, GuangYong Shang, Zhen Ma, Xiuzhen Cheng | Published: 2026-04-29
RAG
RAGへのポイズニング攻撃
プライバシー保護手法

RAVEN: Retrieval-Augmented Vulnerability Exploration Network for Memory Corruption Analysis in User Code and Binary Programs

Authors: Parteek Jamwal, Minghao Shao, Boyuan Chen, Achyuta Muthuvelan, Asini Subanya, Boubacar Ballo, Kashish Satija, Mariam Shafey, Mohamed Mahmoud, Moncif Dahaji Bouffi, Pasindu Wickramasinghe, Siyona Goel, Yaakulya Sabbani, Hakim Hacid, Mthandazo Ndhlovu, Eleanna Kafeza, Sanjay Rawat, Muhammad Shafique | Published: 2026-04-20
LLM性能評価
RAG
RAGへのポイズニング攻撃

Securing Retrieval-Augmented Generation: A Taxonomy of Attacks, Defenses, and Future Directions

Authors: Yuming Xu, Mingtao Zhang, Zhuohan Ge, Haoyang Li, Nicole Hu, Jason Chen Zhang, Qing Li, Lei Chen | Published: 2026-04-09
RAG
RAGへのポイズニング攻撃
プライバシー管理

Argus: Reorchestrating Static Analysis via a Multi-Agent Ensemble for Full-Chain Security Vulnerability Detection

Authors: Zi Liang, Qipeng Xie, Jun He, Bohuan Xue, Weizheng Wang, Yuandao Cai, Fei Luo, Boxian Zhang, Haibo Hu, Kaishun Wu | Published: 2026-04-08
LLM性能評価
RAG
データ駆動型脆弱性評価

Hackers or Hallucinators? A Comprehensive Analysis of LLM-Based Automated Penetration Testing

Authors: Jiaren Peng, Zeqin Li, Chang You, Yan Wang, Hanlin Sun, Xuan Tian, Shuqiao Zhang, Junyi Liu, Jianguo Zhao, Renyang Liu, Haoran Ou, Yuqiang Sun, Jiancheng Zhang, Yutong Jiao, Kunshu Song, Chao Zhang, Fan Shi, Hongda Sun, Rui Yan, Cheng Huang | Published: 2026-04-07
RAG
RAGへのポイズニング攻撃
フレームワーク

Towards the Development of an LLM-Based Methodology for Automated Security Profiling in Compliance with Ukrainian Cybersecurity Regulations

Authors: Daniil Shafranskyi, Iryna Stopochkina, Mykola Ilin | Published: 2026-04-07
LLM性能評価
RAG
セキュリティプロファイリング

MA-IDS: Multi-Agent RAG Framework for IoT Network Intrusion Detection with an Experience Library

Authors: Md Shamimul Islam, Luis G. Jaimes, Ayesha S. Dina | Published: 2026-04-07
IoTセキュリティフレームワーク
RAG
RAGへのポイズニング攻撃

Your LLM Agent Can Leak Your Data: Data Exfiltration via Backdoored Tool Use

Authors: Wuyang Zhang, Shichao Pei | Published: 2026-04-07
RAG
データ漏洩
攻撃手法評価

ORACAL: A Robust and Explainable Multimodal Framework for Smart Contract Vulnerability Detection with Causal Graph Enrichment

Authors: Tran Duong Minh Dai, Triet Huynh Minh Le, M. Ali Babar, Van-Hau Pham, Phan The Duy | Published: 2026-03-30
RAG
脆弱性検出
評価メトリクス