Vulnerability Detection with Interprocedural Context in Multiple Languages: Assessing Effectiveness and Cost of Modern LLMs

Authors: Kevin Lira, Baldoino Fonseca, Davy Baía, Márcio Ribeiro, Wesley K. G. Assunção | Published: 2026-04-09

Your Agent Is Mine: Measuring Malicious Intermediary Attacks on the LLM Supply Chain

Authors: Hanzhi Liu, Chaofan Shou, Hongbo Wen, Yanju Chen, Ryan Jingyang Fang, Yu Feng | Published: 2026-04-09

Securing Retrieval-Augmented Generation: A Taxonomy of Attacks, Defenses, and Future Directions

Authors: Yuming Xu, Mingtao Zhang, Zhuohan Ge, Haoyang Li, Nicole Hu, Jason Chen Zhang, Qing Li, Lei Chen | Published: 2026-04-09

Towards Identification and Intervention of Safety-Critical Parameters in Large Language Models

Authors: Weiwei Qi, Zefeng Wu, Tianhang Zheng, Zikang Zhang, Xiaojun Jia, Zhan Qin, Kui Ren | Published: 2026-04-09

The Art of (Mis)alignment: How Fine-Tuning Methods Effectively Misalign and Realign LLMs in Post-Training

Authors: Rui Zhang, Hongwei Li, Yun Shen, Xinyue Shen, Wenbo Jiang, Guowen Xu, Yang Liu, Michael Backes, Yang Zhang | Published: 2026-04-09

On the Price of Privacy for Language Identification and Generation

Authors: Xiaoyu Li, Andi Han, Jiaojiao Jiang, Junbin Gao | Published: 2026-04-08

TraceSafe: A Systematic Assessment of LLM Guardrails on Multi-Step Tool-Calling Trajectories

Authors: Yen-Shan Chen, Sian-Yao Huang, Cheng-Lin Yang, Yun-Nung Chen | Published: 2026-04-08

VulGD: A LLM-Powered Dynamic Open-Access Vulnerability Graph Database

Authors: Luat Do, Jiao Yin, Jinli Cao, Hua Wang | Published: 2026-04-08

SentinelSphere: Integrating AI-Powered Real-Time Threat Detection with Cybersecurity Awareness Training

Authors: Nikolaos D. Tantaroudas, Ilias Karachalios, Andrew J. McCracken | Published: 2026-04-08

Data Leakage in Automotive Perception: Practitioners’ Insights

Authors: Md Abu Ahammed Babu, Sushant Kumar Pandey, Darko Durisic, Andras Balint, Miroslaw Staron | Published: 2026-04-08