Detecting Cryptographically Relevant Software Packages with Collaborative LLMs

This paper proposes and evaluates an on-premises collaborative framework utilizing multiple large language models with majority voting to efficiently and privately identify cryptographically relevant software packages, thereby addressing the challenges of manual inventory and static analysis limitations in the transition to post-quantum cryptography.

Eduard Hirsch, Kristina Raab, Tobias J. Bauer, Daniel LoebenbergerTue, 10 Ma💻 cs

Two Frames Matter: A Temporal Attack for Text-to-Video Model Jailbreaking

This paper introduces TFM, a temporal attack framework that exploits the vulnerability of text-to-video models to generate harmful content by providing only sparse boundary conditions (start and end frames) and implicitly substituting sensitive cues, thereby bypassing existing safety filters and significantly increasing jailbreak success rates.

Moyang Chen, Zonghao Ying, Wenzhuo Xu, Quancheng Zou, Deyue Zhang, Dongdong Yang, Xiangzheng ZhangTue, 10 Ma💻 cs

Securing Cryptography in the Age of Quantum Computing and AI: Threats, Implementations, and Strategic Response

This review paper analyzes the dual threats posed by quantum computing and artificial intelligence to current cryptographic systems, concluding that a comprehensive defense requires a dynamic, multi-layered strategy combining post-quantum algorithms, implementation hardening, and cryptographic agility to address the limitations of any single solution.

Viraaji Mothukuri, Reza M. PariziTue, 10 Ma💻 cs

SoK: Self-Sovereign Digital Identities

This paper presents a comprehensive systematization of knowledge on Self-Sovereign Digital Identities (SSDI) by analyzing 80 sources to identify six major adoption challenges, evaluating 47 academic publications and 12 real-world applications to reveal that self-sovereignty is a spectrum, and outlining future research directions to accelerate the shift from centralized to self-sovereign identity systems.

Sushanth Ambati, Kainat Adeel, Jack Myers, Nikolay IvanovTue, 10 Ma💻 cs

IAG: Input-aware Backdoor Attack on VLM-based Visual Grounding

This paper introduces IAG, the first input-aware backdoor attack on vision-language models for visual grounding, which utilizes a text-conditioned UNet to dynamically generate imperceptible, target-specific triggers that achieve high attack success rates across various models and datasets while maintaining stealth and robustness against defenses.

Junxian Li, Beining Xu, Simin Chen, Jiatong Li, Jingdi Lei, Haodong Zhao, Di ZhangTue, 10 Ma💬 cs.CL

SoK: Agentic Retrieval-Augmented Generation (RAG): Taxonomy, Architectures, Evaluation, and Research Directions

This Systematization of Knowledge (SoK) paper establishes the first unified framework for Agentic Retrieval-Augmented Generation (RAG) by formalizing autonomous loops as decision-making processes, proposing a comprehensive taxonomy and architectural decomposition, critiquing current evaluation limitations and systemic risks, and outlining critical research directions for building reliable and scalable agentic systems.

Saroj Mishra, Suman Niroula, Umesh Yadav, Dilip Thakur, Srijan Gyawali, Shiva GaireTue, 10 Ma💬 cs.CL

Supporting Artifact Evaluation with LLMs: A Study with Published Security Research Papers

This paper presents a toolkit leveraging Large Language Models to automate key aspects of Artifact Evaluation in cybersecurity research, achieving high accuracy in reproducibility rating, autonomous environment setup, and pitfall detection to significantly reduce reviewer effort and enhance research transparency.

David Heye, Karl Kindermann, Robin Decker, Johannes Lohmöller, Anastasiia Belova, Sandra Geisler, Klaus Wehrle, Jan PennekampTue, 10 Ma💬 cs.CL

Retrieval Pivot Attacks in Hybrid RAG: Measuring and Mitigating Amplified Leakage from Vector Seeds to Graph Expansion

This paper identifies and formalizes "Retrieval Pivot Attacks" in Hybrid RAG systems, demonstrating how vector-retrieved seeds can inadvertently pivot through knowledge graph links to cause cross-tenant data leakage, and proves that enforcing authorization specifically at the graph expansion boundary effectively mitigates this risk with minimal overhead.

Scott ThorntonTue, 10 Ma🤖 cs.LG