Benchmark MEDIUM
Gauri Pradhan, Joonas Jälkö, Santiago Zanella-Bèguelin +1 more
Training machine learning models with differential privacy (DP) limits an adversary's ability to infer sensitive information about the training data....
3 months ago cs.CR cs.LG
PDF
Benchmark LOW
Junjian Wang, Lidan Zhao, Xi Sheryl Zhang
Ensuring the safety of embodied AI agents during task planning is critical for real-world deployment, especially in household environments where...
Benchmark MEDIUM
Rebeka Toth, Tamas Bisztray, Richard Dubniczky
Phishing and spam emails remain a major cybersecurity threat, with attackers increasingly leveraging Large Language Models (LLMs) to craft highly...
3 months ago cs.CR cs.AI cs.DB
PDF
Benchmark MEDIUM
Rebeka Toth, Tamas Bisztray, Nils Gruschka
In this paper, we introduce a metadata-enriched generation framework (PhishFuzzer) that seeds real emails into Large Language Models (LLMs) to...
3 months ago cs.CR cs.AI cs.DB
PDF
Benchmark MEDIUM
Di Zhu, Chen Xie, Ziwei Wang +1 more
New York City reports over one hundred thousand motor vehicle collisions each year, creating substantial injury and public health burden. We present...
Benchmark MEDIUM
Momoko Shiraishi, Yinzhi Cao, Takahiro Shinagawa
Command-line interface (CLI) fuzzing tests programs by mutating both command-line options and input file contents, thus enabling discovery of...
Benchmark MEDIUM
Xuebo Qiu, Mingqi Lv, Yimei Zhang +4 more
Provenance-based threat hunting identifies Advanced Persistent Threats (APTs) on endpoints by correlating attack patterns described in Cyber Threat...
Benchmark MEDIUM
David Amebley, Sayanton Dibbo
In the age of agentic AI, the growing deployment of multi-modal models (MMs) has introduced new attack vectors that can leak sensitive training data...
4 months ago cs.CV cs.AI cs.CR
PDF
Benchmark MEDIUM
Abhijeet Pathak, Suvadra Barua, Dinesh Gudimetla +4 more
Large language models (LLMs) and autonomous coding agents are increasingly used to generate software across a wide range of domains. Yet a core...
4 months ago cs.SE cs.AI cs.CR
PDF
Benchmark MEDIUM
Angelo Gaspar Diniz Nogueira, Kayua Oleques Paim, Hendrio Bragança +2 more
The ever-increasing number of Android devices and the accelerated evolution of malware, reaching over 35 million samples by 2024, highlight the...
4 months ago cs.CR cs.AI cs.LG
PDF
Benchmark MEDIUM
Yu Cui, Yifei Liu, Hang Fu +4 more
Research on the safety evaluation of large language models (LLMs) has become extensive, driven by jailbreak studies that elicit unsafe responses....
Benchmark MEDIUM
Rong Feng, Suman Saha
Obfuscation poses a persistent challenge for software engineering tasks such as program comprehension, maintenance, testing, and vulnerability...
Benchmark MEDIUM
Andrew Maranhão Ventura D'addario
The integration of Large Language Models (LLMs) into healthcare demands a safety paradigm rooted in \textit{primum non nocere}. However, current...
4 months ago cs.CY cs.AI cs.CL
PDF
Benchmark LOW
Muhammad Usman Shahid, Chuadhry Mujeeb Ahmed, Rajiv Ranjan
The security of code generated by large language models (LLMs) is a significant concern, as studies indicate that such code often contains...
4 months ago cs.AI cs.CR
PDF
Benchmark HIGH
Juncheng Li, Yige Li, Hanxun Huang +5 more
Backdoor attacks undermine the reliability and trustworthiness of machine learning systems by injecting hidden behaviors that can be maliciously...
Benchmark MEDIUM
Benyamin Tafreshian
Large language models (LLMs) are becoming increasingly integrated into mainstream development platforms and daily technological workflows, typically...
Benchmark MEDIUM
Saeid Jamshidi, Amin Nikanjam, Negar Shahabi +4 more
As the number of connected IoT devices continues to grow, securing these systems against cyber threats remains a major challenge, especially in...
Benchmark MEDIUM
Aram Vardanyan
Browser agents enable autonomous web interaction but face critical reliability and security challenges in production. This paper presents findings...
Benchmark HIGH
Zhijie Chen, Xiang Chen, Ziming Li +2 more
Context: Software Vulnerability Assessment (SVA) plays a vital role in evaluating and ranking vulnerabilities in software systems to ensure their...
Benchmark MEDIUM
Patrick Amadeus Irawan, Ikhlasul Akmal Hanif, Muhammad Dehan Al Kautsar +3 more
Although the cultural dimension has been one of the key aspects in evaluating Vision-Language Models (VLMs), their ability to remain stable across...
4 months ago cs.CV cs.CL
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial