SAMSEM — A Generic and Scalable Approach for IC Metal Line Segmentation

Authors: Christian Gehrmann, Jonas Ricker, Simon Damm, Deruo Cheng, Julian Speith, Yiqiong Shi, Asja Fischer, Christof Paar | Published: 2026-03-17

Rotated Robustness: A Training-Free Defense against Bit-Flip Attacks on Large Language Models

Authors: Deng Liu, Song Chen | Published: 2026-03-17

Resource Consumption Threats in Large Language Models

Authors: Yuanhe Zhang, Xinyue Wang, Zhican Chen, Weiliu Wang, Zilu Zhang, Zhengshuo Gong, Zhenhong Zhou, Li Sun, Yang Liu, Sen Su | Published: 2026-03-17

From Storage to Steering: Memory Control Flow Attacks on LLM Agents

Authors: Zhenlin Xu, Xiaogang Zhu, Yu Yao, Minhui Xue, Yiliao Song | Published: 2026-03-16

$p^2$RAG: Privacy-Preserving RAG Service Supporting Arbitrary Top-$k$ Retrieval

Authors: Yulong Ming, Mingyue Wang, Jijia Yang, Cong Wang, Xiaohua Jia | Published: 2026-03-16

Cascade: Composing Software-Hardware Attack Gadgets for Adversarial Threat Amplification in Compound AI Systems

Authors: Sarbartha Banerjee, Prateek Sahu, Anjo Vahldiek-Oberwagner, Jose Sanchez Vicarte, Mohit Tiwari | Published: 2026-03-12

Understanding LLM Behavior When Encountering User-Supplied Harmful Content in Harmless Tasks

Authors: Junjie Chu, Yiting Qu, Ye Leng, Michael Backes, Yun Shen, Savvas Zannettou, Yang Zhang | Published: 2026-03-12

Exponential-Family Membership Inference: From LiRA and RMIA to BaVarIA

Authors: Rickard Brännvall | Published: 2026-03-12

Taming OpenClaw: Security Analysis and Mitigation of Autonomous LLM Agent Threats

Authors: Xinhao Deng, Yixiang Zhang, Jiaqing Wu, Jiaqi Bai, Sibo Yi, Zhuoheng Zou, Yue Xiao, Rennai Qiu, Jianan Ma, Jialuo Chen, Xiaohu Du, Xiaofang Yang, Shiwen Cui, Changhua Meng, Weiqiang Wang, Jiaxing Song, Ke Xu, Qi Li | Published: 2026-03-12

KEPo: Knowledge Evolution Poison on Graph-based Retrieval-Augmented Generation

Authors: Qizhi Chen, Chao Qi, Yihong Huang, Muquan Li, Rongzheng Wang, Dongyang Zhang, Ke Qin, Shuang Liang | Published: 2026-03-12