Full Text Available
Access Full Text at Repository
Search Results - ArXiv cs.CR Recent Papers
Search alternatives:
- papers »
-
Adversarial Update-Based Federated Unlearning for Poisoned Model Recovery
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
Online Article RSS Article -
Detecting Adversarial Data via Provable Adversarial Noise Amplification
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
Redefining AI Red Teaming in the Agentic Era: From Weeks to Hours
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
LIPPEN: A Lightweight In-Place Pointer Encryption Architecture for Pointer Integrity
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
Generating Proof-of-Vulnerability Tests to Help Enhance the Security of Complex Software
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
MOSAIC-Bench: Measuring Compositional Vulnerability Induction in Coding Agents
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
HELO Cryptography: A Lightweight Cryptographic System for Enhancing IoT Security in P2P Data Transmission
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
KVerus: Scalable and Resilient Formal Verification Proof Generation for Rust Code
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
GPUBreach: Privilege Escalation Attacks on GPUs using Rowhammer
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
Firmware Distribution as Attack Surface: A Security Study of ASIC Cryptocurrency Miners
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
Internet of Things Security: A Survey on Common Attacks
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
Tailored Prompts, Targeted Protection: Vulnerability-Specific LLM Analysis for Smart Contracts
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
The Infinite Mutation Engine? Measuring Polymorphism in LLM-Generated Offensive Code
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
ZK-Value: A Practical Zero-Knowledge System for Verifiable Data Valuation
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
From TinyGo to gc Compiler: Extending Zorya's Concolic Framework to Real-World Go Binaries
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
MEMSAD: Gradient-Coupled Anomaly Detection for Memory Poisoning in Retrieval-Augmented Agents
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
Exposing LLM Safety Gaps Through Mathematical Encoding:New Attacks and Systematic Analysis
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
Graph Reconstruction from Differentially Private GNN Explanations
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
DECKER: Domain-invariant Embedding for Cross-Keyboard Extraction and Recognition
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text
-
ARGUS: Defending LLM Agents Against Context-Aware Prompt Injection
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…ArXiv cs.CR Recent Papers…”
Get full text