Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains

Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23

Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments

Authors: Kunal Mukherjee | Published: 2026-02-23

Jolt Atlas: Verifiable Inference via Lookup Arguments in Zero Knowledge

Authors: Wyatt Benno, Alberto Centelles, Antoine Douchet, Khalil Gibran | Published: 2026-02-19

What Breaks Embodied AI Security:LLM Vulnerabilities, CPS Flaws,or Something Else?

Authors: Boyang Ma, Hechuan Guo, Peizhuo Lv, Minghui Xu, Xuelong Dai, YeChao Zhang, Yijun Yang, Yue Zhang | Published: 2026-02-19

Privacy-Preserving Mechanisms Enable Cheap Verifiable Inference of LLMs

Authors: Arka Pal, Louai Zahran, William Gvozdjak, Akilesh Potti, Micah Goldblum | Published: 2026-02-19

Fail-Closed Alignment for Large Language Models

Authors: Zachary Coalson, Beth Sohler, Aiden Gabriel, Sanghyun Hong | Published: 2026-02-19

Sequential Membership Inference Attacks

Authors: Thomas Michel, Debabrota Basu, Emilie Kaufmann | Published: 2026-02-18

Recursive language models for jailbreak detection: a procedural defense for tool-augmented agents

Authors: Doron Shavit | Published: 2026-02-18

Phase-Based Bit Commitment Protocol

Authors: Janis Nötzel, Anshul Singhal, Peter van Loock | Published: 2026-02-18

Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification

Authors: Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Akond Ashfaque Ur Rahman, Md Rayhanur Rahman | Published: 2026-02-18