Lyrie
← All streams

Research

New papers, new attacks, new defenses.

18 stories

arXiv cs.CR: Automation-Exploit: A Multi-Agent LLM Framework for Adaptive Offensive Security with Digital Twin-Based Risk-Mitigated Exploitation

1 min·3 sources·research-arxiv-cs-cr-automation-exploit-a-multi-agent-llm-fra

arXiv cs.CR: Behavioral Canaries: Auditing Private Retrieved Context Usage in RL Fine-Tuning

1 min·3 sources·research-arxiv-cs-cr-behavioral-canaries-auditing-private-ret

arXiv cs.CR: Can SOC Operators Explain their Decisions while Triaging Alarms? A Real-World Study

1 min·3 sources·research-arxiv-cs-cr-can-soc-operators-explain-their-decision

arXiv cs.CR: FixV2W: Correcting Invalid CVE-CWE Mappings with Knowledge Graph Embeddings

1 min·3 sources·research-arxiv-cs-cr-fixv2w-correcting-invalid-cve-cwe-mappin

arXiv cs.CR: Introducing the Cyber-Physical Data Flow Diagram to Improve Threat Modelling of Internet of Things Devices

1 min·3 sources·research-arxiv-cs-cr-introducing-the-cyber-physical-data-flow

arXiv cs.CR: PrivSTRUCT: Untangling Data Purpose Compliance of Privacy Policies in Google Play Store

1 min·3 sources·research-arxiv-cs-cr-privstruct-untangling-data-purpose-compl

arXiv cs.CR: Resource-Aware Layered Intrusion Detection Allocation Model

1 min·3 sources·research-arxiv-cs-cr-resource-aware-layered-intrusion-detecti

arXiv cs.CR: Sovereign Agentic Loops: Decoupling AI Reasoning from Execution in Real-World Systems

1 min·3 sources·research-arxiv-cs-cr-sovereign-agentic-loops-decoupling-ai-re

arXiv cs.CR: Train in Vain: Functionality-Preserving Poisoning to Prevent Unauthorized Use of Code Datasets

1 min·3 sources·research-arxiv-cs-cr-train-in-vain-functionality-preserving-p

arXiv cs.CR: Who Audits the Auditor? Tamper-Proof Fraud Detection with Blockchain-Anchored Explainable ML

1 min·3 sources·research-arxiv-cs-cr-who-audits-the-auditor-tamper-proof-frau

Project Zero: On the Effectiveness of Mutational Grammar Fuzzing

1 min·3 sources·research-project-zero-on-the-effectiveness-of-mutational-gramm

Project Zero: A Deep Dive into the GetProcessHandleFromHwnd API

1 min·3 sources·research-project-zero-a-deep-dive-into-the-getprocesshandlefro

Project Zero: Bypassing Administrator Protection by Abusing UI Access

1 min·3 sources·research-project-zero-bypassing-administrator-protection-by-ab

Project Zero: Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529

1 min·3 sources·research-project-zero-breaking-the-sound-barrier-part-ii-explo

Project Zero: Bypassing Windows Administrator Protection

1 min·3 sources·research-project-zero-bypassing-windows-administrator-protecti

Project Zero: A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby

1 min·3 sources·research-project-zero-a-0-click-exploit-chain-for-the-pixel-9-

Project Zero: Welcome to the new Project Zero Blog

1 min·3 sources·research-project-zero-welcome-to-the-new-project-zero-blog

Project Zero: Thinking Outside The Box [dusted off draft from 2017]

1 min·3 sources·research-project-zero-thinking-outside-the-box-dusted-off-draf