{"id":8121,"date":"2026-01-23T05:09:00","date_gmt":"2026-01-22T20:09:00","guid":{"rendered":"https:\/\/devneko.jp\/wordpress\/?p=8121"},"modified":"2026-01-18T15:15:09","modified_gmt":"2026-01-18T06:15:09","slug":"camels-can-use-computers-too-system-level-security-for-computer-use-agents","status":"publish","type":"post","link":"https:\/\/devneko.jp\/wordpress\/?p=8121","title":{"rendered":"CaMeLs Can Use Computers Too: System-level Security for Computer Use Agents"},"content":{"rendered":"\n<ul class=\"wp-block-list\">\n<li><strong>CaMeLs Can Use Computers Too: System-level Security for Computer Use Agents\u00a0<\/strong>[61.0]<br>AI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306f\u3001\u60aa\u610f\u306e\u3042\u308b\u30b3\u30f3\u30c6\u30f3\u30c4\u304c\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u884c\u52d5\u3092\u30cf\u30a4\u30b8\u30e3\u30c3\u30af\u3057\u3066\u8a8d\u8a3c\u60c5\u5831\u3092\u76d7\u3093\u3060\u308a\u3001\u91d1\u92ad\u7684\u640d\u5931\u3092\u5f15\u304d\u8d77\u3053\u3059\u3088\u3046\u306a\u3001\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u653b\u6483\u306b\u5f31\u3044\u3002 CUA\u306e\u305f\u3081\u306e\u30b7\u30f3\u30b0\u30eb\u30b7\u30e7\u30c3\u30c8\u30d7\u30e9\u30f3\u30cb\u30f3\u30b0\u3067\u306f\u3001\u4fe1\u983c\u3067\u304d\u308b\u30d7\u30e9\u30f3\u30ca\u30fc\u304c\u3001\u6f5c\u5728\u7684\u306b\u60aa\u610f\u306e\u3042\u308b\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u89b3\u5bdf\u3059\u308b\u524d\u306b\u3001\u6761\u4ef6\u4ed8\u304d\u30d6\u30e9\u30f3\u30c1\u3067\u5b8c\u5168\u306a\u5b9f\u884c\u30b0\u30e9\u30d5\u3092\u751f\u6210\u3059\u308b\u3002 \u3053\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u5206\u96e2\u306f\u547d\u4ee4\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u3092\u52b9\u679c\u7684\u306b\u9632\u6b62\u3059\u308b\u304c\u3001\u30d6\u30e9\u30f3\u30c1\u30b9\u30c6\u30a2\u30ea\u30f3\u30b0\u653b\u6483\u3092\u9632\u3050\u306b\u306f\u8ffd\u52a0\u306e\u5bfe\u7b56\u304c\u5fc5\u8981\u3067\u3042\u308b\u3053\u3068\u3092\u793a\u3059\u3002<br><a href=\"http:\/\/arxiv.org\/abs\/2601.09923v1\">\u8ad6\u6587<\/a>\u00a0\u00a0<a href=\"https:\/\/fugumt.com\/fugumt\/paper_check\/2601.09923v1\">\u53c2\u8003\u8a33\uff08\u30e1\u30bf\u30c7\u30fc\u30bf\uff09<\/a>\u00a0 \u00a0(Wed, 14 Jan 2026 23:06:35 GMT)<\/li>\n\n\n\n<li>\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u5229\u7528\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u5bfe\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5411\u4e0a\u7b56\u306e\u63d0\u6848\u3001\u300c\u2022Dual-LLM Architecture for CUAs: We design the first Dual-LLM architecture adapted for Computer Use Agents, using Single-Shot Planning with an Observe-Verify-Act paradigm to provide Control Flow Integrity guarantees.\u300d\u3001\u300cBranch Steering &amp; Defenses: We identify Branch Steering as a distinct data-flow threat vector, where attackers manipulate visual cues (e g , fake buttons) to fool the agent into choosing a dangerous, yet valid, path within its pre-written plan. We demonstrate its feasibility, and evaluate redundancy-based mitigation, highlighting the fundamental distinction between control-flow and data-flow security in isolated architectures.\u300d<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[108,181],"class_list":["post-8121","post","type-post","status-publish","format-standard","hentry","category-arxiv","tag-defense","tag-gui-agent"],"_links":{"self":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/8121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8121"}],"version-history":[{"count":1,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/8121\/revisions"}],"predecessor-version":[{"id":8122,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/8121\/revisions\/8122"}],"wp:attachment":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}