Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "

Showing 1076 through 1100 of 16292 matching records.
Project Pages https://csrc.nist.gov/projects/measuring-security-risk-in-enterprise-networks/security-of-machine-learning-systems

Machine learning (ML) systems are more and more widely deployed in multiple sectors. Autonomous driving cars are using object detection systems to process the images/videos from the cameras to understand the traffic signals and real time traffic around them. ML has been used to translate text from one language to another in several systems. At the same time, ML systems also introduce new security threats that are not seen in traditional software and network systems. For example, data poisoning and adversarial examples attacks generate incorrect output; membership and denial of service attacks...

Publications CSWP 46 (Final) June 30, 2025
https://csrc.nist.gov/pubs/cswp/46/analyzing-collusion-threats-in-the-semiconductor-s/final

Abstract: This work proposes a framework for analyzing threats related to the semiconductor supply chain. The framework introduces a metric that quantifies the severity of different threats subjected to a collusion of adversaries from different stages of the supply chain. Two different case studies are provid...

Publications SP 800-228 (Final) June 27, 2025
https://csrc.nist.gov/pubs/sp/800/228/final

Abstract: Modern enterprise IT systems rely on a family of application programming interfaces (APIs) for integration to support organizational business processes. Hence, a secure deployment of APIs is critical for overall enterprise security. This, in turn, requires the identification of risk factors or vulne...

Publications Journal Article (Final) June 26, 2025
https://csrc.nist.gov/pubs/journal/2025/06/can-ai-fix-buggy-code/final

Journal: Computer (IEEE Computer) Abstract: This article reviews the current human–large language models collaboration approach to bug fixing and points out the research directions toward (the development of) autonomous program repair artificial intelligence agents.

Publications Conference Paper (Final) June 24, 2025
https://csrc.nist.gov/pubs/conference/2025/06/24/hallucination-detection-in-llms-using-diversion-de/final

Conference: 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025 Abstract: Large language models (LLMs) have emerged as a powerful tool for retrieving knowledge through seamless, human-like interactions. Despite their advanced text generation capabilities, LLMs exhibit hallucination tendencies, where they generate factually incorrect statements and fabricate knowledge, und...

Publications CSWP 36E (Initial Public Draft) June 17, 2025
https://csrc.nist.gov/pubs/cswp/36/e/5g-network-security-design-principles/ipd

Abstract: This white paper describes the network infrastructure design principles that commercial and private 5G network operators are encouraged to use to improve cybersecurity and privacy. Such a network infrastructure isolates types of 5G network traffic from each other: data plane, signaling, and operatio...

Publications SP 1800-35 (Final) June 10, 2025
https://csrc.nist.gov/pubs/sp/1800/35/final

Abstract: A zero trust architecture (ZTA) enables secure authorized access to enterprise resources that are distributed across on-premises and multiple cloud environments, while enabling a hybrid workforce and partners to access resources from anywhere, at any time, from any device in support of the organizat...

Publications CSWP 45 (Final) June 5, 2025
https://csrc.nist.gov/pubs/cswp/45/metrics-and-methodology-for-hardware-security-cons/final

Abstract: Although hardware is commonly believed to be security-resilient, it is often susceptible to vulnerabilities that arise from design and implementation flaws. These flaws can jeopardize the hardware’s security, its operations, and critical user information. This investigation presents a comprehensive...

Publications Conference Paper (Final) June 5, 2025
https://csrc.nist.gov/pubs/conference/2025/06/05/exploring-prompt-patterns-for-effective-vulnerabil/final

Conference: 2025 ACM International Workshop on Security and Privacy Analytics Abstract: Large Language Models (LLMs) have shown promise in automating code vulnerability repair, but their effectiveness in handling real-world code remains limited. This paper investigates the capability of LLMs, in repairing vulnerabilities and proposes a systematic approach to enhance their performance t...

Publications SP 800-18 Rev. 2 (Initial Public Draft) June 4, 2025
https://csrc.nist.gov/pubs/sp/800/18/r2/ipd

Abstract: The system security plan, system privacy plan, and cybersecurity supply chain risk management plan are collectively referred to as system plans. They describe the purpose of the system, the operational status of the controls selected and allocated for meeting risk management requirements, and the re...

Publications IR 8557 (Final) May 23, 2025
https://csrc.nist.gov/pubs/ir/8557/final

Abstract: This document reports on the Virtual Workshop on Usable Cybersecurity and Privacy for Immersive Technologies (the Workshop) hosted by the Symposium in Usable Privacy and Security (SOUPS). The Workshop was held on August 7th, 2024 before the in-person symposium held August 11th and 12th, 2024 in Phil...

