ArXiv TLDR
โ† All categories

Cryptography & Security

Research on AI security, adversarial attacks, privacy, and cryptographic methods.

cs.CR ยท 505 papers

Heimdallr: Characterizing and Detecting LLM-Induced Security Risks in GitHub CI Workflows

Heimdallr characterizes and detects LLM-induced security risks in GitHub CI workflows, revealing a new attack surface and disclosing hundreds of vulnerabilities.

2605.05969May 7, 2026Bonan Ruan, Yeqi Fu, Chuqi Zhang +3

Toward Space-Based Public Key Systems: Enabling Secure Space Communications through In-Orbit Trust Services

This paper proposes space-based Public Key Infrastructure architectures to enable secure, low-latency communication and trust services for the New Space era.

2605.05948May 7, 2026Rehana Yasmin, Paulo Esteves-Verissimo, Ali Shoker

Securing the Agent: Vendor-Neutral, Multitenant Enterprise Retrieval and Tool Use

This paper introduces a layered isolation architecture to secure multitenant enterprise RAG and agentic AI systems, preventing data leakage.

2605.05287May 6, 2026Francisco Javier Arceo, Varsha Prasad Narsing

Toward a Risk Assessment Framework for Institutional DeFi: A Nine-Dimension Approach

This paper introduces a nine-dimension risk assessment framework for institutional DeFi, addressing gaps in existing methodologies with novel risk dimensions.

2605.05145May 6, 2026Eva Oberholzer, Valeriy Zamaraiev

SoK: Robustness in Large Language Models against Jailbreak Attacks

This paper systematizes jailbreak attacks and defenses in LLMs, introducing Security Cube for multi-dimensional security evaluation.

2605.05058May 6, 2026Feiyue Xu, Hongsheng Hu, Chaoxiang He +9

Agentic Vulnerability Reasoning on Windows COM Binaries

SLYP is an agentic pipeline that finds race condition vulnerabilities in Windows COM binaries and generates verified proof-of-concept exploits.

2605.05000May 6, 2026Hwiwon Lee, Jongseong Kim, Lingming Zhang

You Snooze, You Lose: Automatic Safety Alignment Restoration through Neural Weight Translation

NeWTral restores safety alignment in specialized LLM adapters without losing domain knowledge, using neural weight translation in the parameter space.

2605.04992May 6, 2026Marco Arazzi, Vignesh Kumar Kembu, Antonino Nocera +2

Probabilistic Atomic Swaps for Bitcoin and Friends

Introduces probabilistic atomic swaps, enabling trustless, verifiable randomized exchanges like lotteries on blockchains without intermediaries.

2605.04975May 6, 2026Paul Gerhart, Jay Taylor, Sri Aravinda Krishnan Thyagarajan

On the (In-)Security of the Shuffling Defense in the Transformer Secure Inference

This paper demonstrates a novel attack that bypasses the shuffling defense in Transformer secure inference, enabling model weight extraction.

2605.04901May 6, 2026Zhengyi Li, Yakai Wang, Kang Yang +6

A Pragmatic Comparison of Cryptographic Computation Technologies for Machine Learning

This paper compares secure multi-party computation (SMPC) and fully homomorphic encryption (FHE) for machine learning, benchmarking their performance.

2605.04858May 6, 2026Marcus Taubert, Adam Skuta, Thomas Loruenser

Data anonymization in the presence of outliers via invariant coordinate selection

This paper introduces ICSA, a robust data anonymization method using invariant coordinate selection to protect data with outliers, outperforming spectral anonymization.

2605.04833May 6, 2026Katariina Perkonoja, Joni Virta

Long-Term Risks of IoT Devices: The Case of the Smart Fridge

Smart fridges face long-term operational risks due to IT component lifecycles, even for basic functions like cooling, which can be generalized to other IoT devices.

2605.04787May 6, 2026Erik Buchmann

AgentTrust: Runtime Safety Evaluation and Interception for AI Agent Tool Use

AgentTrust provides a runtime safety layer for AI agents, intercepting tool calls to prevent unsafe actions like data exfiltration and accidental deletion.

2605.04785May 6, 2026Chenglin Yang

AFL-ICP: Enhancing Industrial Control Protocol Reliability via Specification-Guided Fuzzing

AFL-ICP is a novel specification-guided fuzzer that uses LLMs to enhance the reliability of Industrial Control Protocols by detecting deep semantic vulnerabilities.

2605.04760May 6, 2026Jiaying Meng, Xuewei Feng, Qi Li +2

From Beats to Breaches:How Offensive AI Infers Sensitive User Information from Playlists

This paper introduces musicPIIrate, an Offensive AI tool that infers sensitive user PII from music playlists, and JamShield, a defense against it.

2605.04724May 6, 2026Stefano Cecconello, Mauro Conti, Luca Pajola +2

Vol-Mark: A Watermark for 3D Medical Volume Data Via Cubic Difference Expansion and Contrastive Learning

Vol-Mark is a new watermarking method for 3D medical data, using contrastive learning and cubic difference expansion to ensure ownership and integrity.

2605.04705May 6, 2026Jiangnan Zhu, Yuntao Wang, Shengli Pan +1

Sparse Tokens Suffice: Jailbreaking Audio Language Models via Token-Aware Gradient Optimization

This paper shows that sparse, token-aware gradient optimization can effectively jailbreak Audio Language Models, proving dense updates are redundant.

2605.04700May 6, 2026Zheng Fang, Xiaosen Wang, Shenyi Zhang +2

PINSIGHT: A Comprehensive Threat Exploration of Domain-Adaptive Wi-Fi based PIN Code Inference

PINSIGHT rigorously assesses Wi-Fi PIN inference attacks, revealing that current state-of-the-art methods fail in realistic, unseen environments.

2605.04570May 6, 2026Johannes Kortz, Paul Staat, Christof Paar +1

Pen-Strategist: A Reasoning Framework for Penetration Testing Strategy Formation and Analysis

Pen-Strategist is a new framework that uses logical reasoning and a classifier to improve automated penetration testing strategy formation and action selection.

2605.04499May 6, 2026Yasod Ginige, Pasindu Marasinghe, Sajal Jain +1

An Evaluation of Chat Safety Moderations in Roblox

This paper evaluates Roblox's chat moderation, finding significant failures in detecting unsafe messages like grooming and harassment, and user evasion tactics.

2605.04491May 6, 2026Priya Kaushik, Sonja Brown, Rakibul Hasan +1
PreviousPage 6 of 26Next

๐Ÿ“ฌ Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week โ€” summarized, scored, and delivered to your inbox every Monday.