Cyber Defense Benchmark: Agentic Threat Hunting Evaluation for LLMs in SecOps

Authors: Alankrit Chona, Igor Kozlov, Ambuj Kumar | Published: 2026-04-21

Evaluating LLM-Generated Obfuscated XSS Payloads for Machine Learning-Based Detection

Authors: Divyesh Gabbireddy, Suman Saha | Published: 2026-04-21

Involuntary In-Context Learning: Exploiting Few-Shot Pattern Completion to Bypass Safety Alignment in GPT-5.4

Authors: Alex Polyakov, Daniel Kuznetsov | Published: 2026-04-21

Malicious ML Model Detection by Learning Dynamic Behaviors

Authors: Sarang Nambiar, Dhruv Pradhan, Ezekiel Soremekun | Published: 2026-04-21

Do Agents Dream of Root Shells? Partial-Credit Evaluation of LLM Agents in Capture The Flag Challenges

Authors: Ali Al-Kaswan, Maksim Plotnikov, Maxim Hájek, Roland Vízner, Arie van Deursen, Maliheh Izadi | Published: 2026-04-21

DP-FlogTinyLLM: Differentially private federated log anomaly detection using Tiny LLMs

Authors: Isaiah Thompson, Tanmay Sen, Ritwik Bhattacharya | Published: 2026-04-21

ProjLens: Unveiling the Role of Projectors in Multimodal Model Safety

Authors: Kun Wang, Cheng Qian, Miao Yu, Lilan Peng, Liang Lin, Jiaming Zhang, Tianyu Zhang, Yu Cheng, Yang Wang | Published: 2026-04-21

SAGE: Signal-Amplified Guided Embeddings for LLM-based Vulnerability Detection

Authors: Zhengyang Shan, Xu Qian, Jiayun Xin, Minghui Xu, Yue Zhang, Zhen Yang, Hao Wu, Xiuzhen Cheng | Published: 2026-04-21

Beyond Pattern Matching: Seven Cross-Domain Techniques for Prompt Injection Detection

Authors: Thamilvendhan Munirathinam | Published: 2026-04-20

AgenTEE: Confidential LLM Agent Execution on Edge Devices

Authors: Sina Abdollahi, Mohammad M Maheri, Javad Forough, Amir Al Sadi, Josh Millar, David Kotz, Marios Kogias, Hamed Haddadi | Published: 2026-04-20