Temporal Logic-Based Multi-Vehicle Backdoor Attacks against Offline RL Agents in End-to-end Autonomous Driving
Xuan Chen, Shiwei Feng, Zikang Xiong, Shengwei An, Yunshu Mao, Lu Yan, Guanhong Tao, Wenbo Guo, Xiangyu Zhang
https://arxiv.org/abs/2509.16950
BadFU: Backdoor Federated Learning through Adversarial Machine Unlearning
Bingguang Lu, Hongsheng Hu, Yuantian Miao, Shaleeza Sohail, Chaoxiang He, Shuo Wang, Xiao Chen
https://arxiv.org/abs/2508.15541
I have zero doubt that Israel and Russia currently have a backdoor into our intelligence community’s cyber infrastructure through Palantir and Pegasus.
https://www.politico.com/news/2025/08/20/gabbard-odni-cuts-00517232
US-Geheimdienstchefin: Großbritannien will doch keine Hintertür für Apple-User
Laut Angaben der amerikanischen Geheimdienstkoordinatorin Tulsi Gabbard gibt es einen "Deal" mit London. Dort wollte man eine weltweite iCloud-Backdoor.
Sources: the UK may backtrack on its January order for Apple to create a backdoor for iCloud encrypted data after pressure from US officials, including JD Vance (Financial Times)
https://www.ft.com/content/3a3e6dbc-591d-4087-9ad3-11af04f0176f
Backdooring Self-Supervised Contrastive Learning by Noisy Alignment
Tuo Chen, Jie Gui, Minjing Dong, Ju Jia, Lanting Fang, Jian Liu
https://arxiv.org/abs/2508.14015 https://
DOPA: Stealthy and Generalizable Backdoor Attacks from a Single Client under Challenging Federated Constraints
Xuezheng Qin, Ruwei Huang, Xiaolong Tang, Feng Li
https://arxiv.org/abs/2508.14530
This story is cute: A malicious "Solidity" (that's the smart contract language Ethereum and other blockchains use) extension for Cursor, the Vibe-Coding Editor included code that steals your tokens/coins.
I find it funny for two reasons:
- Blockchainers love talking about how you need to verify things you interact with but someone wasn't checking if they have the right extension
- Programming smart contracts is hard because it's a massively hostile envir…
CLIP-Guided Backdoor Defense through Entropy-Based Poisoned Dataset Separation
Binyan Xu, Fan Yang, Xilin Dai, Di Tang, Kehuan Zhang
https://arxiv.org/abs/2507.05113
US DNI Tulsi Gabbard says the UK has agreed to drop its mandate requiring Apple to provide a backdoor for accessing users' encrypted data (Kanishka Singh/Reuters)
https://www.reuters.com/sustainability/boa
I'll gonna take some time today to personalize the message and send out emails from my own account to hopefully ditch filtering on the target side and make my voice heard. Allowing chat control does not only put privacy and democracy in danger. At times of constant digital attacks from rogue states like Russia, the US, North Korea and China etc. it should be obvious that having weak encryption and standard backdoor access to secure communications channels is an invitation for any malici…
VisualTrap: A Stealthy Backdoor Attack on GUI Agents via Visual Grounding Manipulation
Ziang Ye, Yang Zhang, Wentao Shi, Xiaoyu You, Fuli Feng, Tat-Seng Chua
https://arxiv.org/abs/2507.06899
Multi-Target Backdoor Attacks Against Speaker Recognition
Alexandrine Fortier, Sonal Joshi, Thomas Thebaud, Jesus Villalba Lopez, Najim Dehak, Patrick Cardinal
https://arxiv.org/abs/2508.08559
Why use a URL shortener when you can use a phishy URL extender?
#infosec
»Forscher warnen – Bisher unbekannte Linux-Malware ist seit Monaten aktiv:
Die Malware verfügt über ausgeklügelte Verschleierungstechniken. Bis zuletzt wurde sie von keiner Antivirensoftware auf Virustotal erkannt«
Betroffen müssen deswegen nicht alle Linuxmaschinen sein aber überprüfen sollte mensch es schon… bis später und AntVir nutze ich nicht - wer schon?
P.S. Jegliche IT-Systeme könnten betroffen sein.
