This article discusses the risks of package hallucinations in code-generating models.
― 6 min read
Cutting edge science explained simply
This article discusses the risks of package hallucinations in code-generating models.
― 6 min read
Using language models to improve software bug detection and testing efficiency.
― 6 min read
New benchmark CTIBench evaluates LLM effectiveness in tackling cyber threats.
― 5 min read
A look at kernel safety methods to combat advanced attacks like Spectre.
― 6 min read
A new digital signature system improves speed and security in data center applications.
― 5 min read
Examining the Rowhammer flaw and its implications for data security.
― 7 min read
Investigating the security flaws in Memory Tagging Extension and speculative execution attacks.
― 6 min read
Examining the security risks and solutions for emerging AI assistant technologies.
― 6 min read
A look at vulnerabilities and solutions for deep learning systems.
― 6 min read
FSBI method improves detection of manipulated digital media.
― 5 min read
A new tool improves static analysis with simplified graphs and machine learning.
― 7 min read
Competition reveals vulnerabilities and defenses in language model security.
― 3 min read
A method to identify attacks on systems combining images and text.
― 6 min read
New method targets rhythm changes for stealthy speech attacks.
― 5 min read
New methods improve unlearning harmful data in machine learning systems.
― 5 min read
A look into robust learning models and their importance in data security.
― 7 min read
Examining security risks in mmWave networks utilizing simultaneous wireless information and power transfer.
― 6 min read
A study on improving model extraction techniques for deep learning security.
― 6 min read
A new approach combines knowledge and technology to improve software vulnerability detection.
― 7 min read
This paper introduces a framework to evaluate vulnerabilities in large language models.
― 3 min read
Centaurs combine human insight and AI to improve decision-making across various fields.
― 8 min read
A new method for encrypted control enhances security while performing necessary functions.
― 4 min read
A plan to bolster the electricity grid's resilience and reliability amid emerging digital risks.
― 6 min read
This article explores the impact of data poisoning on language model alignment.
― 6 min read
P3GNN enhances APT detection while protecting data privacy in SDN networks.
― 6 min read
Learn how backdoor attacks threaten machine learning systems and methods to defend against them.
― 6 min read
Tracemax offers improved packet tracing for better DDoS attack defense.
― 6 min read
A framework to improve APT detection while protecting privacy.
― 5 min read
Exploring the safety challenges posed by adversarial attacks on multimodal agents.
― 6 min read
Addressing the safety concerns of code produced by large language models.
― 7 min read
LLMs can aid in social engineering protection and also pose new risks.
― 6 min read
A new defense strategy for LLMs against backdoor attacks.
― 5 min read
Cybersecurity evolves with zero-trust networking to combat rising threats.
― 5 min read
A new lightweight approach to enhance cyber threat sharing among IoT devices.
― 5 min read
DF40 offers a comprehensive approach to improving deepfake detection methods.
― 6 min read
SeCTIS enables safe sharing of cyber threat intelligence while maintaining privacy and data quality.
― 5 min read
This article discusses the security risks and defense strategies for large language models.
― 8 min read
A study on how language models can ignore instructions and their implications.
― 7 min read
QuADTool simplifies risk assessment through attack-defense trees.
― 6 min read
New techniques enhance privacy and security in database queries and transactions.
― 7 min read