Publications CSWP 41 (Final) May 19, 2025
https://csrc.nist.gov/pubs/cswp/41/likely-exploited-vulnerabilities-a-proposed-metric/final

Abstract: This work presents a proposed security metric to determine the likelihood that a vulnerability has been observed to be exploited. Only a small fraction of the tens of thousands of software and hardware vulnerabilities that are published every year will be exploited. Predicting which ones is importan...

Publications IR 8572 (Final) May 13, 2025
https://csrc.nist.gov/pubs/ir/8572/final

Abstract: This report summarizes discussions held at the March 5, 2025 "Workshop on Foundational Cybersecurity Activities for IoT Device Manufacturers” organized by the NIST Cybersecurity for the Internet of Things (IoT) program. This workshop follows an earlier event held in December 2024 titled “Workshop on...

Publications IR 8259 Rev. 1 (Initial Public Draft) May 13, 2025
https://csrc.nist.gov/pubs/ir/8259/r1/ipd

Abstract: Internet of Things (IoT) products often lack product cybersecurity capabilities their customers—organizations and individuals—can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving the securability of their IoT products by providing necess...

Publications IR 7621 Rev. 2 (Initial Public Draft) May 1, 2025
https://csrc.nist.gov/pubs/ir/7621/r2/ipd

Abstract: This report is designed to help small firms use the NIST Cybersecurity Framework (CSF) 2.0 to begin managing their cybersecurity risks. The document is tailored to the smallest of businesses—those with no employees, or “non-employer” firms. These firms are also often colloquially referred to as “sol...

Publications SP 800-234 (Initial Public Draft) May 1, 2025
https://csrc.nist.gov/pubs/sp/800/234/ipd

Abstract: High-performance computing (HPC) systems provide fundamental computing infrastructure for large-scale artificial intelligence (AI) and machine learning (ML) model training, big data analysis, and complex simulations at exceptional speeds. Securing HPC systems is essential for safeguarding AI models,...

Publications SP 800-236 (Final) April 28, 2025
https://csrc.nist.gov/pubs/sp/800/236/final

Abstract: Throughout Fiscal Year 2024 (FY 2024) — from October 1, 2023, through September 30, 2024 — the NIST Information Technology Laboratory (ITL) Cybersecurity and Privacy Program successfully responded to numerous challenges and opportunities in security and privacy. This Annual Report highlights the ITL...

Publications IR 8562 (Final) April 16, 2025
https://csrc.nist.gov/pubs/ir/8562/final

Abstract: This report summarizes the feedback received by the NIST Cybersecurity for the Internet of Things (IoT) program at the in-person and hybrid workshop on "Updating Manufacturer Guidance for Securable Connected Product Development" held in December 2024. The purpose of this workshop was to consider how...

Publications Conference Paper (Final) April 15, 2025
https://csrc.nist.gov/pubs/conference/2025/04/15/data-frequency-coverage-impact-on-ai-performance/final

Conference: 2025 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) Abstract: Artificial Intelligence (AI) models use statistical learning over data to solve complex problems for which straightforward rules or algorithms may be difficult or impossible to design; however, a side effect is that models that are complex enough to sufficiently represent the function may be uninter...

Publications CSWP 42 (Initial Public Draft) April 14, 2025
https://csrc.nist.gov/pubs/cswp/42/towards-automating-iot-security-implementing-trust/ipd

Abstract: This document provides an overview of trusted Internet of Things (IoT) device network-layer onboarding, a capability for securely providing IoT devices with their local network credentials in a manner that helps to ensure that the network is not put at risk as new IoT devices are connected to it— en...

Publications CSWP 40 (Initial Public Draft) April 14, 2025
https://csrc.nist.gov/pubs/cswp/40/nist-privacy-framework-11/ipd

Abstract: The NIST Privacy Framework 1.1 is a voluntary tool developed in collaboration with stakeholders intended to help organizations identify and manage privacy risk to build innovative products and services while protecting individuals’ privacy. It provides high-level privacy risk management outcomes tha...

Publications IR 8552 (Final) April 11, 2025
https://csrc.nist.gov/pubs/ir/8552/final

Abstract: This report introduces the cryptographic accordion as a tweakable, variable-input-length strong pseudorandom permutation (VIL-SPRP) that is constructed from an underlying block cipher. An accordion facilitates the cryptographic processing of messages of various sizes while offering enhanced security...

Publications SP 800-81 Rev. 3 (Initial Public Draft) April 10, 2025
https://csrc.nist.gov/pubs/sp/800/81/r3/ipd

Abstract: This document provides Domain Name System (DNS) deployment guidelines to secure the DNS protocol and infrastructure, mitigate misuse or misconfiguration, and provide an additional layer of network security as part of a zero trust and/or defense-in-depth security risk management approach. This introd...

<< first   < previous   32     33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56  next >  last >>