Ryutaro Nishizaka, Yudai Fujiwara, Takuya Shimizu, Kazushi Kato, Yuichi Sugiyama (Ricerca Security, Inc.)
Towards LLM-Resistant Software Protection: Agent Failure Patterns in CTF Reverse Engineering
View More Papers
ADGFUZZ: Assignment Dependency-Guided Fuzzing for Robotic Vehicles
Yuncheng Wang (Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Yaowen Zheng (Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Puzhuo Liu (Ant Group; Tsinghua University), Dongliang Fang (Institute of Information Engineering, CAS,…
Read MoreRobust Fraud Transaction Detection: A Two-Player Game Approach
Qi Tan (Shenzhen University), Yi Zhao (Beijing Institute of Technology), Laizhong Cui (Shenzhen University), Qi Li (Tsinghua University), Ming Zhu (Tsinghua University), Xing Fu (Ant Group), Weiqiang Wang (Ant Group), Xiaotong Lin (Ant Group), Ke Xu (Tsinghua University)
Read MoreFrom Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes...
Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)
Read More