サイバーarXiv

#310 サイバーarxiv (2025-12-23)


Listen Later

本日紹介した論文の一覧

  • Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem

    https://arxiv.org/abs/2512.20583v1

  • ARBITER: AI-Driven Filtering for Role-Based Access Control

    https://arxiv.org/abs/2512.20535v1

  • Evasion-Resilient Detection of DNS-over-HTTPS Data Exfiltration: A Practical Evaluation and Toolkit

    https://arxiv.org/abs/2512.20423v1

  • ChatGPT: Excellent Paper! Accept It. Editor: Imposter Found! Review Rejected

    https://arxiv.org/abs/2512.20405v1

  • iblock: Accurate and Scalable Bitcoin Simulations with OMNeT++

    https://arxiv.org/abs/2512.20402v1

  • Symmaries: Automatic Inference of Formal Security Summaries for Java Programs

    https://arxiv.org/abs/2512.20396v1

  • Differentially Private Feature Release for Wireless Sensing: Adaptive Privacy Budget Allocation on CSI Spectrograms

    https://arxiv.org/abs/2512.20323v1

  • From the Two-Capacitor Paradox to Electromagnetic Side-Channel Mitigation in Digital Circuits

    https://arxiv.org/abs/2512.20303v1

  • Post-Quantum Cryptography in the 5G Core

    https://arxiv.org/abs/2512.20243v1

  • Achieving Flexible and Secure Authentication with Strong Privacy in Decentralized Networks

    https://arxiv.org/abs/2512.20234v1

  • Optimistic TEE-Rollups: A Hybrid Architecture for Scalable and Verifiable Generative AI Inference on Blockchain

    https://arxiv.org/abs/2512.20176v1

  • Odysseus: Jailbreaking Commercial Multimodal LLM-integrated Systems via Dual Steganography

    https://arxiv.org/abs/2512.20168v1

  • Fault Injection Attacks on Machine Learning-based Quantum Computer Readout Error Correction

    https://arxiv.org/abs/2512.20077v1

  • On the Effectiveness of Instruction-Tuning Local LLMs for Identifying Software Vulnerabilities

    https://arxiv.org/abs/2512.20062v1

  • IoT-based Android Malware Detection Using Graph Neural Network With Adversarial Defense

    https://arxiv.org/abs/2512.20004v1

  • BacAlarm: Mining and Simulating Composite API Traffic to Prevent Broken Access Control Violations

    https://arxiv.org/abs/2512.19997v1

  • Fast Deterministically Safe Proof-of-Work Consensus

    https://arxiv.org/abs/2512.19968v1

  • Efficient Mod Approximation and Its Applications to CKKS Ciphertexts

    https://arxiv.org/abs/2512.19951v1

  • Energy-Efficient Multi-LLM Reasoning for Binary-Free Zero-Day Detection in IoT Firmware

    https://arxiv.org/abs/2512.19945v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu