arXiv:2603.21556v1 Announce Type: new Abstract: Developers rely on online tutorials to learn web application security, but tutorial quality varies. We reviewed 132 free security tutorials to examine t…
cyberintel.kalymoon.com · 2892 articles · updated every 4 hours · grows forever
arXiv:2603.21556v1 Announce Type: new Abstract: Developers rely on online tutorials to learn web application security, but tutorial quality varies. We reviewed 132 free security tutorials to examine t…
arXiv:2603.21515v1 Announce Type: new Abstract: To comply with data protection regulations such as the EU General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), webs…
arXiv:2603.21469v1 Announce Type: new Abstract: In this work, we identify a set of side-channels in our Confidential Federated Compute platform that a hypothetical insider could exploit to circumvent …
arXiv:2603.21411v1 Announce Type: new Abstract: Adversarial-example-based fingerprinting approaches, which leverage the decision boundary characteristics of deep neural networks (DNNs) to craft finger…
arXiv:2603.21296v1 Announce Type: new Abstract: Advanced Persistent Threats (APTs) are stealthy, multi-stage attacks that require adaptive and timely defense. While deep reinforcement learning (DRL) e…
arXiv:2603.21294v1 Announce Type: new Abstract: At S&P 2023, Puschner et al. made a valuable dataset for hardware Trojan detection research publicly available. It contains a complete set of Scanning E…
arXiv:2603.21270v1 Announce Type: new Abstract: While the size of a data breach is typically measured by the number of (consumer, customer, or user) records exposed or compromised, its economic impact…
arXiv:2603.21231v1 Announce Type: new Abstract: Host-acting agents promise a convenient interaction model in which users specify goals and the system determines how to realize them. We argue that this…
arXiv:2603.21211v1 Announce Type: new Abstract: Open Radio Access Network (O-RAN) is a major advancement in the telecommunications field, providing standardized interfaces that promote interoperabilit…
arXiv:2603.21194v1 Announce Type: new Abstract: Multi-agent discussions have been widely adopted, motivating growing efforts to develop attacks that expose their vulnerabilities. In this work, we stud…
arXiv:2603.21117v1 Announce Type: new Abstract: Tor is a low-latency anonymous communication network that protects user privacy by encrypting website traffic. However, recent website fingerprinting (W…
arXiv:2603.21058v1 Announce Type: new Abstract: Smart contracts have transformed decentralized finance, but flaws in their logic still create major security threats. Most existing vulnerability detect…
arXiv:2603.21019v1 Announce Type: new Abstract: With the rapid evolution of Large Language Model (LLM) agent ecosystems, centralized skill marketplaces have emerged as pivotal infrastructure for augme…
arXiv:2603.20981v1 Announce Type: new Abstract: Unmanned Aerial Vehicles (UAVs) are valuable for mission-critical systems like surveillance, rescue, or delivery. Not surprisingly, such systems attract…
arXiv:2603.20953v1 Announce Type: new Abstract: AI agents today have passwords but no permission slips. They execute tool calls (fund transfers, database queries, shell commands, sub-agent delegation)…
arXiv:2603.20937v1 Announce Type: new Abstract: This paper presents a symmetric stream cipher that utilizes the dynamic properties of random cubic mappings in the complex plane to generate pseudo-rand…
arXiv:2603.20933v1 Announce Type: new Abstract: Large Language Model (LLM) agents combine the chat interaction capabilities of LLMs with the power to interact with external tools and APIs. This enable…
arXiv:2603.20769v1 Announce Type: new Abstract: Sensor technologies have evolved to a point where it is now practical to monitor products along the supply chain. The collected data can be stored in a …
arXiv:2603.20625v1 Announce Type: new Abstract: LLM agent frameworks increasingly offer checkpoint-restore for error recovery and exploration, advising developers to make external tool calls safe to r…
arXiv:2603.20615v1 Announce Type: new Abstract: Federated learning (FL) has attracted substantial attention in both academia and industry, yet its practical security posture remains poorly understood.…
arXiv:2603.20504v1 Announce Type: new Abstract: Modern cloud inference creates a two sided privacy problem where users reveal sensitive inputs to providers, while providers must execute proprietary mo…
arXiv:2603.20421v1 Announce Type: new Abstract: We present Hawkeye, a system for analyzing and reproducing GPU-level arithmetic operations. Using our framework, anyone can re-execute on a CPU the exac…
arXiv:2603.20357v1 Announce Type: new Abstract: Memory poisoning attacks for Agentic AI and multi-agent systems (MAS) have recently caught attention. It is partially due to the fact that Large Languag…
arXiv:2603.20351v1 Announce Type: new Abstract: Mobile advertising dominates app monetization but introduces risks ranging from intrusive user experience to malware delivery. Existing detection method…