← All streams
Research
New papers, new attacks, new defenses.
18 stories
arXiv cs.CR: Automation-Exploit: A Multi-Agent LLM Framework for Adaptive Offensive Security with Digital Twin-Based Risk-Mitigated Exploitation
1 min·3 sources·research-arxiv-cs-cr-automation-exploit-a-multi-agent-llm-fra
arXiv cs.CR: Behavioral Canaries: Auditing Private Retrieved Context Usage in RL Fine-Tuning
1 min·3 sources·research-arxiv-cs-cr-behavioral-canaries-auditing-private-ret
arXiv cs.CR: Can SOC Operators Explain their Decisions while Triaging Alarms? A Real-World Study
1 min·3 sources·research-arxiv-cs-cr-can-soc-operators-explain-their-decision
arXiv cs.CR: FixV2W: Correcting Invalid CVE-CWE Mappings with Knowledge Graph Embeddings
1 min·3 sources·research-arxiv-cs-cr-fixv2w-correcting-invalid-cve-cwe-mappin
arXiv cs.CR: Introducing the Cyber-Physical Data Flow Diagram to Improve Threat Modelling of Internet of Things Devices
1 min·3 sources·research-arxiv-cs-cr-introducing-the-cyber-physical-data-flow
arXiv cs.CR: PrivSTRUCT: Untangling Data Purpose Compliance of Privacy Policies in Google Play Store
1 min·3 sources·research-arxiv-cs-cr-privstruct-untangling-data-purpose-compl
arXiv cs.CR: Resource-Aware Layered Intrusion Detection Allocation Model
1 min·3 sources·research-arxiv-cs-cr-resource-aware-layered-intrusion-detecti
arXiv cs.CR: Sovereign Agentic Loops: Decoupling AI Reasoning from Execution in Real-World Systems
1 min·3 sources·research-arxiv-cs-cr-sovereign-agentic-loops-decoupling-ai-re
arXiv cs.CR: Train in Vain: Functionality-Preserving Poisoning to Prevent Unauthorized Use of Code Datasets
1 min·3 sources·research-arxiv-cs-cr-train-in-vain-functionality-preserving-p
arXiv cs.CR: Who Audits the Auditor? Tamper-Proof Fraud Detection with Blockchain-Anchored Explainable ML
1 min·3 sources·research-arxiv-cs-cr-who-audits-the-auditor-tamper-proof-frau
Project Zero: On the Effectiveness of Mutational Grammar Fuzzing
1 min·3 sources·research-project-zero-on-the-effectiveness-of-mutational-gramm
Project Zero: A Deep Dive into the GetProcessHandleFromHwnd API
1 min·3 sources·research-project-zero-a-deep-dive-into-the-getprocesshandlefro
Project Zero: Bypassing Administrator Protection by Abusing UI Access
1 min·3 sources·research-project-zero-bypassing-administrator-protection-by-ab
Project Zero: Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529
1 min·3 sources·research-project-zero-breaking-the-sound-barrier-part-ii-explo
Project Zero: Bypassing Windows Administrator Protection
1 min·3 sources·research-project-zero-bypassing-windows-administrator-protecti
Project Zero: A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby
1 min·3 sources·research-project-zero-a-0-click-exploit-chain-for-the-pixel-9-
Project Zero: Welcome to the new Project Zero Blog
1 min·3 sources·research-project-zero-welcome-to-the-new-project-zero-blog
Project Zero: Thinking Outside The Box [dusted off draft from 2017]
1 min·3 sources·research-project-zero-thinking-outside-the-box-dusted-off-draf