FalseCrashReducer: Mitigating False Positive Crashes in OSS-Fuzz-Gen Using Agentic AI

Authors: Paschal C. Amusuo, Dongge Liu, Ricardo Andres Calvo Mendez, Jonathan Metzman, Oliver Chang, James C. Davis | Published: 2025-10-02

Evaluating the Robustness of a Production Malware Detection System to Transferable Adversarial Attacks

Authors: Milad Nasr, Yanick Fratantonio, Luca Invernizzi, Ange Albertini, Loua Farah, Alex Petit-Bianco, Andreas Terzis, Kurt Thomas, Elie Bursztein, Nicholas Carlini | Published: 2025-10-02

Position: Privacy Is Not Just Memorization!

Authors: Niloofar Mireshghallah, Tianshi Li | Published: 2025-10-02

POLAR: Automating Cyber Threat Prioritization through LLM-Powered Assessment

Authors: Luoxi Tang, Yuqiao Meng, Ankita Patra, Weicheng Ma, Muchao Ye, Zhaohan Xi | Published: 2025-10-02

Bypassing Prompt Guards in Production with Controlled-Release Prompting

Authors: Jaiden Fairoze, Sanjam Garg, Keewoo Lee, Mingyuan Wang | Published: 2025-10-02

Fine-Tuning Jailbreaks under Highly Constrained Black-Box Settings: A Three-Pronged Approach

Authors: Xiangfang Li, Yu Wang, Bo Li | Published: 2025-10-01 | Updated: 2025-10-09

SPATA: Systematic Pattern Analysis for Detailed and Transparent Data Cards

Authors: João Vitorino, Eva Maia, Isabel Praça, Carlos Soares | Published: 2025-09-30

Explainable and Resilient ML-Based Physical-Layer Attack Detectors

Authors: Aleksandra Knapińska, Marija Furdek | Published: 2025-09-30

SeedPrints: Fingerprints Can Even Tell Which Seed Your Large Language Model Was Trained From

Authors: Yao Tong, Haonan Wang, Siquan Li, Kenji Kawaguchi, Tianyang Hu | Published: 2025-09-30

Better Privilege Separation for Agents by Restricting Data Types

Authors: Dennis Jacob, Emad Alghamdi, Zhanhao Hu, Basel Alomair, David Wagner | Published: 2025-09-30