🐧
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- Rethinking Backdoor Detection Evaluation for Language Models
Jun Yan, Wenjie Jacky Mo, Xiang Ren, Robin Jia
Do the EU Members who want #chatcontrol for everybody (but politicians) realize that once a backdoor is in, it's in for everybody?
That it will be used by "good" and bad guys? That it will be used against real criminals and people who happen to have the wrong sort of face?
Most importantly (for them), do they understand their friends etc will not be even nominally e…
Hybrid Reputation Aggregation: A Robust Defense Mechanism for Adversarial Federated Learning in 5G and Edge Network Environments
Saeid Sheikhi, Panos Kostakos, Lauri Loven
https://arxiv.org/abs/2509.18044
Google says threat actors are stealing sensitive data from organizations by targeting fully patched, end-of-life appliances from cybersecurity company SonicWall (Jonathan Greig/The Record)
https://therecord.media/sonicwall-sma-100-series-overstep-malware-unc6148
A very NYTimesian euphemism: "Trump May Not Be Done Overhauling Renewable Energy."
The story goes on with words like hamstring, backdoor cancellation, and sledgehammer, but meanwhile, the headline has done its work..https://www.
Thought Purity: Defense Paradigm For Chain-of-Thought Attack
Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou
https://arxiv.org/abs/2507.12314
Sealing The Backdoor: Unlearning Adversarial Text Triggers In Diffusion Models Using Knowledge Distillation
Ashwath Vaithinathan Aravindan, Abha Jha, Matthew Salaway, Atharva Sandeep Bhide, Duygu Nur Yaldiz
https://arxiv.org/abs/2508.18235
The registry keys referenced in this article are good things to check for in your environment. There aren’t many legitimate uses for macros and VBA in Outlook and you should ensure that functionality is disabled and stays that way.
#cybersecurity
From: @…
3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
Jianyao Yin, Luca Arnaboldi, Honglong Chen, Pascal Berrang
https://arxiv.org/abs/2507.10733 …
Malaysia reins in data center expansion amid power and water shortages, hindering Chinese companies that use the region as a backdoor to access US-made AI chips (Reuters)
https://www.reuters.com/world/china/malaysia-reins-d…
Replaced article(s) found for cs.AI. https://arxiv.org/list/cs.AI/new
[5/5]:
- BadPromptFL: A Novel Backdoor Threat to Prompt-based Federated Learning in Multimodal Models
Maozhen Zhang, Mengnan Zhao, Bo Wang
Lethe: Purifying Backdoored Large Language Models with Knowledge Dilution
Chen Chen, Yuchen Sun, Jiaxin Gao, Xueluan Gong, Qian Wang, Ziyao Wang, Yongsen Zheng, Kwok-Yan Lam
https://arxiv.org/abs/2508.21004
Hidden in the Noise: Unveiling Backdoors in Audio LLMs Alignment through Latent Acoustic Pattern Triggers
Liang Lin, Miao Yu, Kaiwen Luo, Yibo Zhang, Lilan Peng, Dexian Wang, Xuehai Tang, Yuanhe Zhang, Xikang Yang, Zhenhong Zhou, Kun Wang, Yang Liu
https://arxiv.org/abs/2508.02175
Coward: Toward Practical Proactive Federated Backdoor Defense via Collision-based Watermark
Wenjie Li, Siying Gu, Yiming Li, Kangjie Chen, Zhili Chen, Tianwei Zhang, Shu-Tao Xia, Dacheng Tao
https://arxiv.org/abs/2508.02115
SLIP: Soft Label Mechanism and Key-Extraction-Guided CoT-based Defense Against Instruction Backdoor in APIs
Zhengxian Wu, Juan Wen, Wanli Peng, Haowei Chang, Yinghan Zhou, Yiming Xue
https://arxiv.org/abs/2508.06153
