SoK: Data Minimization in Machine Learning

Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14

Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence

Authors: Amine Tellache, Abdelaziz Amara Korba, Amdjed Mokhtari, Horea Moldovan, Yacine Ghamri-Doudane | Published: 2025-08-14

A Transformer-Based Approach for DDoS Attack Detection in IoT Networks

Authors: Sandipan Dey, Payal Santosh Kate, Vatsala Upadhyay, Abhishek Vaish | Published: 2025-08-14

Jailbreaking Commercial Black-Box LLMs with Explicitly Harmful Prompts

Authors: Chiyu Zhang, Lu Zhou, Xiaogang Xu, Jiafei Wu, Liming Fang, Zhe Liu | Published: 2025-08-14

Extending the OWASP Multi-Agentic System Threat Modeling Guide: Insights from Multi-Agent Security Research

Authors: Klaudia Krawiecka, Christian Schroeder de Witt | Published: 2025-08-13

Demystifying the Role of Rule-based Detection in AI Systems for Windows Malware Detection

Authors: Andrea Ponte, Luca Demetrio, Luca Oneto, Ivan Tesfai Ogbu, Battista Biggio, Fabio Roli | Published: 2025-08-13

Causal Graph Profiling via Structural Divergence for Robust Anomaly Detection in Cyber-Physical Systems

Authors: Arun Vignesh Malarkkan, Haoyue Bai, Dongjie Wang, Yanjie Fu | Published: 2025-08-13

Shadow in the Cache: Unveiling and Mitigating Privacy Risks of KV-cache in LLM Inference

Authors: Zhifan Luo, Shuo Shao, Su Zhang, Lijing Zhou, Yuke Hu, Chenxu Zhao, Zhihao Liu, Zhan Qin | Published: 2025-08-13

Attacks and Defenses Against LLM Fingerprinting

Authors: Kevin Kurian, Ethan Holland, Sean Oesch | Published: 2025-08-12

Oblivionis: A Lightweight Learning and Unlearning Framework for Federated Large Language Models

Authors: Fuyao Zhang, Xinyu Yan, Tiantong Wu, Wenjie Li, Tianxiang Chen, Yang Cao, Ran Yan, Longtao Huang, Wei Yang Bryan Lim, Qiang Yang | Published: 2025-08-12