Skip to main content

Showing 1–9 of 9 results for author: Habler, I

.
  1. arXiv:2506.13590  [pdf, ps, other

    cs.AI cs.CR cs.MA

    Agent Capability Negotiation and Binding Protocol (ACNBP)

    Authors: Ken Huang, Akram Sheriff, Vineeth Sai Narajala, Idan Habler

    Abstract: As multi-agent systems evolve to encompass increasingly diverse and specialized agents, the challenge of enabling effective collaboration between heterogeneous agents has become paramount, with traditional agent communication protocols often assuming homogeneous environments or predefined interaction patterns that limit their applicability in dynamic, open-world scenarios. This paper presents the… ▽ More

    Submitted 16 June, 2025; originally announced June 2025.

    Comments: 14 pages, 5 figures

  2. arXiv:2506.01900  [pdf, ps, other

    cs.AI cs.CE cs.CR

    COALESCE: Economic and Security Dynamics of Skill-Based Task Outsourcing Among Team of Autonomous LLM Agents

    Authors: Manish Bhatt, Ronald F. Del Rosario, Vineeth Sai Narajala, Idan Habler

    Abstract: The meteoric rise and proliferation of autonomous Large Language Model (LLM) agents promise significant capabilities across various domains. However, their deployment is increasingly constrained by substantial computational demands, specifically for Graphics Processing Unit (GPU) resources. This paper addresses the critical problem of optimizing resource utilization in LLM agent systems. We introd… ▽ More

    Submitted 2 June, 2025; originally announced June 2025.

    Comments: 20 pages, 2 figures, github linked

  3. arXiv:2506.01333  [pdf, ps, other

    cs.CR cs.AI cs.ET

    ETDI: Mitigating Tool Squatting and Rug Pull Attacks in Model Context Protocol (MCP) by using OAuth-Enhanced Tool Definitions and Policy-Based Access Control

    Authors: Manish Bhatt, Vineeth Sai Narajala, Idan Habler

    Abstract: The Model Context Protocol (MCP) plays a crucial role in extending the capabilities of Large Language Models (LLMs) by enabling integration with external tools and data sources. However, the standard MCP specification presents significant security vulnerabilities, notably Tool Poisoning and Rug Pull attacks. This paper introduces the Enhanced Tool Definition Interface (ETDI), a security extension… ▽ More

    Submitted 2 June, 2025; originally announced June 2025.

    Comments: 11 Pages, 10 figures, Github links in introduction

  4. arXiv:2505.19301  [pdf, other

    cs.CR cs.AI cs.MA

    A Novel Zero-Trust Identity Framework for Agentic AI: Decentralized Authentication and Fine-Grained Access Control

    Authors: Ken Huang, Vineeth Sai Narajala, John Yeoh, Jason Ross, Ramesh Raskar, Youssef Harkati, Jerry Huang, Idan Habler, Chris Hughes

    Abstract: Traditional Identity and Access Management (IAM) systems, primarily designed for human users or static machine identities via protocols such as OAuth, OpenID Connect (OIDC), and SAML, prove fundamentally inadequate for the dynamic, interdependent, and often ephemeral nature of AI agents operating at scale within Multi Agent Systems (MAS), a computational system composed of multiple interacting int… ▽ More

    Submitted 28 May, 2025; v1 submitted 25 May, 2025; originally announced May 2025.

    Comments: 24 Pages, 5 figures, 2 tables, edit: added a missed Author

  5. arXiv:2505.10609  [pdf, other

    cs.CR cs.AI cs.MA cs.NI

    Agent Name Service (ANS): A Universal Directory for Secure AI Agent Discovery and Interoperability

    Authors: Ken Huang, Vineeth Sai Narajala, Idan Habler, Akram Sheriff

    Abstract: The proliferation of AI agents requires robust mechanisms for secure discovery. This paper introduces the Agent Name Service (ANS), a novel architecture based on DNS addressing the lack of a public agent discovery framework. ANS provides a protocol-agnostic registry infrastructure that leverages Public Key Infrastructure (PKI) certificates for verifiable agent identity and trust. The architecture… ▽ More

    Submitted 15 May, 2025; originally announced May 2025.

    Comments: 15 pages, 6 figures, 6 code listings, Supported and endorsed by OWASP GenAI ASI Project

  6. arXiv:2504.19951  [pdf, other

    cs.CR cs.AI

    Securing GenAI Multi-Agent Systems Against Tool Squatting: A Zero Trust Registry-Based Approach

    Authors: Vineeth Sai Narajala, Ken Huang, Idan Habler

    Abstract: The rise of generative AI (GenAI) multi-agent systems (MAS) necessitates standardized protocols enabling agents to discover and interact with external tools. However, these protocols introduce new security challenges, particularly; tool squatting; the deceptive registration or representation of tools. This paper analyzes tool squatting threats within the context of emerging interoperability standa… ▽ More

    Submitted 28 April, 2025; originally announced April 2025.

    Comments: 12 pages, 4 figures, 1 table

  7. arXiv:2504.19521  [pdf, other

    cs.CR

    Security Steerability is All You Need

    Authors: Itay Hazan, Idan Habler, Ron Bitton, Itsik Mantin

    Abstract: The adoption of Generative AI (GenAI) in various applications inevitably comes with expanding the attack surface, combining new security threats along with the traditional ones. Consequently, numerous research and industrial initiatives aim to mitigate these security threats in GenAI by developing metrics and designing defenses. However, while most of the GenAI security work focuses on universal t… ▽ More

    Submitted 9 May, 2025; v1 submitted 28 April, 2025; originally announced April 2025.

  8. arXiv:2504.16902  [pdf, other

    cs.CR cs.AI

    Building A Secure Agentic AI Application Leveraging A2A Protocol

    Authors: Idan Habler, Ken Huang, Vineeth Sai Narajala, Prashant Kulkarni

    Abstract: As Agentic AI systems evolve from basic workflows to complex multi agent collaboration, robust protocols such as Google's Agent2Agent (A2A) become essential enablers. To foster secure adoption and ensure the reliability of these complex interactions, understanding the secure implementation of A2A is essential. This paper addresses this goal by providing a comprehensive security analysis centered o… ▽ More

    Submitted 2 May, 2025; v1 submitted 23 April, 2025; originally announced April 2025.

    Comments: 13 pages, 4 figures, 1 table, Authors contributed equally to this work, typos corrected, references added

  9. arXiv:2504.08623  [pdf, other

    cs.CR cs.AI

    Enterprise-Grade Security for the Model Context Protocol (MCP): Frameworks and Mitigation Strategies

    Authors: Vineeth Sai Narajala, Idan Habler

    Abstract: The Model Context Protocol (MCP), introduced by Anthropic, provides a standardized framework for artificial intelligence (AI) systems to interact with external data sources and tools in real-time. While MCP offers significant advantages for AI integration and capability extension, it introduces novel security challenges that demand rigorous analysis and mitigation. This paper builds upon foundatio… ▽ More

    Submitted 2 May, 2025; v1 submitted 11 April, 2025; originally announced April 2025.

    Comments: 11 pages, 2 figures, 1 table, typos corrected, references added