LLM活用

LAsset: An LLM-assisted Security Asset Identification Framework for System-on-Chip (SoC) Verification

Authors: Md Ajoad Hasan, Dipayan Saha, Khan Thamid Hasan, Nashmin Alam, Azim Uddin, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-01-06
LLM活用
セキュリティ分析手法
脅威モデリング自動化

Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation

Authors: Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan, Asadullah Abdullah Khan, Saad Said Alqahtani | Published: 2025-12-29
LLM活用
セキュリティ分析手法
脆弱性優先順位付け

EquaCode: A Multi-Strategy Jailbreak Approach for Large Language Models via Equation Solving and Code Completion

Authors: Zhen Liang, Hai Huang, Zhengkui Chen | Published: 2025-12-29
LLMの安全機構の解除
LLM活用
プロンプトインジェクション

The Erasure Illusion: Stress-Testing the Generalization of LLM Forgetting Evaluation

Authors: Hengrui Jia, Taoran Li, Jonas Guan, Varun Chandrasekaran | Published: 2025-12-22
LLM活用
生成モデルの課題
透明性と検証

Large Language Models as a (Bad) Security Norm in the Context of Regulation and Compliance

Authors: Kaspar Rosager Ludvigsen | Published: 2025-12-18
LLM活用
インダイレクトプロンプトインジェクション
大規模言語モデル

Love, Lies, and Language Models: Investigating AI’s Role in Romance-Baiting Scams

Authors: Gilad Gressel, Rahul Pankajakshan, Shir Rozenfeld, Ling Li, Ivan Franceschini, Krishnahsree Achuthan, Yisroel Mirsky | Published: 2025-12-18
LLM活用
インダイレクトプロンプトインジェクション
社会的影響

IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol

Authors: Yunhao Yao, Zhiqiang Wang, Haoran Cheng, Yihang Cheng, Haohua Du, Xiang-Yang Li | Published: 2025-12-16
LLM活用
プライバシー保護プロトコル
フレームワーク

Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence

Authors: Amine Tellache, Abdelaziz Amara Korba, Amdjed Mokhtari, Horea Moldovan, Yacine Ghamri-Doudane | Published: 2025-08-14
LLM活用
RAG
フレームワーク