Similar Items: Firmware Distribution as Attack Surface: A Security Study of ASIC Cryptocurrency Miners
- Internet of Things Security: A Survey on Common Attacks
- Security Attack and Defense Strategies for Autonomous Agent Frameworks: A Layered Review with OpenClaw as a Case Study
- Attention Is Where You Attack
- Pop Quiz Attack: Black-box Membership Inference Attacks Against Large Language Models
- GPUBreach: Privilege Escalation Attacks on GPUs using Rowhammer
- LoopTrap: Termination Poisoning Attacks on LLM Agents