Jailbreaker: Automated jailbreak across multiple large language model chatbots
Large Language Models (LLMs) have revolutionized Artificial Intelligence (AI) services due
to their exceptional proficiency in understanding and generating human-like text. LLM …
to their exceptional proficiency in understanding and generating human-like text. LLM …
Humans and automation: Augmenting security operation centers
Background: Open Access Systematic Review Humans and Automation: Augmenting
Security Operation Centers by Jack Tilbury and Stephen Flowerday* School of Cyber …
Security Operation Centers by Jack Tilbury and Stephen Flowerday* School of Cyber …
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
Sok: Explainable machine learning for computer security applications
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …
increasingly challenging. To combat these attacks, security practitioners actively summarize …
Sok: History is a vast early warning system: Auditing the provenance of system intrusions
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …
an active area of public research. This resurgent interest is due in large part to the notion of …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
[PDF][PDF] Masterkey: Automated jailbreaking of large language model chatbots
Large language models (LLMs), such as chatbots, have made significant strides in various
fields but remain vulnerable to jailbreak attacks, which aim to elicit inappropriate responses …
fields but remain vulnerable to jailbreak attacks, which aim to elicit inappropriate responses …
Point cloud analysis for ML-based malicious traffic detection: Reducing majorities of false positive alarms
As an emerging security paradigm, machine learning (ML) based malicious traffic detection
is an essential part of automatic defense against network attacks. Powered by dedicated …
is an essential part of automatic defense against network attacks. Powered by dedicated …
Sometimes, you aren't what you do: Mimicry attacks against provenance graph host intrusion detection systems
Reliable methods for host-layer intrusion detection remained an open problem within
computer security. Recent research has recast intrusion detection as a provenance graph …
computer security. Recent research has recast intrusion detection as a provenance graph …