From Threat Reports to Security Knowledge: Building an LLM-based Pipeline for AI Systems
Building structured and reusable security knowledge from unstructured threat reports is a challenging and predominantly manual task in the AI security domain. Although existing knowledgebases systematically organize adversarial threats, their reliance on manual curation by security experts limits scalability and responsiveness to new threats. Automating the structuring and maintenance of such knowledgebases not only improves scalability but also bridges the gap between threat intelligence and software engineering practices, facilitating the secure-by-design development of AI systems. We propose a pipeline based on a large language model that automatically extracts, refines, and classifies threat actions from incident reports into structured security knowledge. Our pipeline encompasses four critical phases: (1) threat-action extraction, (2) quality-guided refinement, (3) mapping to an established threat classification framework, and (4) structured knowledge construction with metadata generation. Evaluation shows 0.85 precision in extraction, with refinement further enhancing coverage. The classification phase effectively maps actions to known threat patterns while also identifying potentially novel threats that have yet to be documented, supporting the continuous evolution of the knowledgebase. These results lay the groundwork for scalable, automated construction and maintenance of AI security knowledge.
Tue 17 MarDisplayed time zone: Athens change
14:00 - 15:30 | |||
14:15 15mTalk | CVE-Poisoning: Towards Human-Guided and Cost-Effective Detection of a Novel AI Data Poisoning Attack Workshops & Tutorials Norbert Szolnoki Sándor Department of Software Engineering, University of Szeged, Gergő Balogh Department of Software Engineering, University of Szeged, Szabina Herman University of Szeged, Gabor Antal Department of Software Engineering, University of Szeged | ||
14:30 15mTalk | An LLM-based Approach for Automatic ML Prototype Review Workshops & Tutorials Selin Coban Research Group Software Construction RWTH Aachen University, Miguel Perez Research Group Software Construction RWTH Aachen University, Cagatay Akpinar Research Group Software Construction RWTH Aachen University, Baran Tanriverdi Research Group Software Construction RWTH Aachen University, Horst Lichter RWTH Aachen University | ||
14:45 15mTalk | From Threat Reports to Security Knowledge: Building an LLM-based Pipeline for AI Systems Workshops & Tutorials Takuma Tsuchida Waseda University, Yuya Fujiwara Waseda University, Hironori Washizaki Waseda University, Naoyasu Ubayashi Waseda University | ||
15:00 15mTalk | Enhancing Security Requirements Coverage via RAG and Automated Feedback Loops Workshops & Tutorials Giuseppe Sabetta University of Salerno, Alfonso Cannavale University of Salerno, Fabio Palomba University of Salerno, Andrea De Lucia University of Salerno | ||
15:15 15mTalk | Empirical Evaluation of Open Source Large Language Models for Paper Selection: Are LLMs Trustworthy Tools for Scoping Reviews? Workshops & Tutorials Homayoun Safarpour University of Szeged, Gergő Balogh Department of Software Engineering, University of Szeged, Aondowase James Orban | ||