The LLMbda Calculus: AI Agents, Conversations, and Information Flow

Authors: Zac Garby, Andrew D. Gordon, David Sands | Published: 2026-02-23

Can You Tell It’s AI? Human Perception of Synthetic Voices in Vishing Scenarios

Authors: Zoha Hayat Bhatti, Bakhtawar Ahtisham, Seemal Tausif, Niklas George, Nida ul Habib Bajwa, Mobin Javed | Published: 2026-02-23

RobPI: Robust Private Inference against Malicious Client

Authors: Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2026-02-23

Dirichlet Scale Mixture Priors for Bayesian Neural Networks

Authors: August Arnstad, Leiv Rønneberg, Geir Storvik | Published: 2026-02-23

LLM-enabled Applications Require System-Level Threat Monitoring

Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23

An Explainable Memory Forensics Approach for Malware Analysis

Authors: Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto | Published: 2026-02-23

SafePickle: Robust and Generic ML Detection of Malicious Pickle-based ML Models

Authors: Hillel Ohayon, Daniel Gilkarov, Ran Dubin | Published: 2026-02-23

Efficient Multi-Party Secure Comparison over Different Domains with Preprocessing Assistance

Authors: Kaiwen Wang, Xiaolin Chang, Yuehan Dong, Ruichen Zhang | Published: 2026-02-23

Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains

Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23

Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments

Authors: Kunal Mukherjee | Published: 2026-02-23