
Sign up to save your podcasts
Or


The Equivalence of Fast Algorithms for Convolution, Parallel FIR Filters, Polynomial Modular Multiplication, and Pointwise Multiplication in DFT/NTT Domain
Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration
Behind the Curtain: How Shared Hosting Providers Respond to Vulnerability Notifications
JPEGs Just Got Snipped: Croppable Signatures Against Deepfake Images
A Privacy-Preserving Information-Sharing Protocol for Federated Authentication
AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data
Demystifying Feature Engineering in Malware Analysis of API Call Sequences
Rethinking Cybersecurity Ontology Classification and Evaluation: Towards a Credibility-Centered Framework
On the Context-Hiding Property of Shamir-Based Homomorphic Secret Sharing
Towards a Multi-Layer Defence Framework for Securing Near-Real-Time Operations in Open RAN
WhiteLie: A Robust System for Spoofing User Data in Android Platforms
Confidential, Attestable, and Efficient Inter-CVM Communication with Arm CCA
Beyond the Hype: A Large-Scale Empirical Analysis of On-Chain Transactions in NFT Scams
IVE: An Accelerator for Single-Server Private Information Retrieval Using Versatile Processing Elements
Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits
BackportBench: A Multilingual Benchmark for Automated Backporting of Patches
INFERMAL: Inferential analysis of maliciously registered domains
A Wolf in Sheep's Clothing: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search
EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations
Securing Large Language Models (LLMs) from Prompt Injection Attacks
Systems Security Foundations for Agentic Computing
Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation
Benchmarking and Understanding Safety Risks in AI Character Platforms
CTF Archive: Capture, Curate, Learn Forever
DefenSee: Dissecting Threat from Sight and Text - A Multi-View Defensive Pipeline for Multi-modal Jailbreaks
Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuThe Equivalence of Fast Algorithms for Convolution, Parallel FIR Filters, Polynomial Modular Multiplication, and Pointwise Multiplication in DFT/NTT Domain
Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration
Behind the Curtain: How Shared Hosting Providers Respond to Vulnerability Notifications
JPEGs Just Got Snipped: Croppable Signatures Against Deepfake Images
A Privacy-Preserving Information-Sharing Protocol for Federated Authentication
AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data
Demystifying Feature Engineering in Malware Analysis of API Call Sequences
Rethinking Cybersecurity Ontology Classification and Evaluation: Towards a Credibility-Centered Framework
On the Context-Hiding Property of Shamir-Based Homomorphic Secret Sharing
Towards a Multi-Layer Defence Framework for Securing Near-Real-Time Operations in Open RAN
WhiteLie: A Robust System for Spoofing User Data in Android Platforms
Confidential, Attestable, and Efficient Inter-CVM Communication with Arm CCA
Beyond the Hype: A Large-Scale Empirical Analysis of On-Chain Transactions in NFT Scams
IVE: An Accelerator for Single-Server Private Information Retrieval Using Versatile Processing Elements
Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits
BackportBench: A Multilingual Benchmark for Automated Backporting of Patches
INFERMAL: Inferential analysis of maliciously registered domains
A Wolf in Sheep's Clothing: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search
EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations
Securing Large Language Models (LLMs) from Prompt Injection Attacks
Systems Security Foundations for Agentic Computing
Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation
Benchmarking and Understanding Safety Risks in AI Character Platforms
CTF Archive: Capture, Curate, Learn Forever
DefenSee: Dissecting Threat from Sight and Text - A Multi-View Defensive Pipeline for Multi-modal Jailbreaks
Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>