arXiv:2605.09115v1 Announce Type: new Abstract: Modern security environments generate fragmented signals across cloud resources, identities, configurations, and third-party security tools. Although AI…
cyberintel.kalymoon.com · 21154 articles · updated every 4 hours · grows forever
arXiv:2605.09115v1 Announce Type: new Abstract: Modern security environments generate fragmented signals across cloud resources, identities, configurations, and third-party security tools. Although AI…
arXiv:2605.09070v1 Announce Type: new Abstract: Many jailbreak attack research papers report attack success rates for a limited number of parameter settings, even though there are many combinations of…
arXiv:2605.09033v1 Announce Type: new Abstract: Graph-based agent memory is increasingly used in LLM agents to support structured long-term recall and multi-hop reasoning, but it also creates a new po…
arXiv:2605.08984v1 Announce Type: new Abstract: As Field-Programmable Gate Arrays (FPGAs) scale in multi-tenant cloud and edge-AI environments, the configuration bitstream has become a critical, yet o…
arXiv:2605.08922v1 Announce Type: new Abstract: Autonomous AI agents are increasingly deployed on blockchain platforms, yet the design space that governs their interaction remains poorly understood. T…
arXiv:2605.08910v1 Announce Type: new Abstract: The new wave of adversarial attacks that utilize gradient-related vulnerabilities in neural network-based classifiers makes Network Intrusion Detection …
arXiv:2605.08878v1 Announce Type: new Abstract: Aligned large language models (LLMs) remain vulnerable to jailbreak attacks. Recent mechanistic studies have identified latent features and representati…
arXiv:2605.08763v1 Announce Type: new Abstract: Automated intrusion-style workflows require LLM agents to reason over partial observations, tool outputs, and executable artifacts under bounded budgets…
arXiv:2605.08690v1 Announce Type: new Abstract: Modern cryptography is hinged on "not learning from mistakes": trying numerous wrong keys, should not help one identify the right key. Indeed, it worked…
arXiv:2605.08604v1 Announce Type: new Abstract: Embedded and Internet-of-Things (IoT) devices play a critical role in modern life. Their software and firmware, often developed in memory-unsafe languag…
arXiv:2605.08586v1 Announce Type: new Abstract: This position paper argues that computer science conferences should require tamper-evident, nonrepudiable attestations of experimental results. We name …
arXiv:2605.08460v1 Announce Type: new Abstract: Since the official release of ChatGPT in 2022, large language models (LLMs) have rapidly evolved from chatbot-style interfaces into agentic systems that…
arXiv:2605.08456v1 Announce Type: new Abstract: The realtime analysis and secure transmission of electrocardiogram ECG signals are critical for accurate diagnosis and safeguarding patient privacy in t…
arXiv:2605.08449v1 Announce Type: new Abstract: Security Level 5 (SL5) is a security posture for AI systems that could plausibly thwart top-priority operations by the world's most cyber-capable instit…
arXiv:2605.08443v1 Announce Type: new Abstract: Federated Learning (FL) with parameter-efficient fine-tuning, such as Low-Rank Adaptation (LoRA), enables scalable model training on distributed data. H…
arXiv:2605.08442v1 Announce Type: new Abstract: Persistent memory attacks against LLM agents achieve high attack success rates against open-source models. In these attacks, malicious instructions inje…
arXiv:2605.08419v1 Announce Type: new Abstract: We present Elevator, the first binary translator that statically translates entire x86-64 executables to AArch64 without debug information, source code,…
arXiv:2605.08418v1 Announce Type: new Abstract: Telegram has emerged as a major platform for large-scale video piracy, where copyrighted content is rapidly distributed among users. Despite its promine…
arXiv:2605.08385v1 Announce Type: new Abstract: While contemporary deep learning malware detectors define a dominant defense paradigm, their sophistication also exposes them to novel structural evasio…
arXiv:2605.08382v1 Announce Type: new Abstract: LLM coding agents now generate code at an unprecedented scale, yet LLM-generated code introduces cybersecurity vulnerabilities into codebases without hu…
arXiv:2605.08363v1 Announce Type: new Abstract: Kettle is an attested build system that produces cryptographically verifiable provenance for software built inside Trusted Execution Environments (TEEs)…
arXiv:2605.08316v1 Announce Type: new Abstract: Security alert screening is the downstream task of filtering, prioritizing, correlating, and contextualizing alerts for analyst attention in Security Op…
arXiv:2605.08313v1 Announce Type: new Abstract: Large language models (LLMs) rely on deterministic pseudorandom number generators (PRNGs) for autoregressive sampling, creating a critical supply-chain …
arXiv:2605.08310v1 Announce Type: new Abstract: Browser agents are increasingly deployed in long-horizon tasks, which require executing extended action chains to accomplish user goals. However, this p…