サイバーarXiv

#293 サイバーarxiv (2025-11-06)


Listen Later

本日紹介した論文の一覧

  • Unclonable Cryptography in Linear Quantum Memory

    http://arxiv.org/abs/2511.04633v1

  • Confidential Computing for Cloud Security: Exploring Hardware based

    Encryption Using Trusted Execution Environments
    http://arxiv.org/abs/2511.04550v1

  • Large Language Models for Cyber Security

    http://arxiv.org/abs/2511.04508v1

  • Exploiting Data Structures for Bypassing and Crashing Anti-Malware

    Solutions via Telemetry Complexity Attacks
    http://arxiv.org/abs/2511.04472v1

  • Adversarially Robust and Interpretable Magecart Malware Detection

    http://arxiv.org/abs/2511.04440v1

  • Data Certification Strategies for Blockchain-based Traceability Systems

    http://arxiv.org/abs/2511.04409v1

  • Tight Analysis of a Grover-based Quantum Secret Sharing Scheme

    http://arxiv.org/abs/2511.04399v1

  • Differentially Private In-Context Learning with Nearest Neighbor Search

    http://arxiv.org/abs/2511.04332v1

  • A Parallel Region-Adaptive Differential Privacy Framework for Image

    Pixelization
    http://arxiv.org/abs/2511.04261v1

  • Space-Bounded Communication Complexity of Unitaries

    http://arxiv.org/abs/2511.04250v1

  • Black-Box Guardrail Reverse-engineering Attack

    http://arxiv.org/abs/2511.04215v1

  • Quantum Key Distribution via Charge Teleportation

    http://arxiv.org/abs/2511.04188v1

  • List Decoding of Folded Reed-Solomon Codes Over Galois Ring

    http://arxiv.org/abs/2511.04135v1

  • Automated and Explainable Denial of Service Analysis for AI-Driven

    Intrusion Detection Systems
    http://arxiv.org/abs/2511.04114v1

  • LLM-Driven Adaptive Source-Sink Identification and False Positive

    Mitigation for Static Analysis
    http://arxiv.org/abs/2511.04023v1

  • OTS-PC: OTS-based Payment Channels for the Lightning Network

    http://arxiv.org/abs/2511.04021v1

  • Specification-Guided Vulnerability Detection with Large Language Models

    http://arxiv.org/abs/2511.04014v1

  • Hybrid Fuzzing with LLM-Guided Input Mutation and Semantic Feedback

    http://arxiv.org/abs/2511.03995v1

  • Design and Detection of Covert Man-in-the-Middle Cyberattacks on Water

    Treatment Plants
    http://arxiv.org/abs/2511.03971v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu