サイバーarXiv

#104 サイバーarxiv (2024-07-23)


Listen Later

本日紹介した論文の一覧

  • Aster: Fixing the Android TEE Ecosystem with Arm CCA

    http://arxiv.org/abs/2407.16694v1

  • RedAgent: Red Teaming Large Language Models with Context-aware

    Autonomous Language Agent
    http://arxiv.org/abs/2407.16667v1

  • Exploring Automatic Cryptographic API Misuse Detection in the Era of

    LLMs
    http://arxiv.org/abs/2407.16576v1

  • Language-Based Security for Low-Level MPC

    http://arxiv.org/abs/2407.16504v1

  • CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy

    Cryptocurrency Wallets with TEEs
    http://arxiv.org/abs/2407.16473v1

  • Side-Channel Analysis of OpenVINO-based Neural Network Models

    http://arxiv.org/abs/2407.16467v1

  • Improving the Computational Efficiency of Adaptive Audits of IRV

    Elections
    http://arxiv.org/abs/2407.16465v1

  • Securing Tomorrow's Smart Cities: Investigating Software Security in

    Internet of Vehicles and Deep Learning Technologies
    http://arxiv.org/abs/2407.16410v1

  • Prisec II -- A Comprehensive Model for IoT Security: Cryptographic

    Algorithms and Cloud Integration
    http://arxiv.org/abs/2407.16395v1

  • Understanding Impacts of Electromagnetic Signal Injection Attacks on

    Object Detection
    http://arxiv.org/abs/2407.16327v1

  • PrimeGuard: Safe and Helpful LLMs through Tuning-Free Routing

    http://arxiv.org/abs/2407.16318v1

  • Multimodal Unlearnable Examples: Protecting Data against Multimodal

    Contrastive Learning
    http://arxiv.org/abs/2407.16307v1

  • Hidden Web Caches Discovery

    http://arxiv.org/abs/2407.16303v1

  • Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered

    Sharding
    http://arxiv.org/abs/2407.16295v1

  • Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20

    for Image Encryption
    http://arxiv.org/abs/2407.16274v1

  • Backdoor Attacks against Hybrid Classical-Quantum Neural Networks

    http://arxiv.org/abs/2407.16273v1

  • Systematically Searching for Identity-Related Information in the

    Internet with OSINT Tools
    http://arxiv.org/abs/2407.16251v1

  • Evaluation Scheme to Analyze Keystroke Dynamics Methods

    http://arxiv.org/abs/2407.16247v1

  • How to Design a Blue Team Scenario for Beginners on the Example of

    Brute-Force Attacks on Authentications
    http://arxiv.org/abs/2407.16238v1

  • Hooked: A Real-World Study on QR Code Phishing

    http://arxiv.org/abs/2407.16230v1

  • VidyaRANG: Conversational Learning Based Platform powered by Large

    Language Model
    http://arxiv.org/abs/2407.16209v1

  • Figure it Out: Analyzing-based Jailbreak Attack on Large Language Models

    http://arxiv.org/abs/2407.16205v1

  • Securing The Future Of Healthcare: Building A Resilient Defense System

    For Patient Data Protection
    http://arxiv.org/abs/2407.16170v1

  • Representation Magnitude has a Liability to Privacy Vulnerability

    http://arxiv.org/abs/2407.16164v1

  • Users Feel Guilty: Measurement of Illegal Software Installation Guide

    Videos on YouTube for Malware Distribution
    http://arxiv.org/abs/2407.16132v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu