Tootfinder

Opt-in global Mastodon full text search. Join the index!

@arXiv_csCR_bot@mastoxiv.page
2025-09-23 10:26:51

Temporal Logic-Based Multi-Vehicle Backdoor Attacks against Offline RL Agents in End-to-end Autonomous Driving
Xuan Chen, Shiwei Feng, Zikang Xiong, Shengwei An, Yunshu Mao, Lu Yan, Guanhong Tao, Wenbo Guo, Xiangyu Zhang
arxiv.org/abs/2509.16950

@arXiv_csLG_bot@mastoxiv.page
2025-09-22 10:33:51

Inverting Trojans in LLMs
Zhengxing Li, Guangmingmei Yang, Jayaram Raghuram, David J. Miller, George Kesidis
arxiv.org/abs/2509.16203 arxiv…

@arXiv_csCR_bot@mastoxiv.page
2025-08-22 09:44:31

BadFU: Backdoor Federated Learning through Adversarial Machine Unlearning
Bingguang Lu, Hongsheng Hu, Yuantian Miao, Shaleeza Sohail, Chaoxiang He, Shuo Wang, Xiao Chen
arxiv.org/abs/2508.15541

I have zero doubt that Israel and Russia currently have a backdoor into our intelligence community’s cyber infrastructure through Palantir and Pegasus.
politico.com/news/2025/08/20/g

@macandi@social.heise.de
2025-08-19 08:13:00

US-Geheimdienstchefin: Großbritannien will doch keine Hintertür für Apple-User
Laut Angaben der amerikanischen Geheimdienstkoordinatorin Tulsi Gabbard gibt es einen "Deal" mit London. Dort wollte man eine weltweite iCloud-Backdoor.

@Techmeme@techhub.social
2025-07-20 21:50:50

Sources: the UK may backtrack on its January order for Apple to create a backdoor for iCloud encrypted data after pressure from US officials, including JD Vance (Financial Times)
ft.com/content/3a3e6dbc-591d-4

@arXiv_csCV_bot@mastoxiv.page
2025-08-20 10:21:50

Backdooring Self-Supervised Contrastive Learning by Noisy Alignment
Tuo Chen, Jie Gui, Minjing Dong, Ju Jia, Lanting Fang, Jian Liu
arxiv.org/abs/2508.14015

@arXiv_csCR_bot@mastoxiv.page
2025-09-23 10:49:00

Localizing Malicious Outputs from CodeLLM
Mayukh Borana, Junyi Liang, Sai Sathiesh Rajan, Sudipta Chattopadhyay
arxiv.org/abs/2509.17070 ar…

@arXiv_csCR_bot@mastoxiv.page
2025-08-21 08:40:59

DOPA: Stealthy and Generalizable Backdoor Attacks from a Single Client under Challenging Federated Constraints
Xuezheng Qin, Ruwei Huang, Xiaolong Tang, Feng Li
arxiv.org/abs/2508.14530

@tante@tldr.nettime.org
2025-07-17 10:50:13

This story is cute: A malicious "Solidity" (that's the smart contract language Ethereum and other blockchains use) extension for Cursor, the Vibe-Coding Editor included code that steals your tokens/coins.
I find it funny for two reasons:
- Blockchainers love talking about how you need to verify things you interact with but someone wasn't checking if they have the right extension
- Programming smart contracts is hard because it's a massively hostile envir…

@arXiv_csMM_bot@mastoxiv.page
2025-07-08 07:52:10

CLIP-Guided Backdoor Defense through Entropy-Based Poisoned Dataset Separation
Binyan Xu, Fan Yang, Xilin Dai, Di Tang, Kehuan Zhang
arxiv.org/abs/2507.05113

@Techmeme@techhub.social
2025-08-19 03:05:40

US DNI Tulsi Gabbard says the UK has agreed to drop its mandate requiring Apple to provide a backdoor for accessing users' encrypted data (Kanishka Singh/Reuters)
reuters.com/sustainability/boa

@maxheadroom@hub.uckermark.social
2025-09-18 05:05:17

I'll gonna take some time today to personalize the message and send out emails from my own account to hopefully ditch filtering on the target side and make my voice heard. Allowing chat control does not only put privacy and democracy in danger. At times of constant digital attacks from rogue states like Russia, the US, North Korea and China etc. it should be obvious that having weak encryption and standard backdoor access to secure communications channels is an invitation for any malici…

@arXiv_csCL_bot@mastoxiv.page
2025-07-10 10:03:41

VisualTrap: A Stealthy Backdoor Attack on GUI Agents via Visual Grounding Manipulation
Ziang Ye, Yang Zhang, Wentao Shi, Xiaoyu You, Fuli Feng, Tat-Seng Chua
arxiv.org/abs/2507.06899

@arXiv_csSD_bot@mastoxiv.page
2025-08-13 08:49:42

Multi-Target Backdoor Attacks Against Speaker Recognition
Alexandrine Fortier, Sonal Joshi, Thomas Thebaud, Jesus Villalba Lopez, Najim Dehak, Patrick Cardinal
arxiv.org/abs/2508.08559

@newsie@darktundra.xyz
2025-07-16 15:53:36

Google spots tailored backdoor malware aimed at SonicWall appliances therecord.media/sonicwall-sma-

@floheinstein@chaos.social
2025-09-16 08:09:39

Why use a URL shortener when you can use a phishy URL extender?
#infosec

https://cheap-bitcoin.online/backdoor-loader/rat-controller/malware_patch.exe?cachecontrol=inject&cookievalue=steal&file=poison&id=fc3188fb&payload=%28function%28%29%7B+return+Math.floor%284.9%29%3B+%7D%29%28%29%3B&port=scan
@kubikpixel@chaos.social
2025-08-05 10:40:30

»Forscher warnen – Bisher unbekannte Linux-Malware ist seit Monaten aktiv:
Die Malware verfügt über ausgeklügelte Verschleierungstechniken. Bis zuletzt wurde sie von keiner Antivirensoftware auf Virustotal erkannt«
Betroffen müssen deswegen nicht alle Linuxmaschinen sein aber überprüfen sollte mensch es schon… bis später und AntVir nutze ich nicht - wer schon?
P.S. Jegliche IT-Systeme könnten betroffen sein.
🐧

@arXiv_csCR_bot@mastoxiv.page
2025-09-23 17:49:54

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- Rethinking Backdoor Detection Evaluation for Language Models
Jun Yan, Wenjie Jacky Mo, Xiang Ren, Robin Jia

@tante@tldr.nettime.org
2025-07-17 10:42:18

@… Here this combines two of your favourite things: securelist.com/open-source-pac

@pgcd@mastodon.online
2025-08-14 16:18:13

Do the EU Members who want #chatcontrol for everybody (but politicians) realize that once a backdoor is in, it's in for everybody?
That it will be used by "good" and bad guys? That it will be used against real criminals and people who happen to have the wrong sort of face?
Most importantly (for them), do they understand their friends etc will not be even nominally e…

@arXiv_csCR_bot@mastoxiv.page
2025-09-23 11:44:10

Hybrid Reputation Aggregation: A Robust Defense Mechanism for Adversarial Federated Learning in 5G and Edge Network Environments
Saeid Sheikhi, Panos Kostakos, Lauri Loven
arxiv.org/abs/2509.18044

@arXiv_statML_bot@mastoxiv.page
2025-09-03 08:54:23

Partial Functional Dynamic Backdoor Diffusion-based Causal Model
Xinwen Liu, Lei Qian, Song Xi Chen, Niansheng Tang
arxiv.org/abs/2509.00472

@metacurity@infosec.exchange
2025-07-30 14:10:38

Stay alert and check out today's Metacurity for the critical infosec developments you should know, including
--Minnesota's Walz mobilizes National Guard to help with St. Paul cyberattack,
--Tea suspends direct messaging and gets hit with class actions over breach,
--CISA to release Wyden-demanded report to unblock Plankey nomination,
--Google has not received UK backdoor demand,
--Orange breach triggers minor disruptions,
--Palo Alto to buy CyberAr…

@arXiv_quantph_bot@mastoxiv.page
2025-08-05 11:42:11

BVQC: A Backdoor-style Watermarking Scheme for Variational Quantum Circuits
Cheng Chu, Lei Jiang, Fan Chen
arxiv.org/abs/2508.01893 arxiv.o…

@Techmeme@techhub.social
2025-07-17 04:30:45

Google says threat actors are stealing sensitive data from organizations by targeting fully patched, end-of-life appliances from cybersecurity company SonicWall (Jonathan Greig/The Record)
therecord.media/sonicwall-sma-

@gfriend@mas.to
2025-07-10 19:57:54

A very NYTimesian euphemism: "Trump May Not Be Done Overhauling Renewable Energy."
The story goes on with words like hamstring, backdoor cancellation, and sledgehammer, but meanwhile, the headline has done its work..

@arXiv_csLG_bot@mastoxiv.page
2025-07-17 10:24:30

Thought Purity: Defense Paradigm For Chain-of-Thought Attack
Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou
arxiv.org/abs/2507.12314

@arXiv_csCR_bot@mastoxiv.page
2025-08-20 09:12:40

Beneath the Mask: Can Contribution Data Unveil Malicious Personas in Open-Source Projects?
Ruby Nealon
arxiv.org/abs/2508.13453 arxiv.org/p…

@arXiv_csCV_bot@mastoxiv.page
2025-08-26 12:31:56

Sealing The Backdoor: Unlearning Adversarial Text Triggers In Diffusion Models Using Knowledge Distillation
Ashwath Vaithinathan Aravindan, Abha Jha, Matthew Salaway, Atharva Sandeep Bhide, Duygu Nur Yaldiz
arxiv.org/abs/2508.18235

@deepthoughts10@infosec.exchange
2025-09-04 00:27:14

The registry keys referenced in this article are good things to check for in your environment. There aren’t many legitimate uses for macros and VBA in Outlook and you should ensure that functionality is disabled and stays that way.
#cybersecurity
From: @…

@arXiv_csCR_bot@mastoxiv.page
2025-07-16 09:17:01

3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
Jianyao Yin, Luca Arnaboldi, Honglong Chen, Pascal Berrang
arxiv.org/abs/2507.10733

@johl@mastodon.xyz
2025-08-25 13:17:41

„Der Auslöser zum Aktivieren der Backdoor in Gayfemboy ist die Zeichenkette "meowmeow".“
heise.de/news/Mirai-basierte-B

@metacurity@infosec.exchange
2025-07-26 13:08:42

Each week, Metacurity offers our free and paid subscribers a digest of the best long-form (and longish) infosec-related pieces we couldn't properly fit into our daily news crush.
This week's selection covers
--N. Korea's IT worker scheme ensnared a troubled woman,
--Iran is harvesting millions of airline passengers' data,
--Myanmar is isolated in its digital tyranny,
--Pushing the UK to abandon its encryption backdoor,
--The racist hacker …

@Techmeme@techhub.social
2025-09-14 03:25:55

Malaysia reins in data center expansion amid power and water shortages, hindering Chinese companies that use the region as a backdoor to access US-made AI chips (Reuters)
reuters.com/world/china/malays

@arXiv_csAI_bot@mastoxiv.page
2025-09-04 13:29:31

Replaced article(s) found for cs.AI. arxiv.org/list/cs.AI/new
[5/5]:
- BadPromptFL: A Novel Backdoor Threat to Prompt-based Federated Learning in Multimodal Models
Maozhen Zhang, Mengnan Zhao, Bo Wang

@arXiv_csCR_bot@mastoxiv.page
2025-09-11 09:39:33

Prototype-Guided Robust Learning against Backdoor Attacks
Wei Guo, Maura Pintor, Ambra Demontis, Battista Biggio
arxiv.org/abs/2509.08748 a…

@arXiv_csCV_bot@mastoxiv.page
2025-08-04 10:09:51

Backdoor Attacks on Deep Learning Face Detection
Quentin Le Roux, Yannick Teglia, Teddy Furon, Philippe Loubet-Moundi
arxiv.org/abs/2508.00620

@arXiv_csCR_bot@mastoxiv.page
2025-09-11 09:38:43

Silent Until Sparse: Backdoor Attacks on Semi-Structured Sparsity
Wei Guo, Maura Pintor, Ambra Demontis, Battista Biggio
arxiv.org/abs/2509.08747

@arXiv_csCL_bot@mastoxiv.page
2025-08-29 10:26:41

Lethe: Purifying Backdoored Large Language Models with Knowledge Dilution
Chen Chen, Yuchen Sun, Jiaxin Gao, Xueluan Gong, Qian Wang, Ziyao Wang, Yongsen Zheng, Kwok-Yan Lam
arxiv.org/abs/2508.21004

@arXiv_csSD_bot@mastoxiv.page
2025-08-05 10:23:11

Hidden in the Noise: Unveiling Backdoors in Audio LLMs Alignment through Latent Acoustic Pattern Triggers
Liang Lin, Miao Yu, Kaiwen Luo, Yibo Zhang, Lilan Peng, Dexian Wang, Xuehai Tang, Yuanhe Zhang, Xikang Yang, Zhenhong Zhou, Kun Wang, Yang Liu
arxiv.org/abs/2508.02175

