all InfoSec news
Topic: cs.se
On the Security Vulnerabilities of Text-to-SQL Models
5 days, 3 hours ago |
arxiv.org
Sandboxing Adoption in Open Source Ecosystems
6 days, 3 hours ago |
arxiv.org
Numeric Truncation Security Predicate
1 week, 6 days ago |
arxiv.org
LLM Security Guard for Code
2 weeks, 2 days ago |
arxiv.org
Towards Trust Proof for Secure Confidential Virtual Machines
2 weeks, 2 days ago |
arxiv.org
Servicifying zk-SNARKs Execution for Verifiable Off-chain Computations
2 weeks, 6 days ago |
arxiv.org
I still know it's you! On Challenges in Anonymizing Source Code
1 month, 1 week ago |
arxiv.org
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
1 month, 1 week ago |
arxiv.org
Automated Attack Synthesis for Constant Product Market Makers
1 month, 1 week ago |
arxiv.org
Security Weaknesses of Copilot Generated Code in GitHub
1 month, 2 weeks ago |
arxiv.org
How Effective Are Neural Networks for Fixing Security Vulnerabilities
1 month, 2 weeks ago |
arxiv.org
Sandboxing Adoption in Open Source Ecosystems
6 days, 3 hours ago |
arxiv.org
On the Security Vulnerabilities of Text-to-SQL Models
5 days, 3 hours ago |
arxiv.org
Items published with this topic over the last 90 days.
Latest
On the Security Vulnerabilities of Text-to-SQL Models
5 days, 3 hours ago |
arxiv.org
Sandboxing Adoption in Open Source Ecosystems
6 days, 3 hours ago |
arxiv.org
Numeric Truncation Security Predicate
1 week, 6 days ago |
arxiv.org
LLM Security Guard for Code
2 weeks, 2 days ago |
arxiv.org
Towards Trust Proof for Secure Confidential Virtual Machines
2 weeks, 2 days ago |
arxiv.org
Servicifying zk-SNARKs Execution for Verifiable Off-chain Computations
2 weeks, 6 days ago |
arxiv.org
I still know it's you! On Challenges in Anonymizing Source Code
1 month, 1 week ago |
arxiv.org
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
1 month, 1 week ago |
arxiv.org
Automated Attack Synthesis for Constant Product Market Makers
1 month, 1 week ago |
arxiv.org
Security Weaknesses of Copilot Generated Code in GitHub
1 month, 2 weeks ago |
arxiv.org
How Effective Are Neural Networks for Fixing Security Vulnerabilities
1 month, 2 weeks ago |
arxiv.org
Topic trend (last 90 days)
Top (last 7 days)
Sandboxing Adoption in Open Source Ecosystems
6 days, 3 hours ago |
arxiv.org
On the Security Vulnerabilities of Text-to-SQL Models
5 days, 3 hours ago |
arxiv.org
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Senior - Penetration Tester
@ Deloitte | Madrid, España
Associate Cyber Incident Responder
@ Highmark Health | PA, Working at Home - Pennsylvania
Senior Insider Threat Analyst
@ IT Concepts Inc. | Woodlawn, Maryland, United States