サイバーarXiv

#298 サイバーarxiv (2025-12-01)


Listen Later

本日紹介した論文の一覧

  • The Equivalence of Fast Algorithms for Convolution, Parallel FIR Filters, Polynomial Modular Multiplication, and Pointwise Multiplication in DFT/NTT Domain

    https://arxiv.org/abs/2512.01974v1

  • Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration

    https://arxiv.org/abs/2512.01893v1

  • Behind the Curtain: How Shared Hosting Providers Respond to Vulnerability Notifications

    https://arxiv.org/abs/2512.01891v1

  • JPEGs Just Got Snipped: Croppable Signatures Against Deepfake Images

    https://arxiv.org/abs/2512.01845v1

  • A Privacy-Preserving Information-Sharing Protocol for Federated Authentication

    https://arxiv.org/abs/2512.01832v1

  • AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data

    https://arxiv.org/abs/2512.01727v1

  • Demystifying Feature Engineering in Malware Analysis of API Call Sequences

    https://arxiv.org/abs/2512.01666v1

  • Rethinking Cybersecurity Ontology Classification and Evaluation: Towards a Credibility-Centered Framework

    https://arxiv.org/abs/2512.01651v1

  • On the Context-Hiding Property of Shamir-Based Homomorphic Secret Sharing

    https://arxiv.org/abs/2512.01604v1

  • Towards a Multi-Layer Defence Framework for Securing Near-Real-Time Operations in Open RAN

    https://arxiv.org/abs/2512.01596v1

  • WhiteLie: A Robust System for Spoofing User Data in Android Platforms

    https://arxiv.org/abs/2512.01595v1

  • Confidential, Attestable, and Efficient Inter-CVM Communication with Arm CCA

    https://arxiv.org/abs/2512.01594v1

  • Beyond the Hype: A Large-Scale Empirical Analysis of On-Chain Transactions in NFT Scams

    https://arxiv.org/abs/2512.01577v1

  • IVE: An Accelerator for Single-Server Private Information Retrieval Using Versatile Processing Elements

    https://arxiv.org/abs/2512.01574v1

  • Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits

    https://arxiv.org/abs/2512.01437v1

  • BackportBench: A Multilingual Benchmark for Automated Backporting of Patches

    https://arxiv.org/abs/2512.01396v1

  • INFERMAL: Inferential analysis of maliciously registered domains

    https://arxiv.org/abs/2512.01391v1

  • A Wolf in Sheep's Clothing: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search

    https://arxiv.org/abs/2512.01353v1

  • EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations

    https://arxiv.org/abs/2512.01335v1

  • Securing Large Language Models (LLMs) from Prompt Injection Attacks

    https://arxiv.org/abs/2512.01326v1

  • Systems Security Foundations for Agentic Computing

    https://arxiv.org/abs/2512.01295v1

  • Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation

    https://arxiv.org/abs/2512.01255v1

  • Benchmarking and Understanding Safety Risks in AI Character Platforms

    https://arxiv.org/abs/2512.01247v1

  • CTF Archive: Capture, Curate, Learn Forever

    https://arxiv.org/abs/2512.01233v1

  • DefenSee: Dissecting Threat from Sight and Text - A Multi-View Defensive Pipeline for Multi-modal Jailbreaks

    https://arxiv.org/abs/2512.01185v1

  • Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework

    https://arxiv.org/abs/2512.01164v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu