Examining risks in shared state of AR applications and ways to enhance security.
― 6 min read
Cutting edge science explained simply
Examining risks in shared state of AR applications and ways to enhance security.
― 6 min read
A new framework improves vulnerability detection in embedded network communication.
― 4 min read
Examining the dangers posed by adversarial attacks on image and text models.
― 4 min read
Timing attacks pose risks to software, revealing sensitive information through execution timing.
― 7 min read
Research highlights pre-trained models' effectiveness in fixing software vulnerabilities.
― 8 min read
A study on vulnerabilities in IoT code found online highlights security risks.
― 6 min read
Learn how to protect software from side-channel attacks using automated tools.
― 5 min read
Zeal enhances data protection while simplifying sharing and storage.
― 4 min read
Exploring ChatGPT's effectiveness in identifying vulnerabilities in Python code.
― 8 min read
Examining the security flaws in EdDSA digital signatures.
― 4 min read
This article examines remote code execution vulnerabilities in LLM frameworks and suggests protective measures.
― 9 min read
Learn how program variants can improve WebAssembly security against vulnerabilities.
― 5 min read
A new framework aims to improve the collection and understanding of software vulnerabilities.
― 6 min read
A new framework to detect and repair vulnerabilities in smart contracts.
― 6 min read
VulnSense uses advanced methods for detecting vulnerabilities in Ethereum smart contracts.
― 6 min read
A look into smart contract vulnerabilities and the role of interval analysis.
― 6 min read
A new framework combines CodeBERT and GNNs for better vulnerability detection in software.
― 7 min read
Research examines the vulnerabilities and patch process in Golang development.
― 7 min read
WebAssembly boosts web app speed but raises security concerns.
― 6 min read
A new tool aims to improve security in open-source software development.
― 11 min read
New framework improves detection of software vulnerabilities using innovative techniques.
― 5 min read
New methods aim to protect AI models from attacks using optimized strategies.
― 6 min read
Examining the risks of integrating Foundation Models into Federated Learning systems.
― 7 min read
Leveraging AI to improve the analysis and security of smart contracts.
― 7 min read
Recognizing hidden flaws improves software vulnerability prediction and security practices.
― 4 min read
Improving software security by identifying recurring coding flaws in open-source projects.
― 6 min read
This article outlines a method for assessing security risks in DLT applications.
― 6 min read
A new dataset enhances vulnerability detection in open-source software for better security.
― 7 min read
This article discusses the role of SATD in software security.
― 6 min read
This research highlights challenges in aligning LLM outputs with human values.
― 6 min read
New GPU vulnerability raises security concerns for machine learning applications.
― 7 min read
Instiller improves CPU fuzz testing with efficient techniques and better bug detection.
― 8 min read
Analyzing how red-teaming can enhance AI safety and address potential risks.
― 7 min read
Exploring the role of LLMs in enhancing cybersecurity and their potential misuse.
― 7 min read
This work examines how LLMs enhance vulnerability detection in Java code.
― 5 min read
An exploration of the challenges and strategies for improving software security.
― 5 min read
Examining vulnerabilities and safety strategies for LLM-powered scientific agents.
― 6 min read
Exploring how companies approach secure software development in an evolving digital landscape.
― 7 min read
A new tool helps detect Reentrancy vulnerabilities in smart contracts more effectively.
― 5 min read
A new framework targets cloud security risks with improved access control management.
― 6 min read