External entropy supply for IoT devices employing a RISC-V Trusted Execution Environment

This paper proposes and validates an open-source RISC-V-based Trusted Execution Environment that acts as an external entropy service, enabling constrained IoT devices to securely obtain high-quality random numbers for cryptographic key generation by leveraging initial trust and potentially expanding with additional sensor-based entropy sources.

Arttu Paju, Alejandro Cabrera Aldaya, Nicola Tuveri, Juha Savimäki, Marko Kivikangas, Brian McGillionWed, 11 Ma💻 cs

Reasoning-Oriented Programming: Chaining Semantic Gadgets to Jailbreak Large Vision Language Models

This paper introduces "Reasoning-Oriented Programming," an automated attack framework that bypasses Large Vision-Language Model safety alignments by chaining semantically orthogonal benign visual inputs to force the emergence of harmful logic only during late-stage reasoning, thereby outperforming existing jailbreak methods on state-of-the-art models.

Quanchen Zou, Moyang Chen, Zonghao Ying, Wenzhuo Xu, Yisong Xiao, Deyue Zhang, Dongdong Yang, Zhao Liu, Xiangzheng ZhangWed, 11 Ma💻 cs

AgenticCyOps: Securing Multi-Agentic AI Integration in Enterprise Cyber Operations

This paper introduces AgenticCyOps, a security framework for enterprise multi-agent AI systems that mitigates emerging attack surfaces by formalizing tool orchestration and memory management as primary trust boundaries and applying five defensive principles aligned with global compliance standards to significantly reduce exploitable vulnerabilities in SOC workflows.

Shaswata Mitra, Raj Patel, Sudip Mittal, Md Rayhanur Rahman, Shahram RahimiWed, 11 Ma💻 cs

HeteroFedSyn: Differentially Private Tabular Data Synthesis for Heterogeneous Federated Settings

The paper proposes HeteroFedSyn, the first differentially private framework for synthesizing tabular data in horizontal federated settings, which achieves utility comparable to centralized methods by introducing noise-efficient dependency metrics, unbiased noise correction, and adaptive selection strategies to handle heterogeneous data distributions.

Xiaochen Li, Fengyu Gao, Xizixiang Wei, Tianhao Wang, Cong Shen, Jing YangWed, 11 Ma💻 cs

Randomized Distributed Function Computation (RDFC): Ultra-Efficient Semantic Communication Applications to Privacy

This paper introduces the Randomized Distributed Function Computation (RDFC) framework, a semantic communication approach that achieves local differential privacy and significantly reduces transmission rates compared to lossless methods, even in scenarios without shared randomness, by leveraging strong coordination metrics and randomized function generation.

Onur GünlüWed, 11 Ma⚡ eess

CyberThreat-Eval: Can Large Language Models Automate Real-World Threat Research?

This paper introduces CyberThreat-Eval, an expert-annotated benchmark derived from real-world Cyber Threat Intelligence workflows that addresses the limitations of existing evaluations by assessing Large Language Models across the full triage-to-reporting pipeline using analyst-centric metrics, revealing significant gaps in current models' ability to handle nuanced, actionable security insights.

Xiangsen Chen, Xuan Feng, Shuo Chen, Matthieu Maitre, Sudipto Rakshit, Diana Duvieilh, Ashley Picone, Nan TangWed, 11 Ma💬 cs.CL

A Survey on Decentralized Federated Learning

This survey systematically reviews decentralized federated learning methods from 2018 to early 2026, categorizing them into traditional distributed and blockchain-based architectures, proposing a unified challenge-driven taxonomy, and outlining future research directions to address security, privacy, and system-level trade-offs in coordinator-free settings.

Edoardo Gabrielli, Anthony Di Pietro, Dario Fenoglio, Giovanni Pica, Gabriele TolomeiWed, 11 Ma🤖 cs.LG

FlexServe: A Fast and Secure LLM Serving System for Mobile Devices with Flexible Resource Isolation

This paper presents FlexServe, a high-performance and secure LLM serving system for mobile devices that leverages a novel Flexible Resource Isolation mechanism to overcome the significant overhead of ARM TrustZone, achieving up to 10.05× faster time-to-first-token and 24.30× faster multi-model workflow execution compared to baseline designs.

Yinpeng Wu, Yitong Chen, Lixiang Wang, Jinyu Gu, Zhichao Hua, Yubin XiaWed, 11 Ma🤖 cs.LG

Quantifying Memorization and Privacy Risks in Genomic Language Models

This paper introduces a comprehensive multi-vector privacy evaluation framework that quantifies memorization risks in Genomic Language Models by integrating perplexity-based detection, canary sequence extraction, and membership inference, revealing that these models exhibit measurable data leakage dependent on architecture and training dynamics.

Alexander Nemecek, Wenbiao Li, Xiaoqian Jiang, Jaideep Vaidya, Erman AydayWed, 11 Ma🤖 cs.LG

MCP Bridge: A Lightweight, LLM-Agnostic RESTful Proxy for Model Context Protocol Servers

This paper introduces MCP Bridge, a lightweight, LLM-agnostic RESTful proxy that enables Model Context Protocol servers to run in resource-constrained environments with enhanced security, while also presenting a fine-tuned Qwen3 model that achieves state-of-the-art performance on the MCPToolBench++ benchmark through advanced reinforcement learning techniques.

Arash Ahmadi, Sarah Sharif, Yaser M. BanadWed, 11 Ma🤖 cs.AI

Democratising Clinical AI through Dataset Condensation for Classical Clinical Models

This paper introduces a differentially private, zero-order optimization framework that extends dataset condensation to non-differentiable clinical models, enabling the creation of compact, privacy-preserving synthetic datasets that facilitate the democratization of clinical data sharing without compromising model utility.

Anshul Thakur, Soheila Molaei, Pafue Christy Nganjimi, Joshua Fieggen, Andrew A. S. Soltan, Danielle Belgrave, Lei Clifton, David A. CliftonWed, 11 Ma🤖 cs.AI