DAIRE: A lightweight AI model for real-time detection of Controller Area Network attacks in the Internet of Vehicles

Authors: Shahid Alam, Amina Jameel, Zahida Parveen, Ehab Alnfrawy, Adeela Ashraf, Raza Uddin, Jamal Aqib | Published: 2026-04-22

Towards Certified Malware Detection: Provable Guarantees Against Evasion Attacks

Authors: Nandakrishna Giri, Asmitha K. A., Serena Nicolazzo, Antonino Nocera, Vinod P | Published: 2026-04-22

CyberCertBench: Evaluating LLMs in Cybersecurity Certification Knowledge

Authors: Gustav Keppler, Ghada Elbez, Veit Hagenmeyer | Published: 2026-04-22

Text Steganography with Dynamic Codebook and Multimodal Large Language Model

Authors: Jianxin Gao, Ruohan Lei, Wanli Peng | Published: 2026-04-22

Taint-Style Vulnerability Detection and Confirmation for Node.js Packages Using LLM Agent Reasoning

Authors: Ronghao Ni, Mihai Christodorescu, Limin Jia | Published: 2026-04-22

Cyber Defense Benchmark: Agentic Threat Hunting Evaluation for LLMs in SecOps

Authors: Alankrit Chona, Igor Kozlov, Ambuj Kumar | Published: 2026-04-21

Evaluating LLM-Generated Obfuscated XSS Payloads for Machine Learning-Based Detection

Authors: Divyesh Gabbireddy, Suman Saha | Published: 2026-04-21

Involuntary In-Context Learning: Exploiting Few-Shot Pattern Completion to Bypass Safety Alignment in GPT-5.4

Authors: Alex Polyakov, Daniel Kuznetsov | Published: 2026-04-21

Malicious ML Model Detection by Learning Dynamic Behaviors

Authors: Sarang Nambiar, Dhruv Pradhan, Ezekiel Soremekun | Published: 2026-04-21

Do Agents Dream of Root Shells? Partial-Credit Evaluation of LLM Agents in Capture The Flag Challenges

Authors: Ali Al-Kaswan, Maksim Plotnikov, Maxim Hájek, Roland Vízner, Arie van Deursen, Maliheh Izadi | Published: 2026-04-21