Evaluating Large Language Models in detecting Secrets in Android Apps

Authors: Marco Alecci, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-10-21

CLASP: Cost-Optimized LLM-based Agentic System for Phishing Detection

Authors: Fouad Trad, Ali Chehab | Published: 2025-10-21

The Trust Paradox in LLM-Based Multi-Agent Systems: When Collaboration Becomes a Security Vulnerability

Authors: Zijie Xu, Minfeng Qi, Shiqing Wu, Lefeng Zhang, Qiwen Wei, Han He, Ningran Li | Published: 2025-10-21

Prompting the Priorities: A First Look at Evaluating LLMs for Vulnerability Triage and Prioritization

Authors: Osama Al Haddad, Muhammad Ikram, Ejaz Ahmed, Young Lee | Published: 2025-10-21

One Size Fits All? A Modular Adaptive Sanitization Kit (MASK) for Customizable Privacy-Preserving Phone Scam Detection

Authors: Kangzhong Wang, Zitong Shen, Youqian Zhang, Michael MK Cheung, Xiapu Luo, Grace Ngai, Eugene Yujun Fu | Published: 2025-10-21

The Attribution Story of WhisperGate: An Academic Perspective

Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21

DeepTx: Real-Time Transaction Risk Analysis via Multi-Modal Features and LLM Reasoning

Authors: Yixuan Liu, Xinlei Li, Yi Li | Published: 2025-10-21

Position: LLM Watermarking Should Align Stakeholders’ Incentives for Practical Adoption

Authors: Yepeng Liu, Xuandong Zhao, Dawn Song, Gregory W. Wornell, Yuheng Bu | Published: 2025-10-21

RESCUE: Retrieval Augmented Secure Code Generation

Authors: Jiahao Shi, Tianyi Zhang | Published: 2025-10-21

PLAGUE: Plug-and-play framework for Lifelong Adaptive Generation of Multi-turn Exploits

Authors: Neeladri Bhuiya, Madhav Aggarwal, Diptanshu Purwar | Published: 2025-10-20 | Updated: 2025-10-22