Detection of security smells in IaC scripts through semantics-aware code and language processing

Authors: Aicha War, Adnan A. Rawass, Abdoul K. Kabore, Jordan Samhi, Jacques Klein, Tegawende F. Bissyande | Published: 2025-09-23

MER-Inspector: Assessing model extraction risks from an attack-agnostic perspective

Authors: Xinwei Zhang, Haibo Hu, Qingqing Ye, Li Bai, Huadi Zheng | Published: 2025-09-23

Coherence-driven inference for cybersecurity

Authors: Steve Huntsman | Published: 2025-09-23

Strategic Dishonesty Can Undermine AI Safety Evaluations of Frontier LLM

Authors: Alexander Panfilov, Evgenii Kortukov, Kristina Nikolić, Matthias Bethge, Sebastian Lapuschkin, Wojciech Samek, Ameya Prabhu, Maksym Andriushchenko, Jonas Geiping | Published: 2025-09-22

Synth-MIA: A Testbed for Auditing Privacy Leakage in Tabular Data Synthesis

Authors: Joshua Ward, Xiaofeng Lin, Chi-Hua Wang, Guang Cheng | Published: 2025-09-22

Federated Learning in the Wild: A Comparative Study for Cybersecurity under Non-IID and Unbalanced Settings

Authors: Roberto Doriguzzi-Corin, Petr Sabel, Silvio Cretti, Silvio Ranise | Published: 2025-09-22

SilentStriker:Toward Stealthy Bit-Flip Attacks on Large Language Models

Authors: Haotian Xu, Qingsong Peng, Jie Shi, Huadi Zheng, Yu Li, Cheng Zhuo | Published: 2025-09-22

LLM-Driven SAST-Genius: A Hybrid Static Analysis Framework for Comprehensive and Actionable Security

Authors: Vaibhav Agrawal, Kiarash Ahi | Published: 2025-09-18 | Updated: 2025-09-23

Evil Vizier: Vulnerabilities of LLM-Integrated XR Systems

Authors: Yicheng Zhang, Zijian Huang, Sophie Chen, Erfan Shayegani, Jiasi Chen, Nael Abu-Ghazaleh | Published: 2025-09-18

Beyond Surface Alignment: Rebuilding LLMs Safety Mechanism via Probabilistically Ablating Refusal Direction

Authors: Yuanbo Xie, Yingjie Zhang, Tianyun Liu, Duohe Ma, Tingwen Liu | Published: 2025-09-18