Generating Proof-of-Vulnerability Tests to Help Enhance the Security of Complex Software Authors: Shravya Kanchi, Xiaoyan Zang, Ying Zhang, Danfeng Yao, Na Meng | Published: 2026-05-05 2026.05.05 文献データベース
KVerus: Scalable and Resilient Formal Verification Proof Generation for Rust Code Authors: Yuwei Liu, Xinyi Wan, Yanhao Wang, Minghua Wang, Lin Huang, Tao Wei | Published: 2026-05-05 2026.05.05 文献データベース
GPUBreach: Privilege Escalation Attacks on GPUs using Rowhammer Authors: Chris S. Lin, Yuqin Yan, Guozhen Ding, Joyce Qu, Joseph Zhu, David Lie, Gururaj Saileshwar | Published: 2026-05-05 2026.05.05 文献データベース
Bandits attack function optimization Authors: Philippe Preux, Rémi Munos, Michal Valko | Published: 2026-05-05 2026.05.05 文献データベース
Exposing LLM Safety Gaps Through Mathematical Encoding:New Attacks and Systematic Analysis Authors: Haoyu Zhang, Mohammad Zandsalimy, Shanu Sushmita | Published: 2026-05-05 2026.05.05 文献データベース
ARGUS: Defending LLM Agents Against Context-Aware Prompt Injection Authors: Shihao Weng, Yang Feng, Jinrui Zhang, Xiaofei Xie, Jiongchi Yu, Jia Liu | Published: 2026-05-05 2026.05.05 文献データベース
Efficient Preference Poisoning Attack on Offline RLHF Authors: Chenye Yang, Weiyu Xu, Lifeng Lai | Published: 2026-05-04 2026.05.04 文献データベース
FlashRT: Towards Computationally and Memory Efficient Red-Teaming for Prompt Injection and Knowledge Corruption Authors: Yanting Wang, Chenlong Yin, Ying Chen, Jinyuan Jia | Published: 2026-04-30 2026.04.30 文献データベース
TwinGate: Stateful Defense against Decompositional Jailbreaks in Untraceable Traffic via Asymmetric Contrastive Learning Authors: Bowen Sun, Chaozhuo Li, Yaodong Yang, Yiwei Wang, Chaowei Xiao | Published: 2026-04-30 2026.04.30 文献データベース
MASCing: Configurable Mixture-of-Experts Behavior via Activation Steering Masks Authors: Jona te Lintelo, Lichao Wu, Marina Krček, Sengim Karayalçin, Stjepan Picek | Published: 2026-04-30 2026.04.30 文献データベース