Samuel Addington (California State University Long Beach)

Security Operations Centers (SOCs) are moving from static SOAR playbooks to agentic incident response: LLM-driven operators that can query telemetry and execute remediation actions. The main barrier to safe deployment is not intent misalignment alone, but operational unsafety: a hallucinating or prompt-injected agent can trigger Tier-0 outages (e.g., isolating a domain controller), violate change-control, or degrade core monitoring and identity reachability.

We present Agent-Lock, a bounded-autonomy enforcement pattern tailored to SOC engineering. Agent-Lock introduces (i) SOC-specific constraints that are difficult to encode in generic shielding frameworks—multi-principal change-control approvals, maintenance windows, and time-scoped autonomy budgets (blast-radius over assets and identities); (ii) a multi-stage neurosymbolic pipeline that (a) sanitizes untrusted log fields, (b) validates plan-level actions against CMDB/IAM/change-control state, and (c) enforces sequence-level invariants such as continued reachability to core telemetry and identity providers; and (iii) an adaptive provenance model that updates source trust online from incident outcomes while preserving a hard safety invariant.

We formalize a Tier-0 non-disruption property under single-log adversarial manipulation and prove it under explicit assumptions. On a 50-case synthetic incident suite (5 runs per case), Agent-Lock prevents high-risk actions that the baseline agent executes while retaining most valid remediation utility.

View More Papers

Chasing Shadows: Pitfalls in LLM Security Research

Jonathan Evertz (CISPA Helmholtz Center for Information Security), Niklas Risse (Max Planck Institute for Security and Privacy), Nicolai Neuer (Karlsruhe Institute of Technology), Andreas Müller (Ruhr University Bochum), Philipp Normann (TU Wien), Gaetano Sapia (Max Planck Institute for Security and Privacy), Srishti Gupta (Sapienza University of Rome), David Pape (CISPA Helmholtz Center for Information Security),…

Read More

Work-in-progress: JaVulIn: Scalable Vulnerability Injection for JavaScript Web Applications

Dominic Troppmann (CISPA Helmholtz Center for Information Security), Cristian-Alexandru Staicu (Endor Labs), Aurore Fass (Inria Centre at Université Côte d’Azur)

Read More

MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness

Xiaoyun xu (Radboud University), Shujian Yu (Vrije Universiteit Amsterdam), Zhuoran Liu (Radboud University), Stjepan Picek (Radboud University)

Read More