arXiv:2603.12455v1 Announce Type: new Abstract: The escalating frequency of cyber-attacks poses significant challenges for organisations, particularly small enterprises constrained by limited in-house…
cyberintel.kalymoon.com · 2926 articles · updated every 4 hours · grows forever
arXiv:2603.12455v1 Announce Type: new Abstract: The escalating frequency of cyber-attacks poses significant challenges for organisations, particularly small enterprises constrained by limited in-house…
arXiv:2603.12485v1 Announce Type: new Abstract: GPUs play an increasingly important role in modern software. However, the heterogeneous host-device execution model and expanding software stacks make G…
arXiv:2603.12498v1 Announce Type: new Abstract: Application programming interfaces (APIs) have become a central part of the modern IT environment, allowing developers to enrich the functionality of ap…
arXiv:2603.12621v1 Announce Type: new Abstract: AI agents increasingly act through external tools: they query databases, execute shell commands, read and write files, and send network requests. Yet in…
arXiv:2603.12637v1 Announce Type: new Abstract: Lightweight block cipher design has largely focused on incremental optimization of established paradigms such as substitution--permutation networks, Fei…
arXiv:2603.12644v1 Announce Type: new Abstract: The rapid evolution of Large Language Models (LLMs) into autonomous, tool-calling agents has fundamentally altered the cybersecurity landscape. Framewor…
arXiv:2603.12679v1 Announce Type: new Abstract: Neural Structural Obfuscation (NSO) (USENIX Security'23) is a family of ``zero cost'' structure-editing transforms (\texttt{nso\_zero}, \texttt{nso\_cli…
arXiv:2603.12681v1 Announce Type: new Abstract: We introduce Colluding LoRA (CoLoRA), an attack in which each adapter appears benign and plausibly functional in isolation, yet their linear composition…
arXiv:2603.12871v1 Announce Type: new Abstract: Apps such as Firechat and Bridgefy have been used during recent protests in Hong Kong and Iran, as they allow communication over ad-hoc wireless network…
arXiv:2603.12946v1 Announce Type: new Abstract: Privacy-Preserving Machine Learning as a Service (PP-MLaaS) enables secure neural network inference by integrating cryptographic primitives such as homo…
arXiv:2603.12968v1 Announce Type: new Abstract: Authentication is crucial to confirm that an individual or entity trying to perform an action is actually who or what they claim to be. In dynamic envir…
arXiv:2603.12990v1 Announce Type: new Abstract: Cryptocurrency exchanges use proofs of liabilities (PoLs) to prove to their customers their liabilities committed on-chain, thereby enhancing their trus…
arXiv:2603.13014v1 Announce Type: new Abstract: The proposed method (FraudFox) provides solutions to adversarial attacks in a resource constrained environment. We focus on questions like the following…
arXiv:2603.13028v1 Announce Type: new Abstract: Diffusion models enable high-fidelity image editing but can also be misused for unauthorized style imitation and harmful content generation. To mitigate…
arXiv:2603.13151v1 Announce Type: new Abstract: OpenClaw-like agents offer substantial productivity benefits, yet they are insecure by default because they combine untrusted inputs, autonomous action,…
arXiv:2603.13181v1 Announce Type: new Abstract: Existing methods for verifying access control policies require the policy to be complete and fully determined before verification can proceed, but in pr…
arXiv:2603.12277v1 Announce Type: cross Abstract: Language models remain vulnerable to prompt injection attacks despite extensive safety training. We trace this failure to role confusion: models infer…
arXiv:2603.12414v1 Announce Type: cross Abstract: State Space Models (SSMs) such as Mamba achieve linear-time sequence processing through input-dependent recurrence, but this mechanism introduces a cr…
arXiv:2603.12435v1 Announce Type: cross Abstract: State-of-the-art DRAM read disturbance mitigations rely on the read disturbance threshold (RDT) (e.g., the number of aggressor row activations needed …
arXiv:2603.12582v1 Announce Type: cross Abstract: Textual adversarial attacks pose a serious security threat to Natural Language Processing (NLP) systems by introducing imperceptible perturbations tha…
arXiv:2603.12614v1 Announce Type: cross Abstract: Tool-augmented LLM agents increasingly rely on multi-step, multi-tool workflows to complete real tasks. This design expands the attack surface, becaus…
arXiv:2603.12749v1 Announce Type: cross Abstract: Watermarking the initial noise of diffusion models has emerged as a promising approach for image provenance, but content-independent noise patterns ca…
arXiv:2603.12753v1 Announce Type: cross Abstract: Absolute anonymization, conceived as an irreversible transformation that prevents re-identification and sensitive value disclosure, has proven to be a…
arXiv:2603.12949v1 Announce Type: cross Abstract: Robust invisible watermarks are widely used to support copyright protection, content provenance, and accountability by embedding hidden signals design…