ArXiv TLDR
โ† All categories

Cryptography & Security

Research on AI security, adversarial attacks, privacy, and cryptographic methods.

cs.CR ยท 505 papers

Sketch-based Access Control: A Multimodal Interface for Translating User Preferences into Intent-Aligned Policies

SBAC is an AI-assisted sketch-based system that simplifies creating and refining access control policies using multimodal LLMs.

2605.10012May 11, 2026Kyzyl Monteiro, Sauvik Das

Nautilus Compass: Black-box Persona Drift Detection for Production LLM Agents

Nautilus Compass detects persona drift in black-box LLM agents using prompt-text analysis, offering an efficient and accessible memory solution.

2605.09863May 11, 2026Chunxiao Wang

GLiGuard: Schema-Conditioned Classification for LLM Safeguard

GLiGuard is a compact 0.3B-parameter model that uses schema-conditioned classification to efficiently safeguard LLMs, outperforming larger models in speed.

2605.07982May 8, 2026Urchade Zaratiana, Mary Newhauser, George Hurn-Maloney +1

Graph Representation Learning Augmented Model Manipulation on Federated Fine-Tuning of LLMs

AugMP is a novel graph representation learning strategy to manipulate federated fine-tuning of LLMs, reducing accuracy and evading defenses.

2605.07961May 8, 2026Hanlin Cai, Kai Li, Houtianfu Wang +4

Longitudinal Analyses of SAST Tools: A CodeQL Case Study

This study longitudinally evaluates CodeQL's efficacy, actionability, and stability on thousands of CVEs across OSS, finding detection inconsistencies.

2605.07900May 8, 2026Jean-Charles Noirot Ferrand, Kyle Domico, Yohan Beugin +1

Zero-determinant Strategy for Moving Target Defense: Existence, Performance, and Computation

This paper proposes zero-determinant (ZD) strategies for Moving Target Defense (MTD) to achieve high performance with low computational cost.

2605.07854May 8, 2026Zhaoyang Cheng, Guanpu Chen, Yiguang Hong +2

CyBiasBench: Benchmarking Bias in LLM Agents for Cyber-Attack Scenarios

CyBiasBench reveals LLM cyber-attack agents exhibit inherent biases, concentrating efforts on specific attack families regardless of prompts.

2605.07830May 8, 2026Taein Lim, Seongyong Ju, Munhyeok Kim +2

Can I Check What I Designed? Mapping Security Design DSLs to Code Analyzers

This paper maps security design DSLs to code analyzers to bridge the abstraction gap between design and implementation security.

2605.07814May 8, 2026Sven Peldszus, Frederik Reiche, Kevin Hermann +3

GRASP -- Graph-Based Anomaly Detection Through Self-Supervised Classification

GRASP is a novel provenance-based intrusion detection system that uses self-supervised graph classification to detect advanced persistent threats without thresholds.

2605.07812May 8, 2026Robin Buchta, Carsten Kleiner, Felix Heine +1

Differentially Private Auditing Under Strategic Response

This paper models differentially private AI audits as a strategic game, proposing an optimal DP budget allocation algorithm to counter developer responses.

2605.07674May 8, 2026Florian A. D. Burnat

Quotient Semivalues for False-Name-Resistant Data Attribution

This paper introduces quotient semivalues to prevent false-name manipulation in ML data attribution, significantly reducing Sybil attack gains.

2605.07663May 8, 2026Florian A. D. Burnat, Brittany I. Davidson

CCX: Enabling Unmodified Intel SGX Applications on Arm CCA

CCX enables existing Intel SGX applications to run on Arm CCA without modification, offering comparable security and improved performance.

2605.07548May 8, 2026Matti Schulze, Thorsten Holz, Felix Freiling

GESR: Graph-Based Edge Semantic Reconstruction for Stealthy Communication Detection with Benign-Only Training

GESR detects stealthy network attacks by reconstructing edge semantics from local graph context using benign-only training.

2605.07536May 8, 2026Henghui Xu, Yuchen Zhang, Xiaobo Ma

Resilience of IEC 61850 Sampled Values-Based Protection Systems Under Coordinated False Data Injections

This paper reveals critical vulnerabilities in IEC 61850 digital substations under coordinated False Data Injection Attacks targeting Sampled Values.

2605.07535May 8, 2026Denys Mishchenko, Irina Oleinikova, Laszlo Erdodi

An Automated Framework for Cybersecurity Policy Compliance Assessment Against Security Control Standards

PROPARAG automates cybersecurity policy compliance assessment against security controls using LLMs, achieving high F1 scores and identifying policy gaps.

2605.07515May 8, 2026Bikash Saha, Sandeep Kumar Shukla

Cross-Modal Backdoors in Multimodal Large Language Models

This paper introduces a novel cross-modal backdoor attack on multimodal LLMs by poisoning lightweight connectors, achieving high success rates and stealth.

2605.07490May 8, 2026Runhe Wang, Li Bai, Haibo Hu +1

Spying Across Chiplets: Side-Channel Attacks in 2.5/3D Integrated Systems

This paper demonstrates side-channel attacks across chiplets in 2.5/3D integrated systems by repurposing communication-oriented chiplets as observation platforms.

2605.07486May 8, 2026Giorgio Di Natale, Christelle Rabache, Pierre-Louis Hellier +4

Vaporizer: Breaking Watermarking Schemes for Large Language Model Outputs

This paper introduces "Vaporizer," an attack framework demonstrating how to effectively remove watermarks from large language model outputs.

2605.07481May 8, 2026Jonathan Hong Jin Ng, Anh Tu Ngo, Anupam Chattopadhyay

HBEE: Human Behavioral Entropy Engine -- Pre-Registered Multi-Agent LLM Simulation of Peer-Suspicion-Based Detection Inversion

An LLM-driven multi-agent simulation reveals that adaptive insider threats can achieve "detection inversion," receiving less peer suspicion than innocent agents.

2605.07472May 8, 2026Vickson Ferrel

Forensic analysis of video data deletion and recovery in Honeywell surveillance file system

This paper analyzes the proprietary Honeywell surveillance file system to understand video deletion mechanisms and demonstrate recovery feasibility.

2605.07430May 8, 2026Jinhee Yoon, Sungjae Hwang
PreviousPage 4 of 26Next

๐Ÿ“ฌ Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week โ€” summarized, scored, and delivered to your inbox every Monday.