@Treppenwitz@sfba.social
2025-08-03 15:56:51

#Facebook is very very bad. businesstoday.in/technology/ne

@arXiv_csCR_bot@mastoxiv.page
2025-08-05 11:51:51

Coward: Toward Practical Proactive Federated Backdoor Defense via Collision-based Watermark
Wenjie Li, Siying Gu, Yiming Li, Kangjie Chen, Zhili Chen, Tianwei Zhang, Shu-Tao Xia, Dacheng Tao
arxiv.org/abs/2508.02115

@arXiv_csCR_bot@mastoxiv.page
2025-08-11 09:52:49

SLIP: Soft Label Mechanism and Key-Extraction-Guided CoT-based Defense Against Instruction Backdoor in APIs
Zhengxian Wu, Juan Wen, Wanli Peng, Haowei Chang, Yinghan Zhou, Yiming Xue
arxiv.org/abs/2508.06153

@arXiv_csCR_bot@mastoxiv.page
2025-08-07 09:23:24

BadTime: An Effective Backdoor Attack on Multivariate Long-Term Time Series Forecasting
Kunlan Xiang, Haomiao Yang, Meng Hao, Haoxin Wang, Shaofeng Li, Wenbo Jiang
arxiv.org/abs/2508.04189

@Speckdaene@nrw.social
2025-07-07 10:57:08

Friendly reminder, it takes place today. #EU #Methan-Backdoor #Fracking #LNG. @…

@arXiv_csCR_bot@mastoxiv.page
2025-08-06 09:04:50

BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
Ye Li, Chengcheng Zhu, Yanchao Zhao, Jiale Zhang
arxiv.org/abs/2508.03307

@arXiv_csCR_bot@mastoxiv.page
2025-08-06 09:03:10

BadBlocks: Low-Cost and Stealthy Backdoor Attacks Tailored for Text-to-Image Diffusion Models
Yu Pan, Jiahao Chen, Lin Wang, Bingrong Dai, Yi Du
arxiv.org/abs/2508.03221

@newsie@darktundra.xyz
2025-07-29 18:48:13

Wyden asks White House to scrutinize UK surveillance laws therecord.media/wyden-asks-whi

@arXiv_csCR_bot@mastoxiv.page
2025-07-08 13:06:01

BackFed: An Efficient & Standardized Benchmark Suite for Backdoor Attacks in Federated Learning
Thinh Dao, Dung Thuy Nguyen, Khoa D Doan, Kok-Seng Wong
arxiv.org/abs/2507.04903

@arXiv_csCV_bot@mastoxiv.page
2025-07-31 10:11:01

DISTIL: Data-Free Inversion of Suspicious Trojan Inputs via Latent Diffusion
Hossein Mirzaei, Zeinab Taghavi, Sepehr Rezaee, Masoud Hadi, Moein Madadi, Mackenzie W. Mathis
arxiv.org/abs/2507.22813

@arXiv_csCR_bot@mastoxiv.page
2025-07-29 09:36:31

ConSeg: Contextual Backdoor Attack Against Semantic Segmentation
Bilal Hussain Abbasi, Zirui Gong, Yanjun Zhang, Shang Gao, Antonio Robles-Kelly, Leo Zhang
arxiv.org/abs/2507.19905

@arXiv_csMM_bot@mastoxiv.page
2025-07-28 12:30:58

Replaced article(s) found for cs.MM. arxiv.org/list/cs.MM/new
[1/1]:
- CLIP-Guided Backdoor Defense through Entropy-Based Poisoned Dataset Separation
Binyan Xu, Fan Yang, Xilin Dai, Di Tang, Kehuan Zhang

@arXiv_csCL_bot@mastoxiv.page
2025-07-25 09:58:42

BadReasoner: Planting Tunable Overthinking Backdoors into Large Reasoning Models for Fun or Profit
Biao Yi, Zekun Fei, Jianing Geng, Tong Li, Lihai Nie, Zheli Liu, Yiming Li
arxiv.org/abs/2507.18305

@arXiv_csCR_bot@mastoxiv.page
2025-07-02 08:31:40

BadViM: Backdoor Attack against Vision Mamba
Yinghao Wu, Liyan Zhang
arxiv.org/abs/2507.00577 arxiv.org/pdf/2507.0057…

@arXiv_csCR_bot@mastoxiv.page
2025-08-18 11:15:00

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Clean-Label Physical Backdoor Attacks with Data Distillation
Thinh Dao, Khoa D Doan, Kok-Seng Wong

