Similar Items: When the Ruler is Broken: Parsing-Induced Suppression in LLM-Based Security Log Evaluation
- Heimdallr: Characterizing and Detecting LLM-Induced Security Risks in GitHub CI Workflows
- When Alignment Isn't Enough: Response-Path Attacks on LLM Agents
- Integrating Log-Based Security Analytics in Agile Workflows: A Real-World Experience Report
- SkCC: Portable and Secure Skill Compilation for Cross-Framework LLM Agents
- Self-Adaptive Multi-Agent LLM-Based Security Pattern Selection for IoT Systems
- When RAG Chatbots Expose Their Backend: An Anonymized Case Study of Privacy and Security Risks in Patient-Facing Medical AI