arXiv:2604.20047v1 Announce Type: cross Abstract: Vision Transformers (ViTs) have achieved remarkable success across vision tasks, yet recent studies show they remain vulnerable to backdoor attacks. E…
cyberintel.kalymoon.com · 2687 articles · updated every 4 hours · grows forever
arXiv:2604.20047v1 Announce Type: cross Abstract: Vision Transformers (ViTs) have achieved remarkable success across vision tasks, yet recent studies show they remain vulnerable to backdoor attacks. E…
arXiv:2604.19785v1 Announce Type: cross Abstract: Sensitive information, such as knowledge about an individual's personality, can be can be misused to influence behavior (e.g., via personalized messag…
arXiv:2604.20833v1 Announce Type: new Abstract: As artificial intelligence (AI) systems are increasingly deployed across critical domains, their security vulnerabilities pose growing risks of high-pro…
arXiv:2604.20826v1 Announce Type: new Abstract: Phishing attacks remain one of the most prevalent threats to online security, with the Anti-Phishing Working Group reporting over 890,000 attacks in Q3 …
arXiv:2604.20801v1 Announce Type: new Abstract: LLM agents have begun to find real security vulnerabilities that human auditors and automated fuzzers missed for decades, in source-available targets wh…
arXiv:2604.20793v1 Announce Type: new Abstract: Post-quantum cryptographic (PQC) accelerators for ML-KEM (FIPS 203) and ML-DSA (FIPS 204) rely on pipelined Number Theoretic Transform (NTT) stages over…
arXiv:2604.20771v1 Announce Type: new Abstract: The Internet of Vehicles (IoV) is advancing modern transportation by improving safety, efficiency, and intelligence. However, the reliance on the Contro…
arXiv:2604.20765v1 Announce Type: new Abstract: Critical vulnerabilities with Common Vulnerability Scoring System scores of 9.0 or higher pose severe risks to organisations' information systems. Timel…
arXiv:2604.20704v1 Announce Type: new Abstract: Adversarial robustness evaluation underpins every claim of trustworthy ML deployment, yet the field suffers from fragmented protocols and undetected gra…
arXiv:2604.20621v1 Announce Type: new Abstract: Autonomous vehicles (AVs) increasingly rely on multi-sensor perception pipelines that combine data from cameras, lidar, radar, and other modalities to i…
arXiv:2604.20576v1 Announce Type: new Abstract: As DRAM scaling exacerbates RowHammer, DDR5 introduces per-row activation counting (PRAC) to track aggressor activity. However, PRAC indiscriminately in…
arXiv:2604.20496v1 Announce Type: new Abstract: The April 2026 Claude Mythos sandbox escape exposed a critical weakness in frontier AI containment: the infrastructure surrounding advanced models remai…
arXiv:2604.20495v1 Announce Type: new Abstract: Machine learning-based static malware detectors remain vulnerable to adversarial evasion techniques, such as metamorphic engine mutations. To address th…
arXiv:2604.20401v1 Announce Type: new Abstract: Approximate nearest neighbor (ANN) search in AI systems increasingly handles sensitive data on third-party infrastructure. Trusted execution environment…
arXiv:2604.20389v1 Announce Type: new Abstract: The rapid evolution and use of Large Language Models (LLMs) in professional workflows require an evaluation of their domain-specific knowledge against i…
arXiv:2604.20378v1 Announce Type: new Abstract: Memory analysis is a crucial technique in digital forensics that enables investigators to examine the runtime state of a system through physical memory …
arXiv:2604.20269v1 Announce Type: new Abstract: With the popularity of the large language models (LLMs), text steganography has achieved remarkable performance. However, existing methods still have so…
arXiv:2604.20260v1 Announce Type: new Abstract: Modern ransomware exhibits polymorphic and evasive behaviors by frequently modifying execution patterns to evade detection. This dynamic nature disrupts…
arXiv:2604.20179v1 Announce Type: new Abstract: The rapidly evolving Node$.$js ecosystem currently includes millions of packages and is a critical part of modern software supply chains, making vulnera…
arXiv:2604.20134v1 Announce Type: new Abstract: Security Operations Centers (SOCs) increasingly encounter difficulties in correlating heterogeneous alerts, interpreting multi-stage attack progressions…
arXiv:2604.20020v1 Announce Type: new Abstract: As microelectronics flourish and outsourcing of the design and manufacturing stages of integrated circuits (ICs) and printed circuit boards (PCBs) becom…
arXiv:2604.19915v1 Announce Type: new Abstract: Federated Learning (FL) is a promising approach for multiparty collaboration as a privacy-preserving technique in hardware assurance, but its security a…
arXiv:2604.19891v1 Announce Type: new Abstract: Federated Learning (FL) is an emerging solution to the data scarcity problem for training deep learning models in hardware assurance. While FL is design…
arXiv:2604.19890v1 Announce Type: new Abstract: Fully homomorphic encryption (FHE) enables computation on encrypted data without decryption, making it central to privacy-preserving applications. Howev…