セキュリティ分析

LLM Agents for Automated Web Vulnerability Reproduction: Are We There Yet?

Authors: Bin Liu, Yanjie Zhao, Guoai Xu, Haoyu Wang | Published: 2025-10-16
インダイレクトプロンプトインジェクション
エージェント設計
セキュリティ分析

Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program Regeneration

Authors: Evangelos Lamprou, Julian Dai, Grigoris Ntousakis, Martin C. Rinard, Nikos Vasilakis | Published: 2025-10-16
セキュリティ分析
プログラムの検証
プロンプトリーキング

Detection of security smells in IaC scripts through semantics-aware code and language processing

Authors: Aicha War, Adnan A. Rawass, Abdoul K. Kabore, Jordan Samhi, Jacques Klein, Tegawende F. Bissyande | Published: 2025-09-23
コード表現技術
セキュリティ分析
プロンプトの検証

Coherence-driven inference for cybersecurity

Authors: Steve Huntsman | Published: 2025-09-23
アルゴリズム
セキュリティ分析
情報収集手法

Evil Vizier: Vulnerabilities of LLM-Integrated XR Systems

Authors: Yicheng Zhang, Zijian Huang, Sophie Chen, Erfan Shayegani, Jiasi Chen, Nael Abu-Ghazaleh | Published: 2025-09-18
セキュリティ分析
プロンプトインジェクション
攻撃アクションモデル

Enterprise AI Must Enforce Participant-Aware Access Control

Authors: Shashank Shreedhar Bhatt, Tanmay Rajore, Khushboo Aggarwal, Ganesh Ananthanarayanan, Ranveer Chandra, Nishanth Chandran, Suyash Choudhury, Divya Gupta, Emre Kiciman, Sumit Kumar Pandey, Srinath Setty, Rahul Sharma, Teijia Zhao | Published: 2025-09-18
セキュリティ分析
プライバシー管理
プロンプトリーキング

ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System

Authors: Taesoo Kim, HyungSeok Han, Soyeon Park, Dae R. Jeong, Dohyeok Kim, Dongkwan Kim, Eunsoo Kim, Jiho Kim, Joshua Wang, Kangsu Kim, Sangwoo Ji, Woosun Song, Hanqing Zhao, Andrew Chin, Gyejin Lee, Kevin Stevens, Mansour Alharthi, Yizhuo Zhai, Cen Zhang, Joonun Jang, Yeongjin Jang, Ammar Askar, Dongju Kim, Fabian Fleischer, Jeongin Cho, Junsik Kim, Kyungjoon Ko, Insu Yun, Sangdon Park, Dowoo Baik, Haein Lee, Hyeon Heo, Minjae Gwon, Minjae Lee, Minwoo Baek, Seunggi Min, Wonyoung Kim, Yonghwi Jin, Younggi Park, Yunjae Choi, Jinho Jung, Gwanhyun Lee, Junyoung Jang, Kyuheon Kim, Yeonghyeon Cha, Youngjoon Kim | Published: 2025-09-18
セキュリティ分析
バグ修正手法
評価手法

A Graph-Based Approach to Alert Contextualisation in Security Operations Centres

Authors: Magnus Wiik Eckhoff, Peter Marius Flydal, Siem Peters, Martin Eian, Jonas Halvorsen, Vasileios Mavroeidis, Gudmund Grov | Published: 2025-09-16
セキュリティ分析
攻撃シナリオ分析
機械学習手法

Training Language Model Agents to Find Vulnerabilities with CTF-Dojo

Authors: Terry Yue Zhuo, Dingmin Wang, Hantian Ding, Varun Kumar, Zijian Wang | Published: 2025-08-25 | Updated: 2025-09-23
セキュリティ分析
機械学習の応用
競技チャレンジ分析

From Legacy to Standard: LLM-Assisted Transformation of Cybersecurity Playbooks into CACAO Format

Authors: Mehdi Akbari Gurabi, Lasse Nitz, Radu-Mihai Castravet, Roman Matzutt, Avikarsha Mandal, Stefan Decker | Published: 2025-08-05
セキュリティ分析
テキスト生成手法
モデル抽出攻撃