source: export.arxiv.org/rss/cs.CR
maintainer: @tmaehara.bsky.social
RobustMask: Certified Robustness against Adversarial Neural Ranking Attack via Randomized Masking
https://arxiv.org/abs/2512.23307
RobustMask: Certified Robustness against Adversarial Neural Ranking Attack via Randomized Masking
https://arxiv.org/abs/2512.23307
Fuzzilicon: A Post-Silicon Microcode-Guided x86 CPU Fuzzer
https://arxiv.org/abs/2512.23438
Fuzzilicon: A Post-Silicon Microcode-Guided x86 CPU Fuzzer
https://arxiv.org/abs/2512.23438
Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation
https://arxiv.org/abs/2512.23480
Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation
https://arxiv.org/abs/2512.23480
A Privacy Protocol Using Ephemeral Intermediaries and a Rank-Deficient Matrix Power Function (RDMPF)
https://arxiv.org/abs/2512.23535
A Privacy Protocol Using Ephemeral Intermediaries and a Rank-Deficient Matrix Power Function (RDMPF)
https://arxiv.org/abs/2512.23535
Toward Trustworthy Agentic AI: A Multimodal Framework for Preventing Prompt Injection Attacks
https://arxiv.org/abs/2512.23557
Toward Trustworthy Agentic AI: A Multimodal Framework for Preventing Prompt Injection Attacks
https://arxiv.org/abs/2512.23557
Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation
https://arxiv.org/abs/2512.23610
Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation
https://arxiv.org/abs/2512.23610
Reflection-Driven Control for Trustworthy Code Agents
https://arxiv.org/abs/2512.21354
Reflection-Driven Control for Trustworthy Code Agents
https://arxiv.org/abs/2512.21354
Composition Theorems for f-Differential Privacy
https://arxiv.org/abs/2512.21358
Composition Theorems for f-Differential Privacy
https://arxiv.org/abs/2512.21358
Power Side-Channel Analysis of the CVA6 RISC-V Core at the RTL Level Using VeriSide
https://arxiv.org/abs/2512.21362
Power Side-Channel Analysis of the CVA6 RISC-V Core at the RTL Level Using VeriSide
https://arxiv.org/abs/2512.21362
Satellite Cybersecurity Across Orbital Altitudes: Analyzing Ground-Based Threats to LEO, MEO, and GEO
https://arxiv.org/abs/2512.21367
Satellite Cybersecurity Across Orbital Altitudes: Analyzing Ground-Based Threats to LEO, MEO, and GEO
https://arxiv.org/abs/2512.21367
Key Length-Oriented Classification of Lightweight Cryptographic Algorithms for IoT Security
https://arxiv.org/abs/2512.21368
Key Length-Oriented Classification of Lightweight Cryptographic Algorithms for IoT Security
https://arxiv.org/abs/2512.21368
The Imitation Game: Using Large Language Models as Chatbots to Combat Chat-Based Cybercrimes
https://arxiv.org/abs/2512.21371
The Imitation Game: Using Large Language Models as Chatbots to Combat Chat-Based Cybercrimes
https://arxiv.org/abs/2512.21371
Security Risks Introduced by Weak Authentication in Smart Home IoT Systems
https://arxiv.org/abs/2512.21374
Security Risks Introduced by Weak Authentication in Smart Home IoT Systems
https://arxiv.org/abs/2512.21374
A Systematic Review of Technical Defenses Against Software-Based Cheating in Online Multiplayer Games
https://arxiv.org/abs/2512.21377
A Systematic Review of Technical Defenses Against Software-Based Cheating in Online Multiplayer Games
https://arxiv.org/abs/2512.21377
LLM-Driven Feature-Level Adversarial Attacks on Android Malware Detectors
https://arxiv.org/abs/2512.21404
LLM-Driven Feature-Level Adversarial Attacks on Android Malware Detectors
https://arxiv.org/abs/2512.21404
GoldenFuzz: Generative Golden Reference Hardware Fuzzing
https://arxiv.org/abs/2512.21524
GoldenFuzz: Generative Golden Reference Hardware Fuzzing
https://arxiv.org/abs/2512.21524
Enhancing Distributed Authorization With Lagrange Interpolation And Attribute-Based Encryption
https://arxiv.org/abs/2512.21525
Enhancing Distributed Authorization With Lagrange Interpolation And Attribute-Based Encryption
https://arxiv.org/abs/2512.21525
Security Boundaries of Quantum Key Reuse: A Quantitative Evaluation Method for QKD Key Rotation Interval and Security Benefits Combined with Block Ciphers
https://arxiv.org/abs/2512.21561
Security Boundaries of Quantum Key Reuse: A Quantitative Evaluation Method for QKD Key Rotation Interval and Security Benefits Combined with Block Ciphers
https://arxiv.org/abs/2512.21561
Verifiable Passkey: The Decentralized Authentication Standard
https://arxiv.org/abs/2512.21663
Verifiable Passkey: The Decentralized Authentication Standard
https://arxiv.org/abs/2512.21663
Exploring the Security Threats of Retriever Backdoors in Retrieval-Augmented Code Generation
https://arxiv.org/abs/2512.21681
Exploring the Security Threats of Retriever Backdoors in Retrieval-Augmented Code Generation
https://arxiv.org/abs/2512.21681
Raster Domain Text Steganography: A Unified Framework for Multimodal Secure Embedding
https://arxiv.org/abs/2512.21698
Raster Domain Text Steganography: A Unified Framework for Multimodal Secure Embedding
https://arxiv.org/abs/2512.21698
Machine Learning Power Side-Channel Attack on SNOW-V
https://arxiv.org/abs/2512.21737
Machine Learning Power Side-Channel Attack on SNOW-V
https://arxiv.org/abs/2512.21737
Assessing the Effectiveness of Membership Inference on Generative Music
https://arxiv.org/abs/2512.21762
Assessing the Effectiveness of Membership Inference on Generative Music
https://arxiv.org/abs/2512.21762
Organizational Learning in Industry 4.0: Applying Crossan's 4I Framework with Double Loop Learning
https://arxiv.org/abs/2512.21813
Organizational Learning in Industry 4.0: Applying Crossan's 4I Framework with Double Loop Learning
https://arxiv.org/abs/2512.21813
Securing Cross-Domain Internet of Drones: An RFF-PUF Allied Authenticated Key Exchange Protocol With Over-the-Air Enrollment
https://arxiv.org/abs/2512.21827
Securing Cross-Domain Internet of Drones: An RFF-PUF Allied Authenticated Key Exchange Protocol With Over-the-Air Enrollment
https://arxiv.org/abs/2512.21827