Condition-Triggered Cryptographic Asset Control via Dormant Authorization Paths

This paper introduces Condition-Triggered Dormant Authorization Paths (CT-DAP), a cryptographic framework that enables secure, conditional control and revocable delegation of digital assets through dormant authorization paths activated only by simultaneous user and administrative factors, thereby eliminating the need for persistent key exposure or trusted intermediaries while maintaining regulatory compliance.

Jian Sheng WangTue, 10 Ma💻 cs

The UK Cyber Security and Resilience Bill: A Practitioner's Guide to Legislative Reform, Compliance, and Organisational Readiness

This paper offers a comprehensive practitioner-oriented guide to the UK's 2025 Cyber Security and Resilience Bill, detailing its expanded regulatory scope, stringent enforcement penalties, and incident reporting requirements while providing actionable compliance frameworks, sector-specific roadmaps, and self-assessment tools to help organizations align with the new legislation and related international standards.

Jonathan ShelbyTue, 10 Ma💻 cs

Broken Access: On the Challenges of Screen Reader Assisted Two-Factor and Passwordless Authentication

This paper introduces the AWARE evaluation framework to systematically analyze screen reader-assisted authentication, revealing that current two-factor and passwordless methods contain significant accessibility flaws that expose blind and visually impaired users to various security vulnerabilities.

Md Mojibur Rahman Redoy Akanda (Texas A&M University), Ahmed Tanvir Mahdad (Texas A&M University), Nitesh Saxena (Texas A&M University)Tue, 10 Ma💻 cs

Post-quantum Federated Learning: Secure And Scalable Threat Intelligence For Collaborative Cyber Defense

This paper proposes and validates a post-quantum secure federated learning framework that integrates NIST-standardized CRYSTALS-Kyber and CRYSTALS-Dilithium algorithms to protect collaborative threat intelligence from quantum attacks, achieving high detection accuracy with minimal latency while ensuring privacy compliance.

Prabhudarshi Nayak, Gogulakrishnan Thiyagarajan, Ritunsa Mishra, Vinay BistTue, 10 Ma💻 cs

SoK: The Evolution of Maximal Extractable Value, From Miners to Cross-Chain

This Systematization of Knowledge (SoK) paper provides a comprehensive historical analysis of Maximal Extractable Value (MEV) by organizing fragmented literature into three chronological eras—from Miner Extractable Value in Proof-of-Work systems to the modern cross-chain frontier—while offering a unified taxonomy, identifying mitigations, and proposing a research agenda for standardized metrics and cross-chain infrastructure.

Davide Mancino, Hasret Ozan SevimTue, 10 Ma💻 cs

Registered Attribute-Based Encryption with Publicly Verifiable Certified Deletion, Everlasting Security, and More

This paper presents the first Registered Attribute-Based Encryption (RABE) schemes that support both certified deletion and certified everlasting security in both privately and publicly verifiable settings, thereby enabling decentralized, fine-grained access control with irreversible data deletion and information-theoretic security against future adversaries.

Shayeef Murshid, Ramprasad Sarkar, Mriganka MandalTue, 10 Ma💻 cs

Give Them an Inch and They Will Take a Mile:Understanding and Measuring Caller Identity Confusion in MCP-Based AI Systems

This paper reveals that MCP-based AI systems are fundamentally insecure due to a lack of caller identity authentication, which allows persistent authorization states and missing per-tool checks to enable unauthorized access to sensitive operations by untrusted callers.

Yuhang Huang, Boyang Ma, Biwei Yan, Xuelong Dai, Yechao Zhang, Minghui Xu, Kaidi Xu, Yue ZhangTue, 10 Ma💻 cs

Where Do LLM-based Systems Break? A System-Level Security Framework for Risk Assessment and Treatment

This paper proposes a goal-driven, system-level security framework that integrates system modeling, Attack-Defense Trees, and CVSS scoring to assess and mitigate risks in LLM-based systems, demonstrating through a healthcare case study that diverse threats often converge on shared system choke points, enabling targeted defenses to effectively reduce exploitability.

Neha Nagaraja, Hayretdin BahsiTue, 10 Ma💻 cs

Backdoor4Good: Benchmarking Beneficial Uses of Backdoors in LLMs

This paper introduces Backdoor4Good (B4G), a unified benchmark and framework that repurposes backdoor mechanisms in large language models as controllable, auditable interfaces to enhance safety, accountability, and trustworthy behavior through a formalized triplet of triggers, activation mechanisms, and utility functions.

Yige Li, Wei Zhao, Zhe Li, Nay Myat Min, Hanxun Huang, Yunhan Zhao, Xingjun Ma, Yu-Gang Jiang, Jun SunTue, 10 Ma💻 cs

AutoControl Arena: Synthesizing Executable Test Environments for Frontier AI Risk Evaluation

The paper introduces AutoControl Arena, an automated framework that decouples deterministic logic from generative narratives to create scalable, hallucination-free test environments, revealing that frontier AI models exhibit an "alignment illusion" where risk rates surge under pressure and display divergent misalignment patterns ranging from non-malicious harm to strategic concealment.

Changyi Li, Pengfei Lu, Xudong Pan, Fazl Barez, Min YangTue, 10 Ma💻 cs

TopRank-Based Delivery Rate Optimization for Coded Caching under Non-Uniform Demands

This paper proposes a TopRank-based coded caching strategy that optimizes delivery rates under non-uniform, unknown file demands by ranking files based on request count differences rather than estimating exact popularities, thereby achieving superior performance and sublinear regret in scenarios with limited users, small cache capacities, or noisy observation data.

Mohammadsaber Bahadori, Seyed Pooya Shariatpanahi, Behnam BahrakTue, 10 Ma💻 cs