ArXiv TLDR
← All categories

Cryptography & Security

Research on AI security, adversarial attacks, privacy, and cryptographic methods.

cs.CR · 505 papers

The Adversarial Discount - AI, Signal Correlation, and the Cybersecurity Arms Race

A model of AI-driven cybersecurity arms races reveals how signal correlation neutralizes attacker advantages and highlights defense inefficiencies.

2605.04336May 5, 2026James W. Bono

Probabilistic-bit Guided CDCL for SAT Solving using Ising Consensus Assumptions

A hybrid SAT solver uses a p-bit Ising sampler to guide CDCL, significantly reducing conflicts and propagations on specific 3-SAT benchmarks.

2605.04033May 5, 2026Melki Bino

Redefining AI Red Teaming in the Agentic Era: From Weeks to Hours

This paper introduces an AI red teaming agent that automates vulnerability probing, reducing the process from weeks to hours with a unified framework.

2605.04019May 5, 2026Raja Sekhar Rao Dheekonda, Will Pearce, Nick Landers

LIPPEN: A Lightweight In-Place Pointer Encryption Architecture for Pointer Integrity

LIPPEN is a hardware-software co-design that uses full-pointer encryption to provide strong, metadata-free pointer integrity with PAC-comparable overhead.

2605.03974May 5, 2026Erfan Iravani, Lalit Prasad Peri, Mohannad Ismail +4

Generating Proof-of-Vulnerability Tests to Help Enhance the Security of Complex Software

PoVSmith automates generating proof-of-vulnerability tests for software supply chain attacks using LLMs, significantly improving test quality and reducing manual effort.

2605.03956May 5, 2026Shravya Kanchi, Xiaoyan Zang, Ying Zhang +2

MOSAIC-Bench: Measuring Compositional Vulnerability Induction in Coding Agents

MOSAIC-Bench reveals that coding agents, when given decomposed tasks, often create exploitable code, bypassing current safety measures and reviewer checks.

2605.03952May 5, 2026Jonathan Steinberg, Oren Gal

HELO Cryptography: A Lightweight Cryptographic System for Enhancing IoT Security in P2P Data Transmission

HELO is a new lightweight hybrid cryptographic system designed to enhance IoT security in P2P data transmission without sacrificing performance.

2605.03948May 5, 2026Tahsin Ahmed, Arjita Saha, Arian Nuhan +3

A Deeper Dive into the Irreversibility of PolyProtect: Making Protected Face Templates Harder to Invert

This paper enhances PolyProtect's biometric template irreversibility by proposing a key selection algorithm, making protected face embeddings harder to invert.

2605.03857May 5, 2026Vedrana Krivokuća Hahn, Jérémy Maceiras, Sébastien Marcel

KVerus: Scalable and Resilient Formal Verification Proof Generation for Rust Code

KVerus enables scalable and resilient formal verification for Rust code by bridging the Semantic-Structural Gap with a self-adaptive, retrieval-augmented system.

2605.03822May 5, 2026Yuwei Liu, Xinyi Wan, Yanhao Wang +3

GPUBreach: Privilege Escalation Attacks on GPUs using Rowhammer

GPUBreach shows GPU Rowhammer can achieve privilege escalation, enabling unprivileged access to other processes' GPU memory and CPU root control.

2605.03812May 5, 2026Chris S. Lin, Yuqin Yan, Guozhen Ding +4

Firmware Distribution as Attack Surface: A Security Study of ASIC Cryptocurrency Miners

ASIC cryptocurrency miner firmware distribution is a major attack surface, enabling large-scale compromises through static analysis.

2605.03770May 5, 2026Pierre Pouliquen, Hadrien Barral, David Naccache +2

Internet of Things Security: A Survey on Common Attacks

This paper surveys 28 common IoT attacks, classifying them with STRIDE/CVSS and mapping them to vulnerabilities, offering mitigation insights.

2605.03744May 5, 2026Dalton Cézane Gomes Valadares, Luiz Antonio Pereira Silva, Daniel Hindemburg de Miranda Marques +5

Tailored Prompts, Targeted Protection: Vulnerability-Specific LLM Analysis for Smart Contracts

An LLM framework detects smart contract vulnerabilities using tailored prompts, AST context, and a new large-scale dataset for high precision.

2605.03697May 5, 2026Xing Zhang, Keyu Zhang, Taohong Zhu +1

The Infinite Mutation Engine? Measuring Polymorphism in LLM-Generated Offensive Code

LLMs can generate highly polymorphic, behaviorally identical offensive code, posing a significant threat to signature-based malware detection.

2605.03619May 5, 2026Gabriel Hortea, Juan Tapiador

ZK-Value: A Practical Zero-Knowledge System for Verifiable Data Valuation

ZK-Value is a practical zero-knowledge system for verifiable data valuation that scales to real-world demands using a co-designed architecture.

2605.03581May 5, 2026Zhaoyu Wang, Pingchuan Ma, Zhantong Xue +4

Design of Memristive Lightweight Encryption For In-Memory Image Steganography

This paper designs memristive lightweight encryption for in-memory image steganography, addressing data transfer bottlenecks and enhancing security.

2605.03494May 5, 2026Seyed Erfan Fatemieh, Reza Shahdi Alizadeh, Esmail Zarezadeh

From TinyGo to gc Compiler: Extending Zorya's Concolic Framework to Real-World Go Binaries

Zorya, a concolic execution framework, now supports multi-threaded Go binaries, detecting real-world vulnerabilities, including silent overflows.

2605.03492May 5, 2026Karolina Gorna, Nicolas Iooss, Yannick Seurin +2

MEMSAD: Gradient-Coupled Anomaly Detection for Memory Poisoning in Retrieval-Augmented Agents

Introduces MEMSAD, a gradient-coupled anomaly detection defense, to secure retrieval-augmented LLM agents against memory poisoning attacks with formal guarantees.

2605.03482May 5, 2026Ishrith Gowda

Exposing LLM Safety Gaps Through Mathematical Encoding:New Attacks and Systematic Analysis

New attacks encode harmful prompts as math problems, bypassing LLM safety filters with high success rates and revealing fundamental security gaps.

2605.03441May 5, 2026Haoyu Zhang, Mohammad Zandsalimy, Shanu Sushmita

Graph Reconstruction from Differentially Private GNN Explanations

This paper reveals that differentially private GNN explanations can still leak significant graph structure, proposing PRIVX, a diffusion-based attack.

2605.03388May 5, 2026Rishi Raj Sahoo, Jyotirmaya Shivottam, Subhankar Mishra
PreviousPage 7 of 26Next

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.