arXiv:2604.25015v1 Announce Type: cross Abstract: Collaborative blockchain ecosystems allow diverse groups to cooperate on tasks while providing properties such as decentralization and transaction sec…
cyberintel.kalymoon.com · 2686 articles · updated every 4 hours · grows forever
arXiv:2604.25015v1 Announce Type: cross Abstract: Collaborative blockchain ecosystems allow diverse groups to cooperate on tasks while providing properties such as decentralization and transaction sec…
arXiv:2604.25878v1 Announce Type: new Abstract: This is Paper 6 of a series of formally-verified analyses of masked NTT hardware for post-quantum cryptography; Paper 1 [1] established structural depen…
arXiv:2604.25846v1 Announce Type: new Abstract: Security analysts are overwhelmed by the volume of alerts and the low context provided by many detection systems. Early-stage investigations typically r…
arXiv:2604.25757v1 Announce Type: new Abstract: Open, unclassified research on secure autonomy is constrained by limited access to operational platforms, contested communications infrastructure, and r…
arXiv:2604.25634v1 Announce Type: new Abstract: We report a striking statistical regularity in frontier LLM outputs that enables a CPU-only scoring primitive running at 2.6 microseconds per token, wit…
arXiv:2604.25562v1 Announce Type: new Abstract: Web agents have emerged as an effective paradigm for automating interactions with complex web environments, yet remain vulnerable to prompt injection at…
arXiv:2604.25555v1 Announce Type: new Abstract: Enterprise software engineering is shifting away from deterministic CRUD/REST architectures toward AI-native systems where large language models act as …
arXiv:2604.25544v1 Announce Type: new Abstract: Deploying an intrusion detector trained in one industrial plant to another remains difficult because Industrial Control System (ICS) traffic is highly s…
arXiv:2604.25486v1 Announce Type: new Abstract: Generative linguistic steganography (GLS) enables covert communication by embedding secret messages into the natural language generation process. In pra…
arXiv:2604.25264v1 Announce Type: new Abstract: With the rapid evolution of Android applications, traditional machine learning-based detection models suffer from concept drift. Additionally, they are …
arXiv:2604.25247v1 Announce Type: new Abstract: Large language models (LLMs) are widely deployed in multiple scenarios due to reasoning capabilities. In order to prevent the models from being misused,…
arXiv:2604.25200v1 Announce Type: new Abstract: Public agencies are beginning to consider large language models (LLMs) as decision-support tools for grant evaluation. This creates a practical governan…
arXiv:2604.25190v1 Announce Type: new Abstract: Conformance checking, one of the main process mining operations, aims to identify discrepancies between a process model and an event log. The model repr…
arXiv:2604.25189v1 Announce Type: new Abstract: AI agents are autonomous entities that can be instantiated on demand, migrate across platforms, and interact with other agents or services without conti…
arXiv:2604.25152v1 Announce Type: new Abstract: We present MGTEVAL, an extensible platform for systematic evaluation of Machine-Generated Text (MGT) detectors. Despite rapid progress in MGT detection,…
arXiv:2604.25109v1 Announce Type: new Abstract: Agent Skills package SKILL.md files, scripts, reference documents, and repository context into reusable capability units, turning pre-load auditing from…
arXiv:2604.25071v1 Announce Type: new Abstract: The prevalence of biometric authentication has been on the rise due to its ease of use and elimination of weak passwords. To date, most biometric authen…
arXiv:2604.25069v1 Announce Type: new Abstract: Fully encrypted protocol-based tools (FEPs) are tools commonly used to circumvent censorship in restrictive regions, valued for their performance and se…
arXiv:2604.24975v1 Announce Type: new Abstract: Learned index structures achieve high performance by modeling the cumulative distribution function (CDF) of keys, but this reliance on data distribution…
arXiv:2604.24935v1 Announce Type: new Abstract: The Controller Area Network (CAN) is a safety-critical in-vehicle communication protocol that lacks built-in security mechanisms, making intrusion detec…
arXiv:2604.24920v1 Announce Type: new Abstract: Agentic systems increasingly act with user secrets for APIs, messaging platforms, and cloud services. Today's bearer-secret interfaces implement authori…
arXiv:2604.24890v1 Announce Type: new Abstract: The rapid rise of generative AI has made it easy to create convincing fake media at scale. In response, an industrial coalition has developed the Coalit…
arXiv:2604.24869v1 Announce Type: new Abstract: Post-Quantum Cryptography (PQC) is a rapidly growing deployment challenge as cryptographically relevant quantum computers (CRQC) continue to advance, le…
arXiv:2604.24826v1 Announce Type: new Abstract: This report presents a comparative evaluation of DKnownAI Guard in AI agent security scenarios, benchmarked against three competing products: AWS Bedroc…