arXiv:2603.19864v1 Announce Type: cross Abstract: Penetration testing, the practice of simulating cyberattacks to identify vulnerabilities, is a complex sequential decision-making task that is inheren…
cyberintel.kalymoon.com · 2892 articles · updated every 4 hours · grows forever
arXiv:2603.19864v1 Announce Type: cross Abstract: Penetration testing, the practice of simulating cyberattacks to identify vulnerabilities, is a complex sequential decision-making task that is inheren…
arXiv:2603.19671v1 Announce Type: cross Abstract: Graph pattern counting serves as a cornerstone of network analysis with extensive real-world applications. Its integration with local differential pri…
arXiv:2603.19450v1 Announce Type: cross Abstract: We develop a variational encrypted model predictive control (VEMPC) protocol whose online execution relies only on encrypted polynomial operations. Th…
arXiv:2603.19314v1 Announce Type: cross Abstract: In the modern financial system, combating money laundering is a critical challenge complicated by data privacy concerns and increasingly complex fraud…
arXiv:2603.19258v1 Announce Type: cross Abstract: While differentially private (DP) fine-tuning of large language models (LLMs) is a powerful tool, it is often computationally prohibitive or infeasibl…
arXiv:2603.20181v1 Announce Type: new Abstract: The use of ML in cybersecurity has long been impaired by generalization issues: Models that work well in controlled scenarios fail to maintain performan…
arXiv:2603.20156v1 Announce Type: new Abstract: Hamming Quasi-Cyclic (HQC) was chosen for the latest post-quantum cryptography standardization. A concatenated Reed-Muller (RM) and Reed-Solomon (RS) co…
arXiv:2603.20122v1 Announce Type: new Abstract: Large Language Models (LLMs) have been widely deployed, especially through free Web-based applications that expose them to diverse user-generated inputs…
arXiv:2603.20107v1 Announce Type: new Abstract: In traditional runtime verification, a system is typically observed by a monolithic monitor. Enforcing privacy in such settings is computationally expen…
arXiv:2603.19974v1 Announce Type: new Abstract: Autonomous coding agents are increasingly integrated into software development workflows, offering capabilities that extend beyond code suggestion to ac…
arXiv:2603.19962v1 Announce Type: new Abstract: Wireless networks are highly vulnerable to spoofing attacks, especially when attackers transmit consecutive spoofing packets. Conventional physical laye…
arXiv:2603.19949v1 Announce Type: new Abstract: Privacy-preserving aggregation is a cornerstone for AI systems that learn from distributed data without exposing individual records, especially in feder…
arXiv:2603.19908v1 Announce Type: new Abstract: Formal patterns are formally specified solutions to frequently occurring distributed system problems that are generic, executable, and come with strong …
arXiv:2603.19811v1 Announce Type: new Abstract: Devices employing cryptographic approaches have to be resistant to physical attacks. Side-Channel Analysis (SCA) and Fault Injection (FI) attacks are fr…
arXiv:2603.19791v1 Announce Type: new Abstract: The ability to simulate human privacy decisions has significant implications for aligning autonomous agents with individual intent and conducting cost-e…
arXiv:2603.19787v1 Announce Type: new Abstract: Serverless computing abstracts infrastructure management but also obscures system-level behaviors that can introduce security risks. Prior work has show…
arXiv:2603.19781v1 Announce Type: new Abstract: At SAC 2013, Berger et al. first proposed the Extended Generalized Feistel Networks (EGFN) structure for the design of block ciphers with efficient diff…
arXiv:2603.19727v1 Announce Type: new Abstract: As the Internet of Things (IoT) becomes an integral part of critical infrastructure, smart cities, and consumer networks, there has been an increase in …
arXiv:2603.19658v1 Announce Type: new Abstract: Advanced Persistent Threats (APTs) remain difficult to detect due to their stealthy nature and long-term persistence. To tackle this challenge, provenan…
arXiv:2603.19656v1 Announce Type: new Abstract: An equidistribution is a theoretical quality criteria that measures the uniformity of a linear pseudo-random number generator (PRNG). In this work, we f…
arXiv:2603.19469v1 Announce Type: new Abstract: Security in LLM agents is inherently contextual. For example, the same action taken by an agent may represent legitimate behavior or a security violatio…
arXiv:2603.19423v1 Announce Type: new Abstract: Large language model (LLM) agents increasingly rely on external tools (file operations, API calls, database transactions) to autonomously complete compl…
arXiv:2603.19375v1 Announce Type: new Abstract: Membership inference attacks (MIAs), which enable adversaries to determine whether specific data points were part of a model's training dataset, have em…
arXiv:2603.19350v1 Announce Type: new Abstract: The increasing sophistication of cyber threats, especially zero-day attacks, poses a significant challenge to cybersecurity. Zero-day attacks exploit un…