Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#228 サイバーarxiv (2025-07-08)

09 Jul 2025

Description

本日紹介した論文の一覧 Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense Measures in Blockchain Bridges [Experiment, Analysis \& Benchmark] http://arxiv.org/abs/2507.06156v1 Fun with flags: How Compilers Break and Fix Constant-Time Code http://arxiv.org/abs/2507.06112v1 Taming Data Challenges in ML-based Security Tasks: Lessons from Integrating Generative AI http://arxiv.org/abs/2507.06092v1 Wrapless: The trustless lending protocol on top of Bitcoin http://arxiv.org/abs/2507.06064v1 CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative Adversarial Attacks on their Internal Representations http://arxiv.org/abs/2507.06043v1 Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for Microarchitectural Leaks http://arxiv.org/abs/2507.06039v1 The Impact of Event Data Partitioning on Privacy-aware Process Discovery http://arxiv.org/abs/2507.06008v1 Post-Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform http://arxiv.org/abs/2507.05875v1 LDP$^3$: An Extensible and Multi-Threaded Toolkit for Local Differential Privacy Protocols and Post-Processing Methods http://arxiv.org/abs/2507.05872v1 A Formal Refutation of the Blockchain Trilemma http://arxiv.org/abs/2507.05809v1 Automated Reasoning for Vulnerability Management by Design http://arxiv.org/abs/2507.05794v1 Asynchronous Event Error-Minimizing Noise for Safeguarding Event Dataset http://arxiv.org/abs/2507.05728v1 Polyadic encryption http://arxiv.org/abs/2507.05683v1 TuneShield: Mitigating Toxicity in Conversational AI while Fine-tuning on Untrusted Data http://arxiv.org/abs/2507.05660v1 DESIGN: Encrypted GNN Inference via Server-Side Input Graph Pruning http://arxiv.org/abs/2507.05649v1 How Not to Detect Prompt Injections with an LLM http://arxiv.org/abs/2507.05630v1 DATABench: Evaluating Dataset Auditing in Deep Learning from an Adversarial Perspective http://arxiv.org/abs/2507.05622v1 The Landscape of Memorization in LLMs: Mechanisms, Measurement, and Mitigation http://arxiv.org/abs/2507.05578v1 iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor System-on-Chips http://arxiv.org/abs/2507.05576v1 AI Agent Smart Contract Exploit Generation http://arxiv.org/abs/2507.05558v1 Per-Row Activation Counting on Real Hardware: Demystifying Performance Overheads http://arxiv.org/abs/2507.05556v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.