专题:Security and Verification in Computing

This cluster of papers focuses on language-based information flow security, addressing topics such as enforceable security policies, control-flow integrity, side-channel attacks, dynamic taint analysis, and trusted execution environments. It also explores techniques for memory protection, virtualization, software diversity, and hardware security.
最新文献
From prompt injections to protocol exploits: Threats in LLM-powered AI agents workflows

article Full Text OpenAlex

L15 Visibilite Totale - Complete Index Law for SEM-OS Memory Operating System

article Full Text OpenAlex

SEM-OS: Memory Operating System for Conversational LLMs

article Full Text OpenAlex

Finite Audit Artifacts Specification for the Transcript-to-Notebook Pipeline

preprint Full Text OpenAlex

Gardian Suite v3.1.0 — IA Antivirus Universel Multi-Plateforme (Sentinelle R* + Brain IDE + Input Virtualizer + TV Companion)

article Full Text OpenAlex

Upgrade or Switch: Do We Need a Next-Gen Trusted Architecture for the Internet of AI Agents?

article Full Text OpenAlex

Clone What You Can't Steal: Black-Box LLM Replication via Logit Leakage and Distillation

article Full Text OpenAlex

LICITRA-MMR: A Merkle Mountain Range Ledger Primitive for Cryptographic Runtime Accountability in Agentic AI Systems

article Full Text OpenAlex

WHITE PAPER: AQ-256 PROVENANCE // SYSTEMIC STATE AUDITABILITY AND FORENSIC RECONSTRUCTION

article Full Text OpenAlex

WHITE PAPER: DETERMINISTIC CYBERSECURITY ARCHITECTURES

article Full Text OpenAlex

近5年高被引文献
Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions

article Full Text OpenAlex 330 FWCI39.3762

IEEE Transactions on Dependable and Secure Computing

paratext Full Text OpenAlex 309 FWCI0

Zero Trust Architecture (ZTA): A Comprehensive Survey

article Full Text OpenAlex 268 FWCI36.3016

OpenFHE

article Full Text OpenAlex 212 FWCI27.3099

Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts

article Full Text OpenAlex 162 FWCI18.6924

Detecting Vulnerability on IoT Device Firmware: A Survey

article Full Text OpenAlex 149 FWCI21.6275

The Future of FPGA Acceleration in Datacenters and the Cloud

article Full Text OpenAlex 140 FWCI31.4399

Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework

article Full Text OpenAlex 122 FWCI14.6977

GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis

article Full Text OpenAlex 122 FWCI44.1685

Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

article Full Text OpenAlex 113 FWCI22.7091