CyberSleuth: Autonomous Blue-Team LLM Agent for Web Attack Forensics

This paper introduces CyberSleuth, an autonomous multi-agent LLM system that automates web attack forensics by analyzing network traces to identify compromised services and map exploits to specific CVEs, achieving 80% accuracy and demonstrating that simple orchestration with specialized agents outperforms complex hierarchical designs in generating expert-validated forensic reports.

Stefano Fumero, Kai Huang, Matteo Boffa, Danilo Giordano, Marco Mellia, Dario Rossi2026-03-06🔒 cs.CR

Breaking and Fixing Defenses Against Control-Flow Hijacking in Multi-Agent Systems

This paper demonstrates that existing alignment-based defenses against control-flow hijacking in multi-agent systems are vulnerable to evasion due to inherent safety-functionality conflicts and limited context visibility, and proposes ControlValve, a new defense mechanism that enforces control-flow integrity and least privilege through permitted control-flow graphs and contextual rules.

Rishi Jha, Harold Triedman, Justin Wagle, Vitaly Shmatikov2026-03-06🔒 cs.CR

GhostEI-Bench: Do Mobile Agents Resilience to Environmental Injection in Dynamic On-Device Environments?

This paper introduces GhostEI-Bench, the first benchmark for evaluating the resilience of mobile Vision-Language Model agents against environmental injection attacks in dynamic on-device environments, revealing their critical vulnerability to adversarial UI elements that bypass textual safeguards and compromise device security.

Chiyu Chen, Xinhao Song, Yunkai Chai, Yang Yao, Haodong Zhao, Lijun Li, Jie Li, Yan Teng, Gongshen Liu, Yingchun Wang2026-03-06🔒 cs.CR

BRIDG-ICS: AI-Grounded Knowledge Graphs for Intelligent Threat Analytics in Industry~5.0 Cyber-Physical Systems

The paper presents BRIDG-ICS, an AI-driven Knowledge Graph framework that integrates heterogeneous industrial and cybersecurity data using Large Language Models to enable context-aware threat analysis, multi-stage attack path simulation, and quantitative resilience assessment for Industry 5.0 cyber-physical systems.

Padmeswari Nandiya, Ahmad Mohsin, Ahmed Ibrahim, Iqbal H. Sarker, Helge Janicke2026-03-06🔒 cs.CR

Zombie Agents: Persistent Control of Self-Evolving LLM Agents via Self-Reinforcing Injections

This paper introduces "Zombie Agents," a persistent black-box attack on self-evolving LLM agents that covertly implants payloads into long-term memory during benign sessions to survive across interactions and trigger unauthorized actions in future sessions, demonstrating that current per-session defenses are insufficient against such memory-based compromises.

Xianglin Yang, Yufei He, Shuo Ji, Bryan Hooi, Jin Song Dong2026-03-06🔒 cs.CR

Real Money, Fake Models: Deceptive Model Claims in Shadow APIs

This paper presents the first systematic audit revealing that widely used "shadow APIs," which claim to provide access to restricted frontier LLMs, frequently employ deceptive practices such as model substitution and safety manipulation, thereby compromising the reliability, reproducibility, and validity of downstream applications and academic research.

Yage Zhang, Yukun Jiang, Zeyuan Chen, Michael Backes, Xinyue Shen, Yang Zhang2026-03-06🔒 cs.CR

Reckless Designs and Broken Promises: Privacy Implications of Targeted Interactive Advertisements on Social Media Platforms

This paper reveals that the default interactive design of targeted advertisements on social media platforms like TikTok, Facebook, and Instagram creates a privacy loophole allowing advertisers to identify and view the profiles of users who engage with sensitive ads, thereby contradicting platform promises of data protection and highlighting the need for design modifications to ensure user transparency.

Julia B. Kieserman, Athanasios Andreou, Laura Edelson, Sandra Siby, Damon McCoy2026-03-06🔒 cs.CR

Zero-Knowledge Proof (ZKP) Authentication for Offline CBDC Payment System Using IoT Devices

This paper proposes a privacy-preserving, offline Central Bank Digital Currency (CBDC) payment model for resource-constrained IoT devices that integrates Secure Elements, lightweight Zero-Knowledge Proofs, and intermittent synchronization to enable secure, cash-like transactions while preventing double-spending and ensuring AML/CFT compliance without continuous internet connectivity.

Santanu Mondal, T. Chithralekha2026-03-06🔒 cs.CR

How Effective Are Publicly Accessible Deepfake Detection Tools? A Comparative Evaluation of Open-Source and Free-to-Use Platforms

This study evaluates six publicly accessible deepfake detection tools and finds that while forensic and AI-based classifiers exhibit complementary strengths and weaknesses, human evaluators with law enforcement experience significantly outperform all automated systems, particularly in resolving cases of disagreement.

Michael Rettinger, Ben Beaumont, Nhien-An Le-Khac, Hong-Hanh Nguyen-Le2026-03-06🔒 cs.CR

Benchmark of Benchmarks: Unpacking Influence and Code Repository Quality in LLM Safety Benchmarks

This paper presents the first multi-dimensional evaluation of 31 LLM safety benchmarks, revealing that while they do not outperform non-benchmark papers in academic influence, there is a critical misalignment where neither author prominence nor paper impact correlates with code quality, highlighting a significant need for improved repository readiness and ethical standards.

Junjie Chu, Xinyue Shen, Ye Leng, Michael Backes, Yun Shen, Yang Zhang2026-03-06🔒 cs.CR

Impact of 5G SA Logical Vulnerabilities on UAV Communications: Threat Models and Testbed Evaluation

This paper evaluates the impact of logical vulnerabilities in 5G Standalone networks on UAV communications by utilizing a Kubernetes-based testbed to demonstrate how attacks from malicious UEs, compromised gNodeBs, or the 5G core can disrupt operations, thereby highlighting the critical need for user plane isolation and protocol integrity.

Wagner Comin Sonaglio, Ágney Lopes Roth Ferraz, Lourenço Alves Pereira Júnior2026-03-06🔒 cs.CR