arXiv:2512.22174v2 Announce Type: cross Abstract: Large Language Models (LLMs) deployed in practical and safety-critical settings are increasingly susceptible to bit-flip faults caused by hardware deg…
cyberintel.kalymoon.com · 2688 articles · updated every 4 hours · grows forever
arXiv:2512.22174v2 Announce Type: cross Abstract: Large Language Models (LLMs) deployed in practical and safety-critical settings are increasingly susceptible to bit-flip faults caused by hardware deg…
arXiv:2604.15249v1 Announce Type: new Abstract: Post-quantum cryptographic accelerators require side-channel resistance evidence for FIPS 140-3 certification. However, exact masking-verification tools…
arXiv:2604.15136v1 Announce Type: new Abstract: Binary analysis increasingly relies on large language models (LLMs) to perform semantic reasoning over complex program behaviors. However, existing appr…
arXiv:2604.15118v1 Announce Type: new Abstract: Permission control vulnerabilities in Non-fungible token (NFT) contracts can result in significant financial losses, as attackers may exploit these weak…
arXiv:2604.15073v1 Announce Type: new Abstract: Increasing system-on-chip (SoC) heterogeneity, deep hardware/software integration, and the proliferation of third-party intellectual property (IP) have …
arXiv:2604.15022v1 Announce Type: new Abstract: Cost-aware routing dynamically dispatches user queries to models of varying capability to balance performance and inference cost. However, the routing s…
arXiv:2604.14996v1 Announce Type: new Abstract: The incidence of cybersecurity attacks utilizing social engineering techniques has increased. Such attacks exploit the fact that in every secure system,…
arXiv:2604.14973v1 Announce Type: new Abstract: A vision foundation model outputs an embedding vector for an image, which can be affected by common editing operations (e.g., JPEG compression, brightne…
arXiv:2604.14909v1 Announce Type: new Abstract: Private set intersection (PSI) enables a sender holding a set $Q$ of size $m$ and a receiver holding a set $W$ of size $n$ to securely compute the inter…
arXiv:2604.14685v1 Announce Type: new Abstract: Provenance-based intrusion detection has emerged as a promising approach for analyzing complex attack behaviors through system-level provenance graphs. …
arXiv:2604.14663v1 Announce Type: new Abstract: Federated learning (FL) enables collaborative intrusion detection without raw data exchange, but conventional FL incurs high communication overhead from…
arXiv:2604.14604v1 Announce Type: new Abstract: Modern Large audio-language models (LALMs) power intelligent voice interactions by tightly integrating audio and text. This integration, however, expand…
arXiv:2604.14512v1 Announce Type: new Abstract: Agent communication languages (ACLs) enable heterogeneous agents to share knowledge and coordinate across diverse domains. This diversity demands extens…
arXiv:2604.14457v1 Announce Type: new Abstract: Deep neural networks (DNNs) remain largely opaque at inference time, limiting our ability to detect and diagnose malicious input manipulations such as a…
arXiv:2604.14444v1 Announce Type: new Abstract: Ensuring the reliability of machine learning-based intrusion detection systems remains a critical challenge in Internet of Things (IoT) environments, pa…
arXiv:2604.14431v1 Announce Type: new Abstract: Mobile applications rely on complex backends that introduce significant security risks, yet developers often lack the tools to assess these risks effect…
arXiv:2604.14360v1 Announce Type: new Abstract: Resilience in cyber-physical systems (CPS) is the fundamental ability to maintain safety and critical functionality despite adverse "perturbations," whi…
arXiv:2604.14330v1 Announce Type: new Abstract: Mutual TLS (mTLS) provides strong, certificate-based authentication for both clients and servers, yet its adoption for user-facing websites remains rare…
arXiv:2604.14317v1 Announce Type: new Abstract: Agentic systems built on large language models (LLMs) are increasingly being used for complex security tasks, including binary reverse engineering (RE).…
arXiv:2604.14250v1 Announce Type: new Abstract: An important aspect of crowd monitoring is knowing how many people we are dealing with. Sometimes, knowing the size of a crowd in a single location and …
arXiv:2604.14242v1 Announce Type: new Abstract: Cloud sovereignty can no longer be defined by data residency or infrastructure location alone. Under conditions of geopolitical disruption, legal exposu…
arXiv:2604.14233v1 Announce Type: new Abstract: The IEC-61850 GOOSE protocol underpins time-critical communication in modern digital substations but lacks native security mechanisms, leaving it vulner…
Release: llm-anthropic 0.25 New model: claude-opus-4.7 , which supports thinking_effort : xhigh . #66 New thinking_display and thinking_adaptive boolean options. thinking_display summarized output is …
Nano Banana 2 now uses your personal context and Google Photos to create images that reflect your unique life.