Tool MEDIUM
Hanna Foerster, Tom Blanchard, Kristina Nikolić +6 more
AI agents are vulnerable to prompt injection attacks, where malicious content hijacks agent behavior to steal credentials or cause financial loss....
Tool LOW
Aarya Doshi, Yining Hong, Congying Xu +3 more
Large language model (LLM)-based AI agents extend LLM capabilities by enabling access to tools such as data sources, APIs, search engines, code...
Tool MEDIUM
Yixiao Peng, Hao Hu, Feiyang Li +5 more
While virtualization and resource pooling empower cloud networks with structural flexibility and elastic scalability, they inevitably expand the...
2 months ago cs.CR cs.AI cs.LG
PDF
Tool HIGH
Hongyan Chang, Ergute Bao, Xinjian Luo +1 more
Large language models (LLMs) increasingly rely on retrieving information from external corpora. This creates a new attack surface: indirect prompt...
2 months ago cs.CR cs.AI
PDF
Tool HIGH
Harshil Parmar, Pushti Vyas, Prayers Khristi +1 more
As vulnerability research increasingly adopts generative AI, a critical reliance on opaque model outputs has emerged, creating a "trust gap" in...
2 months ago cs.CR cs.AI cs.SE
PDF
Tool LOW
Chalitha Handapangoda
The reliance of Large Language Models and Internet of Things systems on massive, globally distributed data flows creates systemic security and...
2 months ago cs.CR cs.LG
PDF
Tool HIGH
Junda Lin, Zhaomeng Zhou, Zhi Zheng +4 more
LLM agents operating in open environments face escalating risks from indirect prompt injection, particularly within the tool stream where manipulated...
2 months ago cs.CR cs.AI
PDF
Tool HIGH
Jingxiao Yang, Ping He, Tianyu Du +2 more
Recent advances in software vulnerability detection have been driven by Language Model (LM)-based approaches. However, these models remain vulnerable...
2 months ago cs.CR cs.AI
PDF
Tool HIGH
Zhaoqi Wang, Zijian Zhang, Daqing He +5 more
Large language models (LLMs) have demonstrated remarkable capabilities across diverse applications, however, they remain critically vulnerable to...
2 months ago cs.CR cs.AI
PDF
Tool HIGH
Keerthi Kumar. M, Swarun Kumar Joginpelly, Sunil Khemka +2 more
Background: Cyber-attacks have evolved rapidly in recent years, many individuals and business owners have been affected by cyber-attacks in various...
2 months ago cs.CR cs.AI cs.LG
PDF
Tool HIGH
Qiang Yu, Xinran Cheng, Chuanyi Liu
As LLM agents transition from digital assistants to physical controllers in autonomous systems and robotics, they face an escalating threat from...
2 months ago cs.AI cs.CL cs.CR
PDF
Tool HIGH
Hongming Fei, Zilong Hu, Prosanta Gope +1 more
Physical Unclonable Functions (PUFs) serve as lightweight, hardware-intrinsic entropy sources widely deployed in IoT security applications. However,...
Tool MEDIUM
Zhilun Zhou, Zihan Liu, Jiahe Liu +5 more
Large Language Model-based Multi-Agent Systems (LLM-based MAS), where multiple LLM agents collaborate to solve complex tasks, have shown impressive...
Tool HIGH
Yunhao Feng, Yige Li, Yutao Wu +6 more
Large language model (LLM) agents execute tasks through multi-step workflows that combine planning, memory, and tool use. While this design enables...
2 months ago cs.AI cs.CL
PDF
Tool LOW
Rasmus Erlemann, Charles Colyer Morris, Sanjyot Sathe
The emergence of large-scale quantum computing threatens widely deployed public-key cryptographic systems, creating an urgent need for...
Tool HIGH
Xiangdong Hu, Yangyang Jiang, Qin Hu +1 more
Multimodal Large Language Models (MLLMs) have become widely deployed, yet their safety alignment remains fragile under adversarial inputs. Previous...
Tool MEDIUM
Sofie Goethals, Foster Provost, João Sedoc
As generative AI systems become integrated into real-world applications, organizations increasingly need to be able to understand and interpret their...
2 months ago cs.LG cs.AI cs.CL
PDF
Tool LOW
Gongao Zhang, Haijiang Zeng, Lu Jiang
Financial institutions and regulators require systems that integrate heterogeneous data to assess risks from stock fluctuations to systemic...
2 months ago cs.LG q-fin.RM q-fin.ST
PDF
Tool MEDIUM
Md Ajoad Hasan, Dipayan Saha, Khan Thamid Hasan +5 more
The growing complexity of modern system-on-chip (SoC) and IP designs is making security assurance difficult day by day. One of the fundamental steps...
2 months ago cs.CR cs.AI
PDF
Tool MEDIUM
Arina Kharlamova, Youcheng Sun, Ting Yu
Private macOS frameworks underpin critical services and daemons but remain undocumented and distributed only as stripped binaries, complicating...
2 months ago cs.CR cs.AI
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial