Attack MEDIUM
Pedro Pereira, José Gouveia, João Vitorino +2 more
Magecart skimming attacks have emerged as a significant threat to client-side security and user trust in online payment systems. This paper addresses...
Attack MEDIUM
Botao 'Amber' Hu, Helena Rong
As the "agentic web" takes shape-billions of AI agents (often LLM-powered) autonomously transacting and collaborating-trust shifts from human...
6 months ago cs.HC cs.AI cs.MA
PDF
Attack MEDIUM
W. K. M Mithsara, Ning Yang, Ahmed Imteaj +2 more
The widespread integration of wearable sensing devices in Internet of Things (IoT) ecosystems, particularly in healthcare, smart homes, and...
6 months ago cs.LG cs.CR
PDF
Attack MEDIUM
Roy Rinberg, Adam Karvonen, Alexander Hoover +2 more
As large AI models become increasingly valuable assets, the risk of model weight exfiltration from inference servers grows accordingly. An attacker...
6 months ago cs.CR cs.LG
PDF
Attack MEDIUM
Kasimir Schulz, Amelia Kawasaki, Leo Ring
Large language models (LLMs) are widely deployed across various applications, often with safeguards to prevent the generation of harmful or...
6 months ago cs.CR cs.AI
PDF
Attack MEDIUM
David Lüdke, Tom Wollschläger, Paul Ungermann +2 more
We introduce a novel framework that transforms the resource-intensive (adversarial) prompt optimization problem into an \emph{efficient, amortized...
6 months ago cs.LG stat.ML
PDF
Attack MEDIUM
Chenghao Du, Quanfeng Huang, Tingxuan Tang +3 more
Large Language Models (LLMs) have transformed software development, enabling AI-powered applications known as LLM-based agents that promise to...
Attack MEDIUM
Haohua Duan, Liyao Xiang, Xin Zhang
Watermarking schemes for large language models (LLMs) have been proposed to identify the source of the generated text, mitigating the potential...
6 months ago cs.CR cs.CL cs.LG
PDF
Attack MEDIUM
Lisha Shuai, Jiuling Dong, Nan Zhang +5 more
Local Differential Privacy (LDP) is a widely adopted privacy-protection model in the Internet of Things (IoT) due to its lightweight, decentralized,...
Attack MEDIUM
Guangzhi Su, Shuchang Huang, Yutong Ke +3 more
Multimodal large language models (MLLMs) have achieved impressive performance across diverse tasks by jointly reasoning over textual and visual...
6 months ago cs.LG cs.CR
PDF
Attack MEDIUM
Elizabeth Lin, Jonah Ghebremichael, William Enck +5 more
Software supply chains, while providing immense economic and software development value, are only as strong as their weakest link. Over the past...
Attack MEDIUM
Myeongseob Ko, Nikhil Reddy Billa, Adam Nguyen +3 more
The memorization of training data in large language models (LLMs) poses significant privacy and copyright concerns. Existing data extraction methods,...
6 months ago cs.CL cs.AI
PDF
Attack MEDIUM
Bin Wang, YiLu Zhong, MiDi Wan +4 more
Large language models (LLMs) have become indispensable for automated code generation, yet the quality and security of their outputs remain a critical...
6 months ago cs.CR cs.AI
PDF
Attack MEDIUM
Jiaxiang Liu, Jiawei Du, Xiao Liu +2 more
Pre-trained vision-language models (VLMs) such as CLIP have demonstrated strong zero-shot capabilities across diverse domains, yet remain highly...
Attack MEDIUM
Devon A. Kelly, Christiana Chamon
Wide-bandgap (WBG) technologies offer unprecedented improvements in power system efficiency, size, and performance, but also introduce unique sensor...
6 months ago cs.CR cs.LG eess.SY
PDF
Attack MEDIUM
Sarah Ball, Niki Hasrati, Alexander Robey +4 more
Discrete optimization-based jailbreaking attacks on large language models aim to generate short, nonsensical suffixes that, when appended onto input...
6 months ago cs.CL cs.AI
PDF
Attack MEDIUM
Soham Hans, Stacy Marsella, Sophia Hirschmann +1 more
Understanding adversarial behavior in cybersecurity has traditionally relied on high-level intelligence reports and manual interpretation of attack...
6 months ago cs.CR cs.AI
PDF
Attack MEDIUM
Austin Jia, Avaneesh Ramesh, Zain Shamsi +2 more
Retrieval-Augmented Generation (RAG) has emerged as the dominant architectural pattern to operationalize Large Language Model (LLM) usage in Cyber...
6 months ago cs.CR cs.AI cs.IR
PDF
Attack MEDIUM
Daniel Gilkarov, Ran Dubin
Pretrained deep learning model sharing holds tremendous value for researchers and enterprises alike. It allows them to apply deep learning by...
Attack MEDIUM
Tushar Nayan, Ziqi Zhang, Ruimin Sun
With the increasing deployment of Large Language Models (LLMs) on mobile and edge platforms, securing them against model extraction attacks has...
6 months ago cs.CR cs.LG cs.SE
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial