MirageBackdoor: A Stealthy Attack that Induces Think-Well-Answer-Wrong Reasoning

Authors: Yizhe Zeng, Wei Zhang, Yunpeng Li, Juxin Xiao, Xiao Wang, Yuling Liu | Published: 2026-04-08

Argus: Reorchestrating Static Analysis via a Multi-Agent Ensemble for Full-Chain Security Vulnerability Detection

Authors: Zi Liang, Qipeng Xie, Jun He, Bohuan Xue, Weizheng Wang, Yuandao Cai, Fei Luo, Boxian Zhang, Haibo Hu, Kaishun Wu | Published: 2026-04-08

PoC-Adapt: Semantic-Aware Automated Vulnerability Reproduction with LLM Multi-Agents and Reinforcement Learning-Driven Adaptive Policy

Authors: Phan The Duy, Nguyen Viet Duy, Khoa Ngo-Khanh, Nguyen Huu Quyen, Van-Hau Pham | Published: 2026-04-08

Can Drift-Adaptive Malware Detectors Be Made Robust? Attacks and Defenses Under White-Box and Black-Box Threats

Authors: Adrian Shuai Li, Md Ajwad Akil, Elisa Bertino | Published: 2026-04-08

WebSP-Eval: Evaluating Web Agents on Website Security and Privacy Tasks

Authors: Guruprasad Viswanathan Ramesh, Asmit Nayak, Basieem Siddique, Kassem Fawaz | Published: 2026-04-07

Blockchain and AI: Securing Intelligent Networks for the Future

Authors: Joy Dutta, Hossien B. Eldeeb, Tu Dac Ho | Published: 2026-04-07

FedSpy-LLM: Towards Scalable and Generalizable Data Reconstruction Attacks from Gradients on LLMs

Authors: Syed Irfan Ali Meerza, Feiyi Wang, Jian Liu | Published: 2026-04-07

LLM4CodeRE: Generative AI for Code Decompilation Analysis and Reverse Engineering

Authors: Hamed Jelodar, Samita Bai, Tochukwu Emmanuel Nwankwo, Parisa Hamedi, Mohammad Meymani, Roozbeh Razavi-Far, Ali A. Ghorbani | Published: 2026-04-07

CritBench: A Framework for Evaluating Cybersecurity Capabilities of Large Language Models in IEC 61850 Digital Substation Environments

Authors: Gustav Keppler, Moritz Gstür, Veit Hagenmeyer | Published: 2026-04-07

A Formal Security Framework for MCP-Based AI Agents: Threat Taxonomy, Verification Models, and Defense Mechanisms

Authors: Nirajan Acharya, Gaurav Kumar Gupta | Published: 2026-04-07