KVerus: Scalable and Resilient Formal Verification Proof Generation for Rust Code

Authors: Yuwei Liu, Xinyi Wan, Yanhao Wang, Minghua Wang, Lin Huang, Tao Wei | Published: 2026-05-05

GPUBreach: Privilege Escalation Attacks on GPUs using Rowhammer

Authors: Chris S. Lin, Yuqin Yan, Guozhen Ding, Joyce Qu, Joseph Zhu, David Lie, Gururaj Saileshwar | Published: 2026-05-05

Bandits attack function optimization

Authors: Philippe Preux, Rémi Munos, Michal Valko | Published: 2026-05-05

Exposing LLM Safety Gaps Through Mathematical Encoding:New Attacks and Systematic Analysis

Authors: Haoyu Zhang, Mohammad Zandsalimy, Shanu Sushmita | Published: 2026-05-05

ARGUS: Defending LLM Agents Against Context-Aware Prompt Injection

Authors: Shihao Weng, Yang Feng, Jinrui Zhang, Xiaofei Xie, Jiongchi Yu, Jia Liu | Published: 2026-05-05

Efficient Preference Poisoning Attack on Offline RLHF

Authors: Chenye Yang, Weiyu Xu, Lifeng Lai | Published: 2026-05-04

FlashRT: Towards Computationally and Memory Efficient Red-Teaming for Prompt Injection and Knowledge Corruption

Authors: Yanting Wang, Chenlong Yin, Ying Chen, Jinyuan Jia | Published: 2026-04-30

TwinGate: Stateful Defense against Decompositional Jailbreaks in Untraceable Traffic via Asymmetric Contrastive Learning

Authors: Bowen Sun, Chaozhuo Li, Yaodong Yang, Yiwei Wang, Chaowei Xiao | Published: 2026-04-30

MASCing: Configurable Mixture-of-Experts Behavior via Activation Steering Masks

Authors: Jona te Lintelo, Lichao Wu, Marina Krček, Sengim Karayalçin, Stjepan Picek | Published: 2026-04-30

VOW: Verifiable and Oblivious Watermark Detection for Large Language Models

Authors: Xiaokun Luan, Yihao Zhang, Pengcheng Su, Feiran Lei, Meng Sun | Published: 2026-04-30