サイバーarXiv

#228 サイバーarxiv (2025-07-08)


Listen Later

本日紹介した論文の一覧

  • Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense

    Measures in Blockchain Bridges [Experiment, Analysis \& Benchmark]
    http://arxiv.org/abs/2507.06156v1

  • Fun with flags: How Compilers Break and Fix Constant-Time Code

    http://arxiv.org/abs/2507.06112v1

  • Taming Data Challenges in ML-based Security Tasks: Lessons from

    Integrating Generative AI
    http://arxiv.org/abs/2507.06092v1

  • Wrapless: The trustless lending protocol on top of Bitcoin

    http://arxiv.org/abs/2507.06064v1

  • CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative

    Adversarial Attacks on their Internal Representations
    http://arxiv.org/abs/2507.06043v1

  • Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for

    Microarchitectural Leaks
    http://arxiv.org/abs/2507.06039v1

  • The Impact of Event Data Partitioning on Privacy-aware Process Discovery

    http://arxiv.org/abs/2507.06008v1

  • Post-Processing in Local Differential Privacy: An Extensive Evaluation

    and Benchmark Platform
    http://arxiv.org/abs/2507.05875v1

  • LDP$^3$: An Extensible and Multi-Threaded Toolkit for Local Differential

    Privacy Protocols and Post-Processing Methods
    http://arxiv.org/abs/2507.05872v1

  • A Formal Refutation of the Blockchain Trilemma

    http://arxiv.org/abs/2507.05809v1

  • Automated Reasoning for Vulnerability Management by Design

    http://arxiv.org/abs/2507.05794v1

  • Asynchronous Event Error-Minimizing Noise for Safeguarding Event Dataset

    http://arxiv.org/abs/2507.05728v1

  • Polyadic encryption

    http://arxiv.org/abs/2507.05683v1

  • TuneShield: Mitigating Toxicity in Conversational AI while Fine-tuning

    on Untrusted Data
    http://arxiv.org/abs/2507.05660v1

  • DESIGN: Encrypted GNN Inference via Server-Side Input Graph Pruning

    http://arxiv.org/abs/2507.05649v1

  • How Not to Detect Prompt Injections with an LLM

    http://arxiv.org/abs/2507.05630v1

  • DATABench: Evaluating Dataset Auditing in Deep Learning from an

    Adversarial Perspective
    http://arxiv.org/abs/2507.05622v1

  • The Landscape of Memorization in LLMs: Mechanisms, Measurement, and

    Mitigation
    http://arxiv.org/abs/2507.05578v1

  • iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor

    System-on-Chips
    http://arxiv.org/abs/2507.05576v1

  • AI Agent Smart Contract Exploit Generation

    http://arxiv.org/abs/2507.05558v1

  • Per-Row Activation Counting on Real Hardware: Demystifying Performance

    Overheads
    http://arxiv.org/abs/2507.05556v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu