Layered Performance Analysis of TLS 1.3 Handshakes: Classical, Hybrid, and Pure Post-Quantum Key Exchange

This paper presents a laboratory study analyzing the performance impact of traditional, hybrid, and pure post-quantum TLS 1.3 key exchange algorithms across multiple layers of stateful HTTP transactions, utilizing a load-balanced architecture to statistically evaluate latency and throughput variations under different response sizes.

David Gómez-Cambronero, Daniel Munteanu, Ana Isabel González-TablasThu, 12 Ma💻 cs

AttriGuard: Defeating Indirect Prompt Injection in LLM Agents via Causal Attribution of Tool Invocations

The paper proposes AttriGuard, a novel runtime defense that mitigates Indirect Prompt Injection in LLM agents by employing parallel counterfactual tests to causally attribute tool invocations to user intent rather than untrusted external observations, thereby achieving near-perfect attack success rate reduction with minimal utility loss.

Yu He, Haozhe Zhu, Yiming Li, Shuo Shao, Hongwei Yao, Zhihao Liu, Zhan QinThu, 12 Ma💻 cs

Defensive Refusal Bias: How Safety Alignment Fails Cyber Defenders

This paper identifies and quantifies "Defensive Refusal Bias," a safety alignment failure in large language models where legitimate cybersecurity defenders are disproportionately denied assistance for critical tasks due to the presence of security-sensitive keywords, a problem exacerbated by explicit authorization attempts and current reliance on semantic similarity rather than intent reasoning.

David Campbell, Neil Kale, Udari Madhushani Sehwag, Bert Herring, Nick Price, Dan Borges, Alex Levinson, Christina Q KnightThu, 12 Ma🤖 cs.AI

Adversarial Hubness Detector: Detecting Hubness Poisoning in Retrieval-Augmented Generation Systems

This paper introduces Hubscan, an open-source security scanner that utilizes a multi-detector architecture to identify and mitigate hubness poisoning attacks in Retrieval-Augmented Generation (RAG) systems, achieving high recall rates in detecting adversarial hubs across various vector databases and real-world benchmarks.

Idan Habler, Vineeth Sai Narajala, Stav Koren, Amy Chang, Tiffany SaadeThu, 12 Ma🤖 cs.AI

Burn-After-Use for Preventing Data Leakage through a Secure Multi-Tenant Architecture in Enterprise LLM

This paper proposes a Secure Multi-Tenant Architecture (SMTA) combined with a novel Burn-After-Use (BAU) mechanism to effectively prevent data leakage in enterprise LLMs by enforcing strict instance isolation and ephemeral context destruction, achieving high defense success rates against both semantic leakage attacks and post-session persistence threats in experimental evaluations.

Qiang Zhang, Elena Emma Wang, Jiaming Li, Xichun WangThu, 12 Ma🤖 cs.AI

Hierarchical Dual-Strategy Unlearning for Biomedical and Healthcare Intelligence Using Imperfect and Privacy-Sensitive Medical Data

This paper proposes a hierarchical dual-strategy framework that achieves precise selective unlearning of privacy-sensitive medical knowledge in large language models while preserving fundamental competencies, demonstrated by high forgetting and preservation rates on clinical datasets with minimal parameter modification.

Yi Zhang, Chao Zhang, Zijian Li, Tianxiang Xu, Kunyu Zhang, Zhan Gao, Meinuo Li, Xiaohan Zhang, Qichao Qi, Bing ChenThu, 12 Ma🤖 cs.LG

PRoADS: Provably Secure and Robust Audio Diffusion Steganography with latent optimization and backward Euler Inversion

The paper introduces PRoADS, a provably secure and robust audio steganography framework that embeds secret messages into diffusion model noise via orthogonal projection and employs Latent Optimization with Backward Euler Inversion to minimize reconstruction errors, achieving a remarkably low bit error rate of 0.15% under 64 kbps MP3 compression.

YongPeng Yan, Yanan Li, Qiyang Xiao, Yanzhen RenThu, 12 Ma💻 cs

Post-Quantum Entropy as a Service for Embedded Systems

This paper presents a Quantum Entropy as a Service (QEaaS) system that delivers post-quantum-secured entropy to embedded ESP32 devices, demonstrating that ML-KEM-512 and ML-DSA-44 protocols achieve DTLS 1.3 handshakes significantly faster than classical ECDHE P-256 counterparts while maintaining robust security.

Javier Blanco-Romero, Yuri Melissa Garcia-Niño, Florina Almenares Mendoza, Daniel Díaz-Sánchez, Carlos García-Rubio, Celeste CampoThu, 12 Ma💻 cs