脆弱性評価手法

A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis

Authors: Omar Abusabha, Jiyong Uhm, Tamer Abuhmed, Hyungjoon Koo | Published: 2025-12-16
XAI(説明可能なAI)
セキュリティ検証手法
脆弱性評価手法

Behavior-Aware and Generalizable Defense Against Black-Box Adversarial Attacks for ML-Based IDS

Authors: Sabrine Ennaji, Elhadj Benkhelifa, Luigi Vincenzo Mancini | Published: 2025-12-15
バックドア攻撃
異常検知手法
脆弱性評価手法

FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning

Authors: Khurram Khalil, Khaza Anuarul Hoque | Published: 2025-12-10
プロンプトインジェクション
大規模言語モデル
脆弱性評価手法

LLMs as verification oracles for Solidity

Authors: Massimo Bartoletti, Enrico Lipparini, Livio Pompianu | Published: 2025-09-23
プロンプトインジェクション
モデルDoS
脆弱性評価手法

LLM-Driven SAST-Genius: A Hybrid Static Analysis Framework for Comprehensive and Actionable Security

Authors: Vaibhav Agrawal, Kiarash Ahi | Published: 2025-09-18 | Updated: 2025-09-23
プロンプトインジェクション
脆弱性評価手法
静的分析

What You Code Is What We Prove: Translating BLE App Logic into Formal Models with LLMs for Vulnerability Detection

Authors: Biwei Yan, Yue Zhang, Minghui Xu, Runyu Pan, Jinku Li, Xiuzhen Cheng | Published: 2025-09-11
IoTデバイスの脆弱性
形式モデル
脆弱性評価手法

Systematic Analysis of MCP Security

Authors: Yongjian Guo, Puzhuo Liu, Wanlun Ma, Zehang Deng, Xiaogang Zhu, Peng Di, Xi Xiao, Sheng Wen | Published: 2025-08-18
プロンプトインジェクション
攻撃チェーン分析
脆弱性評価手法

A Large Language Model-Supported Threat Modeling Framework for Transportation Cyber-Physical Systems

Authors: M Sabbir Salek, Mashrur Chowdhury, Muhaimin Bin Munir, Yuchen Cai, Mohammad Imtiaz Hasan, Jean-Michel Tine, Latifur Khan, Mizanur Rahman | Published: 2025-06-01 | Updated: 2025-07-28
AIによる出力のバイアスの検出
RAGへのポイズニング攻撃
脆弱性評価手法

Unlocking User-oriented Pages: Intention-driven Black-box Scanner for Real-world Web Applications

Authors: Weizhe Wang, Yao Zhang, Kaitai Liang, Guangquan Xu, Hongpeng Bai, Qingyang Yan, Xi Zheng, Bin Wu | Published: 2025-04-29
コンテンツ圧縮手法
ユーザー行動分析
脆弱性評価手法

The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models

Authors: Swaroop Dora, Deven Lunkad, Naziya Aslam, S. Venkatesan, Sandeep Kumar Shukla | Published: 2025-04-29
インダイレクトプロンプトインジェクション
セキュアな通信チャネル
脆弱性評価手法