Defense HIGH
Ayush Garg, Sophia Hager, Jacob Montiel +5 more
Security teams face a challenge: the volume of newly disclosed Common Vulnerabilities and Exposures (CVEs) far exceeds the capacity to manually...
1 months ago cs.CR cs.AI cs.CL
PDF
Defense MEDIUM
Shams Tarek, Dipayan Saha, Khan Thamid Hasan +3 more
The increasing complexity of modern system-on-chip designs amplifies hardware security risks and makes manual security property specification a major...
Defense MEDIUM
Bowen Wei, Yunbei Zhang, Jinhao Pan +5 more
Personal AI agents like OpenClaw run with elevated privileges on users' local machines, where a single successful prompt injection can leak...
Defense MEDIUM
Manoj Parmar
World models -- learned internal simulators of environment dynamics -- are rapidly becoming foundational to autonomous decision-making in robotics,...
1 months ago cs.CR cs.AI cs.LG
PDF
Defense MEDIUM
Saeid Jamshidi, Negar Shahabi, Foutse Khomh +2 more
Software-Defined Networking (SDN) is increasingly adopted to secure Internet-of-Things (IoT) networks due to its centralized control and programmable...
Defense LOW
Yishun Wang, Wenkai Li, Xiaoqi Li +3 more
Smart contracts are self-executing programs that manage financial transactions on blockchain networks. Developers commonly rely on third-party code...
1 months ago cs.SE cs.CR
PDF
Defense HIGH
Miles Farmer, Ekincan Ufuktepe, Anne Watson +4 more
Large Language Models (LLMs) have emerged as a popular choice in vulnerability detection studies given their foundational capabilities, open source...
1 months ago cs.SE cs.AI cs.CR
PDF
Defense MEDIUM
Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab +3 more
Backdoor attacks pose a significant threat to the integrity and reliability of Artificial Intelligence (AI) models, enabling adversaries to...
1 months ago cs.LG cs.CR cs.DC
PDF
Defense HIGH
Aymen Lassoued, Nacef Mbarek, Bechir Dardouri +3 more
Vulnerability detection in C programs is a critical challenge in software security. Although large language models (LLMs) achieve strong detection...
Defense MEDIUM
Xunguang Wang, Yuguang Zhou, Qingyue Wang +5 more
Large language models (LLMs) increasingly rely on explicit chain-of-thought (CoT) reasoning to solve complex tasks, yet the safety of the reasoning...
1 months ago cs.AI cs.CR
PDF
Defense LOW
Cristian Lupascu, Alexandru Lupascu
Large Language Model based agents increasingly operate in high stakes, multi turn settings where factual grounding is critical, yet their memory...
Defense MEDIUM
Yuxiao Li, Alina Fastowski, Efstratios Zaradoukas +2 more
Activation steering has emerged as a powerful tool to shape LLM behavior without the need for weight updates. While its inherent brittleness and...
1 months ago cs.CR cs.CL
PDF
Defense LOW
Ao Ding, Hongzong Li, Zi Liang +5 more
Large language models (LLMs) are increasingly deployed on edge devices under strict computation and quantization constraints, yet their security...
1 months ago cs.CR cs.CL cs.LG
PDF
Defense MEDIUM
Rui Yang Tan, Yujia Hu, Roy Ka-Wei Lee
Multimodal Large Language Models (MLLMs) extend text-only LLMs with visual reasoning, but also introduce new safety failure modes under visually...
1 months ago cs.CR cs.AI cs.MM
PDF
Defense MEDIUM
Xinyue Liu, Niloofar Mireshghallah, Jane C. Ginsburg +1 more
Frontier LLM companies have repeatedly assured courts and regulators that their models do not store copies of training data. They further rely on...
1 months ago cs.CL cs.AI cs.CY
PDF
Defense LOW
Anders Giovanni Møller, Elisa Bassignana, Francesco Pierri +1 more
The ubiquity of multimedia content is reshaping online information spaces, particularly in social media environments. At the same time, search is...
1 months ago cs.CY cs.CL cs.HC
PDF
Defense MEDIUM
Shawn Li, Yue Zhao
Large language model (LLM) agents increasingly rely on external tools (file operations, API calls, database transactions) to autonomously complete...
1 months ago cs.CR cs.AI cs.LG
PDF
Defense LOW
Rohan Siva, Kai Cheung, Lichi Li +1 more
Modern machine learning systems rely on complex data engineering workflows to extract, transform, and load (ELT) data into production pipelines....
1 months ago cs.SE cs.AI cs.CL
PDF
Defense MEDIUM
Carlos Hinojosa, Clemens Grange, Bernard Ghanem
Vision-language models (VLMs) are increasingly deployed in real-world and embodied settings where safety decisions depend on visual context. However,...
1 months ago cs.CV cs.AI cs.CL
PDF
Defense LOW
Roberto Morabito, Mallik Tatipamula
The Internet has evolved by progressively expanding what humanity connects: first computers, then people, and later billions of devices through the...
1 months ago cs.NI cs.AI
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial