Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense
Measures in Blockchain Bridges [Experiment, Analysis \& Benchmark]
http://arxiv.org/abs/2507.06156v1
Fun with flags: How Compilers Break and Fix Constant-Time Code
http://arxiv.org/abs/2507.06112v1
Taming Data Challenges in ML-based Security Tasks: Lessons from
Integrating Generative AI
http://arxiv.org/abs/2507.06092v1
Wrapless: The trustless lending protocol on top of Bitcoin
http://arxiv.org/abs/2507.06064v1
CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative
Adversarial Attacks on their Internal Representations
http://arxiv.org/abs/2507.06043v1
Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for
Microarchitectural Leaks
http://arxiv.org/abs/2507.06039v1
The Impact of Event Data Partitioning on Privacy-aware Process Discovery
http://arxiv.org/abs/2507.06008v1
Post-Processing in Local Differential Privacy: An Extensive Evaluation
and Benchmark Platform
http://arxiv.org/abs/2507.05875v1
LDP$^3$: An Extensible and Multi-Threaded Toolkit for Local Differential
Privacy Protocols and Post-Processing Methods
http://arxiv.org/abs/2507.05872v1
A Formal Refutation of the Blockchain Trilemma
http://arxiv.org/abs/2507.05809v1
Automated Reasoning for Vulnerability Management by Design
http://arxiv.org/abs/2507.05794v1
Asynchronous Event Error-Minimizing Noise for Safeguarding Event Dataset
http://arxiv.org/abs/2507.05728v1
http://arxiv.org/abs/2507.05683v1
TuneShield: Mitigating Toxicity in Conversational AI while Fine-tuning
on Untrusted Data
http://arxiv.org/abs/2507.05660v1
DESIGN: Encrypted GNN Inference via Server-Side Input Graph Pruning
http://arxiv.org/abs/2507.05649v1
How Not to Detect Prompt Injections with an LLM
http://arxiv.org/abs/2507.05630v1
DATABench: Evaluating Dataset Auditing in Deep Learning from an
Adversarial Perspective
http://arxiv.org/abs/2507.05622v1
The Landscape of Memorization in LLMs: Mechanisms, Measurement, and
Mitigation
http://arxiv.org/abs/2507.05578v1
iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor
System-on-Chips
http://arxiv.org/abs/2507.05576v1
AI Agent Smart Contract Exploit Generation
http://arxiv.org/abs/2507.05558v1
Per-Row Activation Counting on Real Hardware: Demystifying Performance
Overheads
http://arxiv.org/abs/2507.05556v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>