
Sign up to save your podcasts
Or


Aster: Fixing the Android TEE Ecosystem with Arm CCA
RedAgent: Red Teaming Large Language Models with Context-aware
Exploring Automatic Cryptographic API Misuse Detection in the Era of
Language-Based Security for Low-Level MPC
CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy
Side-Channel Analysis of OpenVINO-based Neural Network Models
Improving the Computational Efficiency of Adaptive Audits of IRV
Securing Tomorrow's Smart Cities: Investigating Software Security in
Prisec II -- A Comprehensive Model for IoT Security: Cryptographic
Understanding Impacts of Electromagnetic Signal Injection Attacks on
PrimeGuard: Safe and Helpful LLMs through Tuning-Free Routing
Multimodal Unlearnable Examples: Protecting Data against Multimodal
Hidden Web Caches Discovery
Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20
Backdoor Attacks against Hybrid Classical-Quantum Neural Networks
Systematically Searching for Identity-Related Information in the
Evaluation Scheme to Analyze Keystroke Dynamics Methods
How to Design a Blue Team Scenario for Beginners on the Example of
Hooked: A Real-World Study on QR Code Phishing
VidyaRANG: Conversational Learning Based Platform powered by Large
Figure it Out: Analyzing-based Jailbreak Attack on Large Language Models
Securing The Future Of Healthcare: Building A Resilient Defense System
Representation Magnitude has a Liability to Privacy Vulnerability
Users Feel Guilty: Measurement of Illegal Software Installation Guide
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuAster: Fixing the Android TEE Ecosystem with Arm CCA
RedAgent: Red Teaming Large Language Models with Context-aware
Exploring Automatic Cryptographic API Misuse Detection in the Era of
Language-Based Security for Low-Level MPC
CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy
Side-Channel Analysis of OpenVINO-based Neural Network Models
Improving the Computational Efficiency of Adaptive Audits of IRV
Securing Tomorrow's Smart Cities: Investigating Software Security in
Prisec II -- A Comprehensive Model for IoT Security: Cryptographic
Understanding Impacts of Electromagnetic Signal Injection Attacks on
PrimeGuard: Safe and Helpful LLMs through Tuning-Free Routing
Multimodal Unlearnable Examples: Protecting Data against Multimodal
Hidden Web Caches Discovery
Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20
Backdoor Attacks against Hybrid Classical-Quantum Neural Networks
Systematically Searching for Identity-Related Information in the
Evaluation Scheme to Analyze Keystroke Dynamics Methods
How to Design a Blue Team Scenario for Beginners on the Example of
Hooked: A Real-World Study on QR Code Phishing
VidyaRANG: Conversational Learning Based Platform powered by Large
Figure it Out: Analyzing-based Jailbreak Attack on Large Language Models
Securing The Future Of Healthcare: Building A Resilient Defense System
Representation Magnitude has a Liability to Privacy Vulnerability
Users Feel Guilty: Measurement of Illegal Software Installation Guide
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>