サイバーarXiv

#282 サイバーarxiv (2025-10-16)


Listen Later

本日紹介した論文の一覧

  • A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic

    Detection Systems
    http://arxiv.org/abs/2510.14906v1

  • Mapping Smarter, Not Harder: A Test-Time Reinforcement Learning Agent

    That Improves Without Labels or Model Updates
    http://arxiv.org/abs/2510.14900v1

  • Secure Sparse Matrix Multiplications and their Applications to

    Privacy-Preserving Machine Learning
    http://arxiv.org/abs/2510.14894v1

  • Provable Unlearning with Gradient Ascent on Two-Layer ReLU Neural

    Networks
    http://arxiv.org/abs/2510.14844v1

  • ColumnDisturb: Understanding Column-based Read Disturbance in Real DRAM

    Chips and Implications for Future Systems
    http://arxiv.org/abs/2510.14750v1

  • SLIE: A Secure and Lightweight Cryptosystem for Data Sharing in IoT

    Healthcare Services
    http://arxiv.org/abs/2510.14708v1

  • LLM Agents for Automated Web Vulnerability Reproduction: Are We There

    Yet?
    http://arxiv.org/abs/2510.14700v1

  • FibRace: a large-scale benchmark of client-side proving on mobile

    devices
    http://arxiv.org/abs/2510.14693v1

  • AEX-NStep: Probabilistic Interrupt Counting Attacks on Intel SGX

    http://arxiv.org/abs/2510.14675v1

  • TITAN: Graph-Executable Reasoning for Cyber Threat Intelligence

    http://arxiv.org/abs/2510.14670v1

  • Improving Cybercrime Detection and Digital Forensics Investigations with

    Artificial Intelligence
    http://arxiv.org/abs/2510.14638v1

  • Symbolic verification of Apple's Find My location-tracking protocol

    http://arxiv.org/abs/2510.14589v1

  • Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program

    Regeneration
    http://arxiv.org/abs/2510.14522v1

  • Certifying optimal MEV strategies with Lean

    http://arxiv.org/abs/2510.14480v1

  • Stealthy Dual-Trigger Backdoors: Attacking Prompt Tuning in LM-Empowered

    Graph Foundation Models
    http://arxiv.org/abs/2510.14470v1

  • Match & Mend: Minimally Invasive Local Reassembly for Patching N-day

    Vulnerabilities in ARM Binaries
    http://arxiv.org/abs/2510.14384v1

  • Are My Optimized Prompts Compromised? Exploring Vulnerabilities of

    LLM-based Optimizers
    http://arxiv.org/abs/2510.14381v1

  • BinCtx: Multi-Modal Representation Learning for Robust Android App

    Behavior Detection
    http://arxiv.org/abs/2510.14344v1

  • Terrarium: Revisiting the Blackboard for Multi-Agent Safety, Privacy,

    and Security Studies
    http://arxiv.org/abs/2510.14312v1

  • Beyond a Single Perspective: Towards a Realistic Evaluation of Website

    Fingerprinting Attacks
    http://arxiv.org/abs/2510.14283v1

  • RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics

    and Techniques with Large Language Models
    http://arxiv.org/abs/2510.14233v1

  • An Information Asymmetry Game for Trigger-based DNN Model Watermarking

    http://arxiv.org/abs/2510.14218v1

  • Infrastructure Patterns in Toll Scam Domains: A Comprehensive Analysis

    of Cybercriminal Registration and Hosting Strategies
    http://arxiv.org/abs/2510.14198v1

  • Securing U.S. Critical Infrastructure: Lessons from Stuxnet and the

    Ukraine Power Grid Attacks
    http://arxiv.org/abs/2510.14185v1

  • Power Grid Cybersecurity: Policy Analysis White Paper

    http://arxiv.org/abs/2510.14171v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu