Combining simulation and event analysis for software validation.
― 7 min read
Cutting edge science explained simply
Combining simulation and event analysis for software validation.
― 7 min read
MORPH adapts malware detection systems to evolving threats with less manual input.
― 7 min read
This article discusses the role of SATD in software security.
― 6 min read
Explore SCORPION, a dynamic Cyber Range for cybersecurity training and skill development.
― 7 min read
A system to automate monitoring of illicit activities on the dark web.
― 6 min read
A new modular approach improves efficiency and accuracy in identifying cyber attackers.
― 6 min read
Exploring the risks of supply chain attacks in updated power infrastructure.
― 5 min read
Learn how Universal Composability and other theories enhance cryptographic security.
― 6 min read
Hybrid Homomorphic Encryption offers solutions for privacy in data analysis.
― 6 min read
Studying adversarial impacts on automated stock trading agents in competitive markets.
― 7 min read
TransTroj enhances backdoor attacks, improving effectiveness and resistance to detection.
― 6 min read
This article addresses the risks and challenges posed by Large Language Models.
― 6 min read
New GPU vulnerability raises security concerns for machine learning applications.
― 7 min read
Exploring challenges and solutions for safeguarding smart grids from data attacks.
― 5 min read
Instiller improves CPU fuzz testing with efficient techniques and better bug detection.
― 8 min read
MobFuzz enhances fuzz testing with multi-objective optimization for better software security.
― 6 min read
Exploring the role of LLMs in enhancing cybersecurity and their potential misuse.
― 7 min read
Post-Quantum Cryptography is crucial for securing future IoT devices.
― 5 min read
Examining security threats in machine learning-enabled medical devices and their impact on patient safety.
― 7 min read
This work examines how LLMs enhance vulnerability detection in Java code.
― 5 min read
A new method to improve Android malware detection using active learning.
― 5 min read
Study reveals risks of multilingual jailbreak attacks on large language models.
― 5 min read
This study emphasizes the importance of reliable datasets for network traffic anomaly detection.
― 7 min read
This paper examines prompt injections and their implications for AI models.
― 3 min read
This article discusses privacy and security risks in cloud-based AI services.
― 7 min read
Learn how remote attestation ensures system trust and prevents evidence tampering.
― 6 min read
Examining the risks of backdoor attacks on speaker verification systems.
― 6 min read
GuardFS offers proactive defense against ransomware attacks, minimizing data loss effectively.
― 5 min read
Double-Dip combines transfer learning and randomization to guard against membership inference attacks.
― 6 min read
A look at deception online and how to detect it effectively.
― 7 min read
Explores how LLMs can improve bot detection while addressing associated risks.
― 5 min read
Examining security issues and solutions in cloud-based Internet of Things systems.
― 6 min read
HQA-Attack creates high-quality adversarial examples in text while preserving meaning.
― 6 min read
An exploration of the challenges and strategies for improving software security.
― 5 min read
This study investigates jailbreaking attacks on multimodal large language models.
― 6 min read
Examining how deep learning enhances side channel attacks on devices.
― 6 min read
Understanding the security risks of touchscreen devices from IEMI attacks.
― 6 min read
Data poisoning threatens the integrity of in-context learning systems, revealing hidden vulnerabilities.
― 6 min read
A new quantum key agreement protocol enhances security and efficiency in multi-party communication.
― 5 min read
Improving machine learning reliability through advanced OOD detection methods.
― 6 min read