arXiv cs.CR Cryptography and Security
cscr-bot.bsky.social
arXiv cs.CR Cryptography and Security
@cscr-bot.bsky.social
Reposted by arXiv cs.CR Cryptography and Security
Jakub Szefer: Research Directions in Quantum Computer Cybersecurity https://arxiv.org/abs/2512.23607 https://arxiv.org/pdf/2512.23607 https://arxiv.org/html/2512.23607
December 30, 2025 at 6:50 AM
Reposted by arXiv cs.CR Cryptography and Security
Marko Vukoli\'c, Orestis Alpos, Jakov Mitrovski, Themis Papameletiou, Nikola Risti\'c, Dionysis Zindros: Bitcoin-IPC: Scaling Bitcoin with a Network of Proof-of-Stake Subnets https://arxiv.org/abs/2512.23439 https://arxiv.org/pdf/2512.23439 https://arxiv.org/html/2512.23439
December 30, 2025 at 6:31 AM
Reposted by arXiv cs.CR Cryptography and Security
The Anh Nguyen, Triet Huynh Minh Le, M. Ali Babar: Securing the AI Supply Chain: What Can We Learn From Developer-Reported Security Issues and Solutions of AI Projects? https://arxiv.org/abs/2512.23385 https://arxiv.org/pdf/2512.23385 https://arxiv.org/html/2512.23385
December 30, 2025 at 6:35 AM
Reposted by arXiv cs.CR Cryptography and Security
Tsogt-Ochir Enkhbayar: Learning from Negative Examples: Why Warning-Framed Training Data Teaches What It Warns Against https://arxiv.org/abs/2512.22293 https://arxiv.org/pdf/2512.22293 https://arxiv.org/html/2512.22293
December 30, 2025 at 6:33 AM
Reposted by arXiv cs.CR Cryptography and Security
Daniyal Ganiuly, Nurzhau Bolatbek, Assel Smaiyl: Failure Analysis of Safety Controllers in Autonomous Vehicles Under Object-Based LiDAR Attacks https://arxiv.org/abs/2512.22244 https://arxiv.org/pdf/2512.22244 https://arxiv.org/html/2512.22244
December 30, 2025 at 6:34 AM
Reposted by arXiv cs.CR Cryptography and Security
Zhihan Cao, Xiao Yang, Gaolei Li, Jun Wu, Jianhua Li, Yuchen Liu: SemCovert: Secure and Covert Video Transmission via Deep Semantic-Level Hiding https://arxiv.org/abs/2512.22233 https://arxiv.org/pdf/2512.22233 https://arxiv.org/html/2512.22233
December 30, 2025 at 6:35 AM
Reposted by arXiv cs.CR Cryptography and Security
Shaghayegh Shajarian, Kennedy Marsh, James Benson, Sajad Khorsandroo, Mahmoud Abdelsalam: ReGAIN: Retrieval-Grounded AI Framework for Network Traffic Analysis https://arxiv.org/abs/2512.22223 https://arxiv.org/pdf/2512.22223 https://arxiv.org/html/2512.22223
December 30, 2025 at 6:32 AM
Reposted by arXiv cs.CR Cryptography and Security
Rajeeb Thapa Chhetri, Zhixiong Chen, Saurab Thapa: Latent Sculpting for Zero-Shot Generalization: A Manifold Learning Approach to Out-of-Distribution Anomaly Detection https://arxiv.org/abs/2512.22179 https://arxiv.org/pdf/2512.22179 https://arxiv.org/html/2512.22179
December 30, 2025 at 6:32 AM
Reposted by arXiv cs.CR Cryptography and Security
Emmanuel Giguet (GREYC): IANEC: Digital Forensic Investigation of Contemporary Writers' Archives https://arxiv.org/abs/2512.22167 https://arxiv.org/pdf/2512.22167 https://arxiv.org/html/2512.22167
December 30, 2025 at 6:30 AM
Reposted by arXiv cs.CR Cryptography and Security
Yongyu Wang: Pruning Graphs by Adversarial Robustness Evaluation to Strengthen GNN Defenses https://arxiv.org/abs/2512.22128 https://arxiv.org/pdf/2512.22128 https://arxiv.org/html/2512.22128
December 30, 2025 at 6:32 AM
Osama, Elebiary, Qassim, Amgad, Maghawry, Saafan, Ghalwash: Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation https://arxiv.org/abs/2512.23610 https://arxiv.org/pdf/2512.23610 https://arxiv.org/html/2512.23610
December 30, 2025 at 6:30 AM
Toqeer Ali Syed, Mishal Ateeq Almutairi, Mahmoud Abdel Moaty: Toward Trustworthy Agentic AI: A Multimodal Framework for Preventing Prompt Injection Attacks https://arxiv.org/abs/2512.23557 https://arxiv.org/pdf/2512.23557 https://arxiv.org/html/2512.23557
