RAG

When Safety Becomes a Vulnerability: Exploiting LLM Alignment Homogeneity for Transferable Blocking in RAG

Authors: Junchen Li, Chao Qi, Rongzheng Wang, Qizhi Chen, Liang Xu, Di Liang, Bob Simons, Shuang Liang | Published: 2026-03-04
LLM性能評価
RAG
RAGへのポイズニング攻撃

Differentially Private Retrieval-Augmented Generation

Authors: Tingting Tang, James Flemings, Yongqin Wang, Murali Annavaram | Published: 2026-02-16
RAG
RAGへのポイズニング攻撃
差分プライバシー

Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents

Authors: Mohammad Fasha, Faisal Abul Rub, Nasim Matar, Bilal Sowan, Mohammad Al Khaldy | Published: 2026-01-26
LLM活用
RAG
セキュリティ保証

PAL*M: Property Attestation for Large Generative Models

Authors: Prach Chantasantitam, Adam Ilyas Caulfield, Vasisht Duddu, Lachlan J. Gunn, N. Asokan | Published: 2026-01-22
RAG
セキュリティ保証
フレームワーク

LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies

Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15
RAG
RAGへのポイズニング攻撃
プライバシー保護

KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation

Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14
LLM活用
RAG
RAGへのポイズニング攻撃

SoK: Privacy Risks and Mitigations in Retrieval-Augmented Generation Systems

Authors: Andreea-Elena Bodea, Stephen Meisenbacher, Alexandra Klymenko, Florian Matthes | Published: 2026-01-07
RAG
RAGへのポイズニング攻撃
プライバシー保護技術

Multi-Agent Framework for Threat Mitigation and Resilience in AI-Based Systems

Authors: Armstrong Foundjem, Lionel Nganyewou Tidjon, Leuson Da Silva, Foutse Khomh | Published: 2025-12-29
RAG
モデルDoS
脆弱性優先順位付け

From Retrieval to Reasoning: A Framework for Cyber Threat Intelligence NER with Explicit and Adaptive Instructions

Authors: Jiaren Peng, Hongda Sun, Xuan Tian, Cheng Huang, Zeqing Li, Rui Yan | Published: 2025-12-22
RAG
データ選択戦略
プロンプトリーキング

Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations

Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28
RAG
TCP接続特性
脆弱性分析