Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#104 サイバーarxiv (2024-07-23)

24 Jul 2024

Description

本日紹介した論文の一覧 Aster: Fixing the Android TEE Ecosystem with Arm CCA http://arxiv.org/abs/2407.16694v1 RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent http://arxiv.org/abs/2407.16667v1 Exploring Automatic Cryptographic API Misuse Detection in the Era of LLMs http://arxiv.org/abs/2407.16576v1 Language-Based Security for Low-Level MPC http://arxiv.org/abs/2407.16504v1 CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs http://arxiv.org/abs/2407.16473v1 Side-Channel Analysis of OpenVINO-based Neural Network Models http://arxiv.org/abs/2407.16467v1 Improving the Computational Efficiency of Adaptive Audits of IRV Elections http://arxiv.org/abs/2407.16465v1 Securing Tomorrow's Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies http://arxiv.org/abs/2407.16410v1 Prisec II -- A Comprehensive Model for IoT Security: Cryptographic Algorithms and Cloud Integration http://arxiv.org/abs/2407.16395v1 Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection http://arxiv.org/abs/2407.16327v1 PrimeGuard: Safe and Helpful LLMs through Tuning-Free Routing http://arxiv.org/abs/2407.16318v1 Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning http://arxiv.org/abs/2407.16307v1 Hidden Web Caches Discovery http://arxiv.org/abs/2407.16303v1 Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding http://arxiv.org/abs/2407.16295v1 Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption http://arxiv.org/abs/2407.16274v1 Backdoor Attacks against Hybrid Classical-Quantum Neural Networks http://arxiv.org/abs/2407.16273v1 Systematically Searching for Identity-Related Information in the Internet with OSINT Tools http://arxiv.org/abs/2407.16251v1 Evaluation Scheme to Analyze Keystroke Dynamics Methods http://arxiv.org/abs/2407.16247v1 How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications http://arxiv.org/abs/2407.16238v1 Hooked: A Real-World Study on QR Code Phishing http://arxiv.org/abs/2407.16230v1 VidyaRANG: Conversational Learning Based Platform powered by Large Language Model http://arxiv.org/abs/2407.16209v1 Figure it Out: Analyzing-based Jailbreak Attack on Large Language Models http://arxiv.org/abs/2407.16205v1 Securing The Future Of Healthcare: Building A Resilient Defense System For Patient Data Protection http://arxiv.org/abs/2407.16170v1 Representation Magnitude has a Liability to Privacy Vulnerability http://arxiv.org/abs/2407.16164v1 Users Feel Guilty: Measurement of Illegal Software Installation Guide Videos on YouTube for Malware Distribution http://arxiv.org/abs/2407.16132v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.