@arXiv_csCR_bot@mastoxiv.page
2025-06-27 08:59:49

SPA: Towards More Stealth and Persistent Backdoor Attacks in Federated Learning
Chengcheng Zhu, Ye Li, Bosen Rao, Jiale Zhang, Yunlong Mao, Sheng Zhong
arxiv.org/abs/2506.20931

@arXiv_csCR_bot@mastoxiv.page
2025-08-07 08:49:34

Isolate Trigger: Detecting and Eradicating Evade-Adaptive Backdoors
Chengrui Sun, Hua Zhang, Haoran Gao, Zian Tian, Jianjin Zhao, qi Li, Hongliang Zhu, Zongliang Shen, Shang Wang, Anmin Fu
arxiv.org/abs/2508.04094

@arXiv_csCR_bot@mastoxiv.page
2025-08-11 09:15:50

Selection-Based Vulnerabilities: Clean-Label Backdoor Attacks in Active Learning
Yuhan Zhi, Longtian Wang, Xiaofei Xie, Chao Shen, Qiang Hu, Xiaohong Guan
arxiv.org/abs/2508.05681

@arXiv_csCR_bot@mastoxiv.page
2025-08-25 07:41:50

Towards Stealthy and Effective Backdoor Attacks on Lane Detection: A Naturalistic Data Poisoning Approach
Yifan Liao, Yuxin Cao, Yedi Zhang, Wentao He, Yan Xiao, Xianglong Du, Zhiyong Huang, Jin Song Dong
arxiv.org/abs/2508.15778

@arXiv_csCR_bot@mastoxiv.page
2025-06-27 08:35:29

CodeGuard: A Generalized and Stealthy Backdoor Watermarking for Generative Code Models
Haoxuan Li, Jiale Zhang, Xiaobing Sun, Xiapu Luo
arxiv.org/abs/2506.20926

@arXiv_csCR_bot@mastoxiv.page
2025-07-01 07:36:53

SABRE-FL: Selective and Accurate Backdoor Rejection for Federated Prompt Learning
Momin Ahmad Khan, Yasra Chandio, Fatima Muhammad Anwar
arxiv.org/abs/2506.22506

@arXiv_csCR_bot@mastoxiv.page
2025-08-25 08:44:50

Strategic Sample Selection for Improved Clean-Label Backdoor Attacks in Text Classification
Onur Alp Kirci, M. Emre Gursoy
arxiv.org/abs/2508.15934

@arXiv_csCR_bot@mastoxiv.page
2025-09-10 09:31:31

Backdoor Attacks and Defenses in Computer Vision Domain: A Survey
Bilal Hussain Abbasi, Yanjun Zhang, Leo Zhang, Shang Gao
arxiv.org/abs/2509.07504

@arXiv_csCR_bot@mastoxiv.page
2025-07-10 13:07:23

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Breaking PEFT Limitations: Leveraging Weak-to-Strong Knowledge Transfer for Backdoor Attacks in LLMs
Zhao, Gan, Guo, Wu, Jia, Xiao, Nguyen, Tuan

@arXiv_csCR_bot@mastoxiv.page
2025-08-05 11:51:11

FPEdit: Robust LLM Fingerprinting through Localized Knowledge Editing
Shida Wang, Chaohu Liu, Yubo Wang, Linli Xu
arxiv.org/abs/2508.02092

@arXiv_csCR_bot@mastoxiv.page
2025-09-03 12:45:23

Unlocking the Effectiveness of LoRA-FP for Seamless Transfer Implantation of Fingerprints in Downstream Models
Zhenhua Xu, Zhaokun Yan, Binhan Xu, Xin Tong, Haitao Xu, Yourong Chen, Meng Han
arxiv.org/abs/2509.00820

@arXiv_csCR_bot@mastoxiv.page
2025-07-29 10:29:31

Hot-Swap MarkBoard: An Efficient Black-box Watermarking Approach for Large-scale Model Distribution
Zhicheng Zhang, Peizhuo Lv, Mengke Wan, Jiang Fang, Diandian Guo, Yezeng Chen, Yinlong Liu, Wei Ma, Jiyan Sun, Liru Geng
arxiv.org/abs/2507.20650

@arXiv_csCR_bot@mastoxiv.page
2025-06-25 12:39:45

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Unified Neural Backdoor Removal with Only Few Clean Samples through Unlearning and Relearning
Nay Myat Min, Long H. Pham, Jun Sun