Identifying AI Web Scrapers Using Canary Tokens

Authors: Steven Seiden, Triss Ren, Caroline Zhang, Taein Kim, Enze Liu, Emily Wenger | Published: 2026-05-13

Model-Agnostic Lifelong LLM Safety via Externalized Attack-Defense Co-Evolution

Authors: Xiaozhe Zhang, Chaozhuo Li, Hui Liu, Shaocheng Yan, Bingyu Yan, Qiwei Ye, Haoliang Li | Published: 2026-05-13

Empowering IoT Security: On-Device Intrusion Detection in Resource Constrained Devices

Authors: Vasilis Ieropoulos, Eirini Anthi, Theodoros Spyridopoulos, Pete Burnap, Aftab Khan, Pietro Carnelli | Published: 2026-05-13

Quantifying LLM Safety Degradation Under Repeated Attacks Using Survival Analysis

Authors: Zvi Topol | Published: 2026-05-13

Persona-Model Collapse in Emergent Misalignment

Authors: Davi Bastos Costa, Renato Vicente | Published: 2026-05-13

HE-PIM: Demystifying Homomorphic Operations on a Real-world Processing-in-Memory System

Authors: Harshita Gupta, Mayank Kabra, Jaewoo Park, Priyam Mehta, Phillip Widdowson, Tathagata Barik, Nisa Bostancı, Konstantinos Kanellopoulos, Juan Gómez-Luna, Antonio J. Peña, Mohammad Sadrosadati, Onur Mutlu | Published: 2026-05-13

SoK: Unlearnability and Unlearning for Model Dememorization

Authors: Mengying Zhang, Derui Wang, Ruoxi Sun, Xiaoyu Xia, Shuang Hao, Minhui Xue | Published: 2026-05-12

FlowSteer: Prompt-Only Workflow Steering Exposes Planning-Time Vulnerabilities in Multi-Agent LLM Systems

Authors: Fanxiao Li, Jiaying Wu, Tingchao Fu, Natasha Jaques, Wei Zhou, Min-Yen Kan | Published: 2026-05-12

CTFusion: A CTF-based Benchmark for LLM Agent Evaluation

Authors: Dongjun Lee, Ga-eun Bae, Insu Yun | Published: 2026-05-12

Can a Single Message Paralyze the AI Infrastructure? The Rise of AbO-DDoS Attacks through Targeted Mobius Injection

Authors: Zi Liang, Ronghua Li, Yanyun Wang, Qingqing Ye, Haibo Hu | Published: 2026-05-12