Aster: Fixing the Android TEE Ecosystem with Arm CCA
http://arxiv.org/abs/2407.16694v1
RedAgent: Red Teaming Large Language Models with Context-aware
Autonomous Language Agent
http://arxiv.org/abs/2407.16667v1
Exploring Automatic Cryptographic API Misuse Detection in the Era of
LLMs
http://arxiv.org/abs/2407.16576v1
Language-Based Security for Low-Level MPC
http://arxiv.org/abs/2407.16504v1
CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy
Cryptocurrency Wallets with TEEs
http://arxiv.org/abs/2407.16473v1
Side-Channel Analysis of OpenVINO-based Neural Network Models
http://arxiv.org/abs/2407.16467v1
Improving the Computational Efficiency of Adaptive Audits of IRV
Elections
http://arxiv.org/abs/2407.16465v1
Securing Tomorrow's Smart Cities: Investigating Software Security in
Internet of Vehicles and Deep Learning Technologies
http://arxiv.org/abs/2407.16410v1
Prisec II -- A Comprehensive Model for IoT Security: Cryptographic
Algorithms and Cloud Integration
http://arxiv.org/abs/2407.16395v1
Understanding Impacts of Electromagnetic Signal Injection Attacks on
Object Detection
http://arxiv.org/abs/2407.16327v1
PrimeGuard: Safe and Helpful LLMs through Tuning-Free Routing
http://arxiv.org/abs/2407.16318v1
Multimodal Unlearnable Examples: Protecting Data against Multimodal
Contrastive Learning
http://arxiv.org/abs/2407.16307v1
Hidden Web Caches Discovery
http://arxiv.org/abs/2407.16303v1
Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered
Sharding
http://arxiv.org/abs/2407.16295v1
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20
for Image Encryption
http://arxiv.org/abs/2407.16274v1
Backdoor Attacks against Hybrid Classical-Quantum Neural Networks
http://arxiv.org/abs/2407.16273v1
Systematically Searching for Identity-Related Information in the
Internet with OSINT Tools
http://arxiv.org/abs/2407.16251v1
Evaluation Scheme to Analyze Keystroke Dynamics Methods
http://arxiv.org/abs/2407.16247v1
How to Design a Blue Team Scenario for Beginners on the Example of
Brute-Force Attacks on Authentications
http://arxiv.org/abs/2407.16238v1
Hooked: A Real-World Study on QR Code Phishing
http://arxiv.org/abs/2407.16230v1
VidyaRANG: Conversational Learning Based Platform powered by Large
Language Model
http://arxiv.org/abs/2407.16209v1
Figure it Out: Analyzing-based Jailbreak Attack on Large Language Models
http://arxiv.org/abs/2407.16205v1
Securing The Future Of Healthcare: Building A Resilient Defense System
For Patient Data Protection
http://arxiv.org/abs/2407.16170v1
Representation Magnitude has a Liability to Privacy Vulnerability
http://arxiv.org/abs/2407.16164v1
Users Feel Guilty: Measurement of Illegal Software Installation Guide
Videos on YouTube for Malware Distribution
http://arxiv.org/abs/2407.16132v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>