ð¡ïžããã³ããã€ã³ãžã§ã¯ã·ã§ã³ãããããã³ã«ãšã¯ã¹ããã€ããŸã§ïŒLLMé§åAIãšãŒãžã§ã³ãã®ã¯ãŒã¯ãããŒã«ãããè åš | From Prompt Injections to Protocol Exploits: Threats in LLM-Powered AI Agents WorkflowsðãReelPaperã
ãèè
ã
Mohamed Amine Ferrag, Norbert Tihanyi, Djallel Hamouda, Leandros Maglaras, Merouane Debbah
ãæŠèŠãhttps://arxiv.org/abs/2506.23260
æ§é åããã颿°åŒã³åºãã€ã³ã¿ãŒãã§ãŒã¹ãåããå€§èŠæš¡èšèªã¢ãã«ïŒLLMïŒã«ããé§åãããèªåŸå AI ãšãŒãžã§ã³ãã¯ããªã¢ã«ã¿ã€ã ã®ããŒã¿ååŸãè€éãªèšç®ããããŠå€æ®µéã®ãªãŒã±ã¹ãã¬ãŒã·ã§ã³ã«ãããŠèœåãåçã«æ¡åŒµããŠããããããããã©ã°ã€ã³ãã³ãã¯ã¿ããšãŒãžã§ã³ãéãããã³ã«ã®ççºçãªå¢å ãçºèŠã¡ã«ããºã ãã»ãã¥ãªãã£æ £è¡ã®æŽåãäžåãã倿§ãªè åšã«ãããããè匱ãªçµ±åãæããŠãããæ¬ãµãŒãã€ã§ã¯ãLLM ãšãŒãžã§ã³ãã»ãšã³ã·ã¹ãã ã«ããããã¹ãâããŒã«ããã³ãšãŒãžã§ã³ãâãšãŒãžã§ã³ãéä¿¡ãç¶²çŸ ãããåã®çµ±äžçãã€ãšã³ãããŒãšã³ããªè åšã¢ãã«ãæç€ºããæ»æè ã®èœåãšç®çã圢åŒåãã30 以äžã®æ»æææ³ãã«ã¿ãã°åãããå ·äœçã«ã¯ãè åšã¢ãã«ã 4 ã€ã®é åã«æŽçããïŒâ å ¥åæäœïŒäŸïŒããã³ããã€ã³ãžã§ã¯ã·ã§ã³ãé·æã³ã³ããã¹ãä¹ã£åãããã«ãã¢ãŒãã«æµå¯Ÿå ¥åïŒãâ¡ã¢ãã«äŸµå®³ïŒäŸïŒããã³ããïŒãã©ã¡ãŒã¿ã¬ãã«ã®ããã¯ãã¢ãè€åããã³æå·åããããã«ãããã¯ãã¢ãæ±ææŠç¥ïŒãâ¢ã·ã¹ãã ããã³ãã©ã€ãã·æ»æïŒäŸïŒææ©çãµã€ããã£ãã«ãã¡ã³ããŒã·ããæšè«ãæ€çŽ¢æ±æããœãŒã·ã£ã«ãšã³ãžãã¢ãªã³ã°ã·ãã¥ã¬ãŒã·ã§ã³ïŒãâ£ãããã³ã«è匱æ§ïŒäŸïŒModel Context Protocol (MCP)ãAgent Communication Protocol (ACP)ãAgent Network Protocol (ANP)ãAgent-to-Agent (A2A) ãããã³ã«ã«å¯Ÿãããšã¯ã¹ããã€ãïŒãåã«ããŽãªã«ã€ããŠä»£è¡šçãªã·ããªãªãã¬ãã¥ãŒããçŸå®çãªå®è¡å¯èœæ§ãè©äŸ¡ããæ¢åé²åŸ¡çãæ€èšŒãããæã ã®è åšã¿ã¯ãœããã«åºã¥ããåçä¿¡é Œç®¡çãšæå·åŠçåºèªè¿œè·¡ã«ãã MCP å±éã®ä¿è·ããšãŒãžã§ã³ãã£ã㯠Web ã€ã³ã¿ãŒãã§ãŒã¹ã®èšèšãšåŒ·åããã«ããšãŒãžã§ã³ãããã³ãã§ãã¬ãŒãããç°å¢ã§ã®ã¬ãžãªãšã³ã¹ç¢ºä¿ãªã©ãäž»èŠãªæªè§£æ±ºèª²é¡ãšä»åŸã®ç ç©¶æ¹åãç¹å®ãããæ¬ç ç©¶ã¯ãå ç¢ãªé²åŸ¡æ©æ§ã®èšèšãšãå埩åãã LLM ãšãŒãžã§ã³ã ã¯ãŒã¯ãããŒã®ãã¹ããã©ã¯ãã£ã¹ç¢ºç«ãå°ãå æ¬çãªãªãã¡ã¬ã³ã¹ãæäŸããã
ããã€ã³ããŸãšãðâšã
ã⢠ð äœãã¹ãŽãïŒ
ãâ⢠LLM ãšãŒãžã§ã³ãåãâåâã®çµ±äžãšã³ãããŒãšã³ãè
åšã¢ãã«ãæ§ç¯
ã⢠ð ïž è
åš 4 ãã¡ã€ã³
ãâ1. å
¥åæäœã2. ã¢ãã«äŸµå®³ã3. ã·ã¹ãã ïŒãã©ã€ãã·æ»æã4. ãããã³ã«è匱æ§
ãâ¢ ð¡ æ»æãã¯ããã¯
ãâ⢠30 + ã®æ»æãã¿ãŒã³ãäœç³»åãå®äŸã»é²åŸ¡çãæŽç
ã⢠â
ã€ã³ãã¯ã
ãâ⢠åçä¿¡é Œç®¡çãæå·çããããã³ã¹ãªã©ä»åŸã®ç 究課é¡ãææ¡
ã⢠ð å¿çš
ãâ⢠ã»ãã¥ã¢ãªãšãŒãžã§ã³ã Web ã€ã³ã¿ãŒãã§ãŒã¹èšèšæéãæäŸ
ðãarXivãªã³ã¯ã
https://arxiv.org/abs/2506.23260
𧪠å
容
æ¬åç»ã¯ãLLM ãšãŒãžã§ã³ã ãšã³ã·ã¹ãã ã俯ç°ããŠè
åšã¢ãã«ãäœç³»åãããµãŒãã€è«æ
âFrom Prompt Injections to Protocol Exploits: Threats in LLM-Powered AI Agents Workflowsâ
ïŒarXiv:2506.23260, 2025ïŒã 1 åã§ç޹ä»ãã ReelPaper ã«ããèªåçæã·ã§ãŒãã§ãã
ð å
è«æïŒCC BY 4.0ïŒ
Mohamed Amine Ferrag et al.
âFrom Prompt Injections to Protocol Exploits: Threats in LLM-Powered AI Agents Workflowsâ
arXiv:2506.23260 [cs.CR], 2025
https://arxiv.org/abs/2506.23260
© 2025 Authors. Licensed under Creative Commons Attribution 4.0 International.
https://creativecommons.org/licenses/by/4.0/
ð€ Voice
powered by VOICEVOXâ(VOICEVOX: ããã ãã)
https://voicevox.hiroshiba.jp/term/
âïž å
責
æ¬åç»ã¯äžèš CC BY 4.0 è«æã®å³è¡šã»èŠæšãæ¹å€ããŠäœ¿çšããŠããŸãã
åèè
ã¯åç»å
å®¹ãæ¯æã»ä¿èšŒãããã®ã§ã¯ãããŸããã
èåæš©ã»åæšæš©ãªã© CC ã©ã€ã»ã³ã¹ãã«ããŒããªãæš©å©ã¯åæš©å©è
ã«åž°å±ããŸãã
ãŸããæ¬åç»ã«ã¯è¿œå çãªæ³çã»æè¡çå¶éã¯ãããŸãã
License : CC BY 4.0
ããæèŠåéã
æ¬åç»ã«ã¯èª€ããäžæ£ç¢ºãªç¹ãå«ãŸããŠããå¯èœæ§ããããŸãã
ãæ°ã¥ãã®ç¹ãããã°ããã²ã³ã¡ã³ãæ¬ã§ãç¥ãããã ããã
ãŸããåç»åããŠã»ããè«æãåéããããŸããããã³ã¡ã³ãæ¬ã§ãç¥ãããã ããã
ð ReelPaperãžããããïŒïŒ
â±ïž ææ°ã®è«æã ãã£ãäžå ã§ã€ãããŸãïŒ
ð€ ReelPaperãšã¯ïŒ
倧éã®è«æãå¢ãã AI æä»£ ã«åããŠã
ð ïž AI ãæŽ»çšã çºèŠ â çè§£ â å
±æ ãé«éåã
ð ç ç©¶ç¥ã 誰ããã¢ã¯ã»ã¹ ã§ããäžçãç®æããŸãïŒ
ð± ã¹ããããæè»œã«ãã£ããã¢ãã ããŸãããïŒ
ð©âð¬ ç ç©¶è
ã»åŠçã¯ãã¡ããã
ð ãã¯ãããžãŒãç§åŠã«èå³ããã ãã¹ãŠã®äººãž ïŒ
#ai #security #promptinjection #llm #è«æè§£èª¬ #shorts #ReelPaper


Comments