Benchmark MEDIUM
Evgeny Grigorenko, David Stanojević, David Ilić +2 more
Modern Integrated Development Environments (IDEs) increasingly leverage Large Language Models (LLMs) to provide advanced features like code...
3 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Farnaz Soltaniani, Shoaib Razzaq, Mohammad Ghafari
Early detection of security bug reports (SBRs) is critical for timely vulnerability mitigation. We present an evaluation of prompt-based engineering...
3 months ago cs.CR cs.AI cs.LG
PDF
Tool MEDIUM
Waleed Khan Mohammed, Zahirul Arief Irfan Bin Shahrul Anuar, Mousa Sufian Mousa Mitani +2 more
Advanced Persistent Threats (APTs) are among the most challenging cyberattacks to detect. They are carried out by highly skilled attackers who...
3 months ago cs.CR cs.AI
PDF
Other LOW
Eduardo C. Garrido-Merchán, Adriana Constanza Cirera Tirschtigel
As Large Language Models become ubiquitous sources of health information, understanding their capacity to accurately represent stigmatized conditions...
Defense MEDIUM
Charles Westphal, Keivan Navaie, Fernando E. Rosas
Fine-tuned LLMs can covertly encode prompt secrets into outputs via steganographic channels. Prior work demonstrated this threat but relied on...
3 months ago cs.CR cs.AI
PDF
Defense MEDIUM
Haoyun Yang, Ronghong Huang, Yong Fang +4 more
Transport Layer Security (TLS) is fundamental to secure online communication, yet vulnerabilities in certificate validation that enable...
Attack LOW
Yilong Huang, Songze Li
Diffusion-based face swapping achieves state-of-the-art performance, yet it also exacerbates the potential harm of malicious face swapping to violate...
3 months ago cs.CV cs.CR cs.LG
PDF
Benchmark HIGH
Ivan K. Tung, Yu Xiang Shi, Alex Chien +2 more
Creating attack paths for cyber defence exercises requires substantial expert effort. Existing automation requires vulnerability graphs or exploit...
3 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Jaehee Kim, Pilsung Kang
Modern LLMs are increasingly accessed via black-box APIs, requiring users to transmit sensitive prompts, outputs, and fine-tuning data to external...
3 months ago cs.CR cs.CL
PDF
Benchmark LOW
Yanlin Wang, Ziyao Zhang, Chong Wang +5 more
Large Language Models (LLMs) have demonstrated remarkable capabilities in code generation, but their proficiency in producing secure code remains a...
3 months ago cs.CR cs.SE
PDF
Attack MEDIUM
Mingqian Feng, Xiaodong Liu, Weiwei Yang +3 more
Large Language Models (LLMs) are typically evaluated for safety under single-shot or low-budget adversarial prompting, which underestimates...
Benchmark HIGH
Miao Lin, Feng Yu, Rui Ning +6 more
Deep neural networks are highly susceptible to backdoor attacks, yet most defense methods to date rely on balanced data, overlooking the pervasive...
3 months ago cs.CR cs.CV cs.LG
PDF
Attack HIGH
Tanusree Debi, Wentian Zhu
Large language model (LLM) based agents are increasingly used to automate financial transactions, yet their reliance on contextual reasoning exposes...
3 months ago cs.CR cs.AI
PDF
Attack HIGH
Naen Xu, Jinghuai Zhang, Ping He +6 more
Large language models (LLMs) have been widely integrated into critical automated workflows, including contract review and job application processes....
3 months ago cs.CR cs.AI cs.CL
PDF
Attack HIGH
Aarush Noheria, Yuguang Yao
Vision-language models (VLMs) have become central to tasks such as visual question answering, image captioning, and text-to-image generation....
3 months ago cs.CV cs.AI
PDF
Tool HIGH
Chanwoo Park, Chanwoo Kim
Evasion attacks pose significant threats to AI systems, exploiting vulnerabilities in machine learning models to bypass detection mechanisms. The...
3 months ago cs.SD cs.CR eess.AS
PDF
Benchmark MEDIUM
Yavuz Bakman, Duygu Nur Yaldiz, Salman Avestimehr +1 more
Large Language Models (LLMs) are rarely static and are frequently updated in practice. A growing body of alignment research has shown that models...
Attack HIGH
Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer +1 more
Regression models are widely used in industrial processes, engineering, and in natural and physical sciences, yet their robustness to poisoning has...
3 months ago cs.LG cs.AI cs.CR
PDF
Attack MEDIUM
Amirhossein Taherpour, Xiaodong Wang
Federated learning (FL) enables collaborative model training while preserving data privacy, yet both centralized and decentralized approaches face...
3 months ago cs.LG cs.CR cs.DC
PDF
Survey HIGH
Pedro H. Barcha Correia, Ryan W. Achjian, Diego E. G. Caetano de Oliveira +5 more
The rapid advancement and widespread adoption of generative artificial intelligence (GenAI) and large language models (LLMs) has been accompanied by...
3 months ago cs.CR cs.AI cs.CL
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial