Advanced Dynamic and Static Malware Analysis using LLMs Mon, May 12 2025 Research Malware Analysis AI LLM Cyber Security The increasing complexity of malware highlights the need for advanced analysis tools, both static and dynamic, for effective reverse engineering and behavioral analysis of a given sample. While static methods such as disassembly and code review remain crucial, many malware samples use packers and obfuscation techniques that necessitate memory captures and dynamic analysis [Dynamic, 2012]. Similarly, hooking system and API calls at lower levels provides a more comprehensive view of a program’s true behavior. It enables analysts to capture transient execution stages in a multi-layered malware
LLM Injection Cyber Resilient Assistants Sun, Jun 1 2025 Research AI LLM Cyber Security Cyber Resilience Prompt Injection jailbreak LLM injection-resilient cyber assistants using Constitutional AI guardrails, Adaptive Constitutional AI guardrails, DPO, and Unlearning.
LLM-based Assistant for L-x Security Operation Center (SOC) Analyst Tue, Oct 1 2024 Research Cyber Security Cyber Resilience SOC SIEM There is a notable increase in cyberattacks, targeting vital digital services like energy, water, oil plants, communication and transportation infrastructure, etc. The lack of right cybersecurity and resilience solutions can transform the blessing of the digital transformation into a curse, thus leaving significant societal threats and economic damage. Security Operation Centers (SOC) are therefore becoming a necessary part of every digital and critical infrastructure with the main roles of defining cybersecurity policies, processes, and implementing detection and response mechanisms and tools
Seamless Application of Post-Quantum Cryptography Tue, Jun 25 2024 Research Cyber Security Cyber Resilience Cryptography Post-Quantum Cryptography Quantum Computing is a promising computing paradigm that leverages quantum physics to overcome the trend declination of Moore's Law. While this is a substantial revolutionary boost to computing systems, it is rather disruptive to digital security that is genuinely built on cryptographic primitives like RSA, ECC, and AES. To give a feel of this boost, it would take a quantum computer only few hours to break a cryptographic primitive, whereas a decent supercomputer may need thousands of years. Although production-grade quantum computers may be a decade away, the assumption that their threat
Cyber Security and Resilience of LEO Satellite Constellations Sun, Jan 1 2023 Research Evolving Project New Space LEO Satellite Security Cyber Security Cyber Resilience Federated learning Collision Avoidance Debris Cyber Security and Resilience of LEO Satellite Constellations through Building PKI for inter-constellations, SW/HW updates, Collision and Debris Avoidance.
Trustworthy Autonomous Vehicles Architecture Sat, Jan 14 2023 Research Evolving Project Automous Vehicles autonomous driving Cyber Resilience Safety Savvy: Trustworthy Autonomous Vehicle Architecture Through Time-aware Adaptive AI Degradation