Cybersecurity

Tag&Tab: Pretraining Data Detection in Large Language Models Using Keyword-Based Membership Inference Attack

Authors: Sagiv Antebi, Edan Habler, Asaf Shabtai, Yuval Elovici | Published: 2025-01-14
Cybersecurity
Privacy Protection
Large Language Model

Adaptive Cybersecurity: Dynamically Retrainable Firewalls for Real-Time Network Protection

Authors: Sina Ahmadi | Published: 2025-01-14
Cybersecurity
Network Threat Detection
Dynamic Firewall

A Review on the Security Vulnerabilities of the IoMT against Malware Attacks and DDoS

Authors: Lily Dzamesi, Nelly Elsayed | Published: 2025-01-13
IoMT Security
Cybersecurity

Exploring and Mitigating Adversarial Manipulation of Voting-Based Leaderboards

Authors: Yangsibo Huang, Milad Nasr, Anastasios Angelopoulos, Nicholas Carlini, Wei-Lin Chiang, Christopher A. Choquette-Choo, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Ken Ziyu Liu, Ion Stoica, Florian Tramer, Chiyuan Zhang | Published: 2025-01-13
Cybersecurity
Large Language Model
Attack Evaluation

A Novel Approach to Network Traffic Analysis: the HERA tool

Authors: Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-01-13
Cybersecurity
Dataset Generation
Network Threat Detection

Logic Meets Magic: LLMs Cracking Smart Contract Vulnerabilities

Authors: ZeKe Xiao, Qin Wang, Hammond Pearce, Shiping Chen | Published: 2025-01-13
LLM Performance Evaluation
Cybersecurity
Smart Contract

Resilient Endurance-Aware NVM-based PUF against Learning-based Attacks

Authors: Hassan Nassar, Ming-Liang Wei, Chia-Lin Yang, Jörg Henkel, Kuan-Hsun Chen | Published: 2025-01-10
Cybersecurity
Cryptography
Durability Issue

Learning-based Detection of GPS Spoofing Attack for Quadrotors

Authors: Pengyu Wang, Zhaohua Yang, Jialu Li, Ling Shi | Published: 2025-01-10
Cybersecurity
Experimental Validation
Attack Evaluation

Infecting Generative AI With Viruses

Authors: David Noever, Forrest McKee | Published: 2025-01-09
Cybersecurity
Data Obfuscation
Malware Classification

BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction

Authors: Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, Yacine Ghamri-Doudane | Published: 2025-01-03
Cybersecurity
Network Threat Detection
Framework