サイバーarXiv

#307 サイバーarxiv (2025-12-16)


Listen Later

本日紹介した論文の一覧

  • PerProb: Indirectly Evaluating Memorization in Large Language Models

    https://arxiv.org/abs/2512.14600v1

  • Exploiting Reset Operations in Cloud-based Quantum Computers to Run Quantum Circuits for Free

    https://arxiv.org/abs/2512.14582v1

  • PrivATE: Differentially Private Average Treatment Effect Estimation for Observational Data

    https://arxiv.org/abs/2512.14557v1

  • Aligning Security Compliance and DevOps: A Longitudinal Study

    https://arxiv.org/abs/2512.14453v1

  • Reasoning-Style Poisoning of LLM Agents via Stealthy Style Transfer: Process-Level Attacks and Runtime Monitoring in RSV Space

    https://arxiv.org/abs/2512.14448v1

  • VICTOR: Dataset Copyright Auditing in Video Recognition Systems

    https://arxiv.org/abs/2512.14439v1

  • Hybrid Ensemble Method for Detecting Cyber-Attacks in Water Distribution Systems Using the BATADAL Dataset

    https://arxiv.org/abs/2512.14422v1

  • Lost in the Pages: WebAssembly Code Recovery through SEV-SNP's Exposed Address Space

    https://arxiv.org/abs/2512.14376v1

  • Criminal Liability in AI-Enabled Autonomous Vehicles: A Comparative Study

    https://arxiv.org/abs/2512.14330v1

  • LegionITS: A Federated Intrusion-Tolerant System Architecture

    https://arxiv.org/abs/2512.14242v1

  • PentestEval: Benchmarking LLM-based Penetration Testing with Modular and Stage-Level Design

    https://arxiv.org/abs/2512.14233v1

  • IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol

    https://arxiv.org/abs/2512.14166v1

  • CIS-BA: Continuous Interaction Space Based Backdoor Attack for Object Detection in the Real-World

    https://arxiv.org/abs/2512.14158v1

  • HAL -- An Open-Source Framework for Gate-Level Netlist Analysis

    https://arxiv.org/abs/2512.14139v1

  • UIXPOSE: Mobile Malware Detection via Intention-Behaviour Discrepancy Analysis

    https://arxiv.org/abs/2512.14130v1

  • From Obfuscated to Obvious: A Comprehensive JavaScript Deobfuscation Tool for Security Analysis

    https://arxiv.org/abs/2512.14070v1

  • A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis

    https://arxiv.org/abs/2512.14045v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu