Jailbreaker: Automated jailbreak across multiple large language model chatbots

G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li… - arxiv preprint arxiv …, 2023 - arxiv.org
Large Language Models (LLMs) have revolutionized Artificial Intelligence (AI) services due
to their exceptional proficiency in understanding and generating human-like text. LLM …

Humans and automation: Augmenting security operation centers

J Tilbury, S Flowerday - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
Background: Open Access Systematic Review Humans and Automation: Augmenting
Security Operation Centers by Jack Tilbury and Stephen Flowerday* School of Cyber …

Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

Sok: Explainable machine learning for computer security applications

A Nadeem, D Vos, C Cao, L Pajola… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …

AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports

Z Li, J Zeng, Y Chen, Z Liang - European Symposium on Research in …, 2022 - Springer
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …

Sok: History is a vast early warning system: Auditing the provenance of system intrusions

MA Inam, Y Chen, A Goyal, J Liu, J Mink… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

[PDF][PDF] Masterkey: Automated jailbreaking of large language model chatbots

G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li… - Proc. ISOC …, 2024 - tianweiz07.github.io
Large language models (LLMs), such as chatbots, have made significant strides in various
fields but remain vulnerable to jailbreak attacks, which aim to elicit inappropriate responses …

Point cloud analysis for ML-based malicious traffic detection: Reducing majorities of false positive alarms

C Fu, Q Li, K Xu, J Wu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
As an emerging security paradigm, machine learning (ML) based malicious traffic detection
is an essential part of automatic defense against network attacks. Powered by dedicated …

Sometimes, you aren't what you do: Mimicry attacks against provenance graph host intrusion detection systems

A Goyal, X Han, G Wang, A Bates - 30th Network and Distributed System …, 2023 - par.nsf.gov
Reliable methods for host-layer intrusion detection remained an open problem within
computer security. Recent research has recast intrusion detection as a provenance graph …