Search papers, labs, and topics across Lattice.
AegisUI is a framework designed to detect behavioral anomalies in structured UI payloads generated by AI agents, addressing the limitations of current defenses that only check syntax. The framework generates labeled UI payloads with injected attacks across five application domains and attack families, extracts 18 features, and benchmarks anomaly detection models. Random Forest achieved the best overall performance (accuracy 0.931, ROC-AUC 0.952), while an autoencoder offered a strong semi-supervised alternative (F1 0.762, ROC-AUC 0.863) without requiring malicious labels during training.
UI payloads that pass syntax checks can still trick users into disastrous actions, and AegisUI shows how to catch these behavioral anomalies with up to 93% accuracy using Random Forests.
AI agents that build user interfaces on the fly assembling buttons, forms, and data displays from structured protocol payloads are becoming common in production systems. The trouble is that a payload can pass every schema check and still trick a user: a button might say"View invoice"while its hidden action wipes an account, or a display widget might quietly bind to an internal salary field. Current defenses stop at syntax; they were never built to catch this kind of behavioral mismatch. We built AegisUI to study exactly this gap. The framework generates structured UI payloads, injects realistic attacks into them, extracts numeric features, and benchmarks anomaly detectors end-to-end. We produced 4000 labeled payloads (3000 benign, 1000 malicious) spanning five application domains and five attack families: phishing interfaces, data leakage, layout abuse, manipulative UI, and workflow anomalies. From each payload we extracted 18 features covering structural, semantic, binding, and session dimensions, then compared three detectors: Isolation Forest (unsupervised), a benign-trained autoencoder (semi-supervised), and Random Forest (supervised). On a stratified 80/20 split, Random Forest scored best overall (accuracy 0.931, precision 0.980, recall 0.740, F1 0.843, ROC-AUC 0.952). The autoencoder came second (F1 0.762, ROC-AUC 0.863) and needs no malicious labels at training time, which matters when deploying a new system that lacks attack history. Per-attack-type analysis showed that layout abuse is easiest to catch while manipulative UI payloads are hardest. All code, data, and configurations are released for full reproducibility.