From IOCs to Regex: Automating CTI Operationalization for SOC with LLMs

Authors: Pei-Yu Tseng, Lan Zhang, ZihDwo Yeh, Xiaoyan Sun, Xushu Dai, Peng Liu | Published: 2026-04-14

TimeMark: A Trustworthy Time Watermarking Framework for Exact Generation-Time Recovery from AIGC

Authors: Shangkun Che, Silin Du, Ge Gao | Published: 2026-04-14

Fully Homomorphic Encryption on Llama 3 model for privacy preserving LLM inference

Authors: Anes Abdennebi, Nadjia Kara, Laaziz Lahlou | Published: 2026-04-14

ClawGuard: A Runtime Security Framework for Tool-Augmented LLM Agents Against Indirect Prompt Injection

Authors: Wei Zhao, Zhe Li, Peixin Zhang, Jun Sun | Published: 2026-04-13

Towards Automated Pentesting with Large Language Models

Authors: Ricardo Bessa, Rui Claro, João Trindade, João Lourenço | Published: 2026-04-13

A Synthetic Conversational Smishing Dataset for Social Engineering Detection

Authors: Carl Lochstampfor, Ayan Roy | Published: 2026-04-13

GPU Acceleration of Sparse Fully Homomorphic Encrypted DNNs

Authors: Lara D'Agata, Carlos Agulló-Domingo, Óscar Vera-López, Kaustubh Shivdikar, Ardhi W. B. Yudha, Ferhat Yaman, David Kaeli, José L. Abellán, Ian Colbert, José Cano | Published: 2026-04-13

RLSpoofer: A Lightweight Evaluator for LLM Watermark Spoofing Resilience

Authors: Hanbo Huang, Xuan Gong, Yiran Zhang, Hao Zheng, Shiyu Liang | Published: 2026-04-13

RedShell: A Generative AI-Based Approach to Ethical Hacking

Authors: Ricardo Bessa, Rui Claro, João Trindade, João Lourenço | Published: 2026-04-13

The Salami Slicing Threat: Exploiting Cumulative Risks in LLM Systems

Authors: Yihao Zhang, Kai Wang, Jiangrong Wu, Haolin Wu, Yuxuan Zhou, Zeming Wei, Dongxian Wu, Xun Chen, Jun Sun, Meng Sun | Published: 2026-04-13