arXiv:2603.18687v1 Announce Type: new Abstract: Ranging and localisation have become critical for many applications and services. The Wi-Fi (IEEE 802.11) standard is a natural candidate for providing …
cyberintel.kalymoon.com · 2924 articles · updated every 4 hours · grows forever
arXiv:2603.18687v1 Announce Type: new Abstract: Ranging and localisation have become critical for many applications and services. The Wi-Fi (IEEE 802.11) standard is a natural candidate for providing …
arXiv:2603.18647v1 Announce Type: new Abstract: Test Vector Leakage Assessment (TVLA) based on Welch's $t$-test has become a standard tool for detecting side-channel leakage. However, its mean-based n…
arXiv:2603.18637v1 Announce Type: new Abstract: We study how to allocate a fixed supervised fine-tuning budget when three objectives must be balanced at once: multi-turn safety alignment, low over-ref…
arXiv:2603.18613v1 Announce Type: new Abstract: Industrial Cyber-Physical Systems (ICPS) face growing threats from cyber-attacks that exploit sensor and control vulnerabilities. Digital Twin (DT) tech…
arXiv:2603.18608v1 Announce Type: new Abstract: Card-based cryptography uses physical playing cards to construct protocols for secure multi-party computation. Existing card-based protocols employ vari…
arXiv:2603.18549v1 Announce Type: new Abstract: Dynamic Random Access Memory (DRAM) is pervasive in computer systems. Cell vulnerabilities caused by unintended phenomena (forced retention failure, lat…
arXiv:2603.18455v1 Announce Type: new Abstract: SIMON and SPECK were among the first efficient encryption algorithms introduced for resource-constrained applications. SIMON is suitable for Internet of…
arXiv:2603.18449v1 Announce Type: new Abstract: The widespread deployment of large language models (LLMs) calls for post-hoc methods that can flexibly adapt models to evolving safety requirements. Mea…
arXiv:2603.18433v1 Announce Type: new Abstract: Large language models (LLMs) deployed behind APIs and retrieval-augmented generation (RAG) stacks are vulnerable to prompt injection attacks that may ov…
arXiv:2603.18377v1 Announce Type: new Abstract: Cloud-hosted large language models (LLMs) have become the de facto planners in agentic systems, coordinating tools and guiding execution over local envi…
arXiv:2603.18355v1 Announce Type: new Abstract: In the ever-evolving battle against malware, binary obfuscation techniques are a formidable barrier to effective analysis by both human security analyst…
arXiv:2603.18235v1 Announce Type: new Abstract: As large language models (LLMs) evolve into autonomous "AI scientists," they promise transformative advances but introduce novel vulnerabilities, from p…
arXiv:2603.18196v1 Announce Type: new Abstract: Investigating cybersecurity incidents requires collecting and analyzing evidence from multiple log sources, including intrusion detection alerts, networ…
arXiv:2603.18120v1 Announce Type: new Abstract: The inference phase of deep neural networks (DNNs) in embedded systems is increasingly vulnerable to fault attacks and failures, which can result in inc…
arXiv:2603.18105v1 Announce Type: new Abstract: Digital image steganography requires a careful trade-off among payload capacity, visual fidelity, and statistical undetectability. Fixed-depth least sig…
arXiv:2603.18103v1 Announce Type: new Abstract: With the widespread deployment of deep-learning-based speech models in security-critical applications, backdoor attacks have emerged as a serious threat…
arXiv:2603.18071v1 Announce Type: new Abstract: We present YouTube-Synch [1], a production system for automated, large-scale content extraction and replication from YouTube to decentralized storage on…
arXiv:2603.18063v1 Announce Type: new Abstract: The Model Context Protocol (MCP) introduces a structurally distinct attack surface that existing threat frameworks, designed for traditional software sy…
arXiv:2603.18059v1 Announce Type: new Abstract: Tool-using automation systems, from scripts and CI bots to agentic assistants, fail in recurring patterns. Common failures include unsafe side effects, …
arXiv:2603.18034v1 Announce Type: new Abstract: Retrieval-Augmented Generation (RAG) systems extend large language models (LLMs) with external knowledge sources but introduce new attack surfaces throu…
Shielding the 2026 Winter Olympics: A Cybersecurity Race behind the Games Cybersecurity Insiders
Research: SQLite Tags Benchmark: Comparing 5 Tagging Strategies I had Claude Code run a micro-benchmark comparing different approaches to implementing tagging in SQLite. Traditional many-to-many table…
Here’s the truth about Instagram Data Breach 2026 Cybersecurity Insiders
The big news this morning: Astral to join OpenAI (on the Astral blog) and OpenAI to acquire Astral (the OpenAI announcement). Astral are the company behind uv , ruff , and ty - three increasingly load…