December 30, 2025 at 6:30 AM
Eduardo Salazar: A Privacy Protocol Using Ephemeral Intermediaries and a Rank-Deficient Matrix Power Function (RDMPF) https://arxiv.org/abs/2512.23535 https://arxiv.org/pdf/2512.23535 https://arxiv.org/html/2512.23535
December 30, 2025 at 6:30 AM
Syed, Belgaum, Jan, Khan, Alqahtani: Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation https://arxiv.org/abs/2512.23480 https://arxiv.org/pdf/2512.23480 https://arxiv.org/html/2512.23480
December 30, 2025 at 6:30 AM
Johannes Lenzen, Mohamadreza Rostami, Lichao Wu, Ahmad-Reza Sadeghi: Fuzzilicon: A Post-Silicon Microcode-Guided x86 CPU Fuzzer https://arxiv.org/abs/2512.23438 https://arxiv.org/pdf/2512.23438 https://arxiv.org/html/2512.23438
December 30, 2025 at 6:30 AM
Jiawei Liu, Zhuo Chen, Rui Zhu, Miaokun Chen, Yuyang Gong, Wei Lu, Xiaofeng Wang: RobustMask: Certified Robustness against Adversarial Neural Ranking Attack via Randomized Masking https://arxiv.org/abs/2512.23307 https://arxiv.org/pdf/2512.23307 https://arxiv.org/html/2512.23307
December 30, 2025 at 6:30 AM
Partha Paul, Keshav Sinha: Multiparty Authorization for Secure Data Storage in Cloud Environments using Improved Attribute-Based Encryption https://arxiv.org/abs/2512.23216 https://arxiv.org/pdf/2512.23216 https://arxiv.org/html/2512.23216
December 30, 2025 at 6:30 AM
Zhen Liang, Hai Huang, Zhengkui Chen: EquaCode: A Multi-Strategy Jailbreak Approach for Large Language Models via Equation Solving and Code Completion https://arxiv.org/abs/2512.23173 https://arxiv.org/pdf/2512.23173 https://arxiv.org/html/2512.23173
December 30, 2025 at 6:30 AM
Jiang, Tong, Liu, Zhang, Lam, Tan: Certifying the Right to Be Forgotten: Primal-Dual Optimization for Sample and Label Unlearning in Vertical Federated Learning https://arxiv.org/abs/2512.23171 https://arxiv.org/pdf/2512.23171 https://arxiv.org/html/2512.23171
December 30, 2025 at 6:30 AM
Armstrong Foundjem, Lionel Nganyewou Tidjon, Leuson Da Silva, Foutse Khomh: Multi-Agent Framework for Threat Mitigation and Resilience in AI-Based Systems https://arxiv.org/abs/2512.23132 https://arxiv.org/pdf/2512.23132 https://arxiv.org/html/2512.23132
December 30, 2025 at 6:30 AM
Paulo Fernandes Biao: SecureBank: A Financially-Aware Zero Trust Architecture for High-Assurance Banking Systems https://arxiv.org/abs/2512.23124 https://arxiv.org/pdf/2512.23124 https://arxiv.org/html/2512.23124
December 30, 2025 at 6:30 AM
Phil Cuvin, Hao Zhu, Diyi Yang: DECEPTICON: How Dark Patterns Manipulate Web Agents https://arxiv.org/abs/2512.22894 https://arxiv.org/pdf/2512.22894 https://arxiv.org/html/2512.22894
December 30, 2025 at 6:30 AM
Tao Li, Quanyan Zhu: Agentic AI for Cyber Resilience: A New Security Paradigm and Its System-Theoretic Foundations https://arxiv.org/abs/2512.22883 https://arxiv.org/pdf/2512.22883 https://arxiv.org/html/2512.22883
December 30, 2025 at 6:30 AM
Soham Padia, Dhananjay Vaidya, Ramchandra Mangrulkar: Adaptive Trust Consensus for Blockchain IoT: Comparing RL, DRL, and MARL Against Naive, Collusive, Adaptive, Byzantine, and Sleeper Attacks https://arxiv.org/abs/2512.22860 https://arxiv.org/pdf/2512.22860 https://arxiv.org/html/2512.22860
December 30, 2025 at 6:30 AM
Ying Li, Wenjun Qiu, Faysal Hossain Shezan, Kunlin Cai, Michelangelo van Dam, Lisa Austin, David Lie, Yuan Tian: Breaking the illusion: Automated Reasoning of GDPR Consent Violations https://arxiv.org/abs/2512.22789 https://arxiv.org/pdf/2512.22789 https://arxiv.org/html/2512.22789
December 30, 2025 at 6:30 AM