BadTime: An Effective Backdoor Attack on Multivariate Long-Term Time Series Forecasting
Kunlan Xiang, Haomiao Yang, Meng Hao, Haoxin Wang, Shaofeng Li, Wenbo Jiang
https://arxiv.org/abs/2508.04189
BadBlocks: Low-Cost and Stealthy Backdoor Attacks Tailored for Text-to-Image Diffusion Models
Yu Pan, Jiahao Chen, Lin Wang, Bingrong Dai, Yi Du
https://arxiv.org/abs/2508.03221
BackFed: An Efficient & Standardized Benchmark Suite for Backdoor Attacks in Federated Learning
Thinh Dao, Dung Thuy Nguyen, Khoa D Doan, Kok-Seng Wong
https://arxiv.org/abs/2507.04903
DISTIL: Data-Free Inversion of Suspicious Trojan Inputs via Latent Diffusion
Hossein Mirzaei, Zeinab Taghavi, Sepehr Rezaee, Masoud Hadi, Moein Madadi, Mackenzie W. Mathis
https://arxiv.org/abs/2507.22813
ConSeg: Contextual Backdoor Attack Against Semantic Segmentation
Bilal Hussain Abbasi, Zirui Gong, Yanjun Zhang, Shang Gao, Antonio Robles-Kelly, Leo Zhang
https://arxiv.org/abs/2507.19905
Replaced article(s) found for cs.MM. https://arxiv.org/list/cs.MM/new
[1/1]:
- CLIP-Guided Backdoor Defense through Entropy-Based Poisoned Dataset Separation
Binyan Xu, Fan Yang, Xilin Dai, Di Tang, Kehuan Zhang
BadReasoner: Planting Tunable Overthinking Backdoors into Large Reasoning Models for Fun or Profit
Biao Yi, Zekun Fei, Jianing Geng, Tong Li, Lihai Nie, Zheli Liu, Yiming Li
https://arxiv.org/abs/2507.18305
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Clean-Label Physical Backdoor Attacks with Data Distillation
Thinh Dao, Khoa D Doan, Kok-Seng Wong
SPA: Towards More Stealth and Persistent Backdoor Attacks in Federated Learning
Chengcheng Zhu, Ye Li, Bosen Rao, Jiale Zhang, Yunlong Mao, Sheng Zhong
https://arxiv.org/abs/2506.20931
Isolate Trigger: Detecting and Eradicating Evade-Adaptive Backdoors
Chengrui Sun, Hua Zhang, Haoran Gao, Zian Tian, Jianjin Zhao, qi Li, Hongliang Zhu, Zongliang Shen, Shang Wang, Anmin Fu
https://arxiv.org/abs/2508.04094
Selection-Based Vulnerabilities: Clean-Label Backdoor Attacks in Active Learning
Yuhan Zhi, Longtian Wang, Xiaofei Xie, Chao Shen, Qiang Hu, Xiaohong Guan
https://arxiv.org/abs/2508.05681
Towards Stealthy and Effective Backdoor Attacks on Lane Detection: A Naturalistic Data Poisoning Approach
Yifan Liao, Yuxin Cao, Yedi Zhang, Wentao He, Yan Xiao, Xianglong Du, Zhiyong Huang, Jin Song Dong
https://arxiv.org/abs/2508.15778
CodeGuard: A Generalized and Stealthy Backdoor Watermarking for Generative Code Models
Haoxuan Li, Jiale Zhang, Xiaobing Sun, Xiapu Luo
https://arxiv.org/abs/2506.20926
SABRE-FL: Selective and Accurate Backdoor Rejection for Federated Prompt Learning
Momin Ahmad Khan, Yasra Chandio, Fatima Muhammad Anwar
https://arxiv.org/abs/2506.22506
Backdoor Attacks and Defenses in Computer Vision Domain: A Survey
Bilal Hussain Abbasi, Yanjun Zhang, Leo Zhang, Shang Gao
https://arxiv.org/abs/2509.07504 https://
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Breaking PEFT Limitations: Leveraging Weak-to-Strong Knowledge Transfer for Backdoor Attacks in LLMs
Zhao, Gan, Guo, Wu, Jia, Xiao, Nguyen, Tuan
Unlocking the Effectiveness of LoRA-FP for Seamless Transfer Implantation of Fingerprints in Downstream Models
Zhenhua Xu, Zhaokun Yan, Binhan Xu, Xin Tong, Haitao Xu, Yourong Chen, Meng Han
https://arxiv.org/abs/2509.00820
Hot-Swap MarkBoard: An Efficient Black-box Watermarking Approach for Large-scale Model Distribution
Zhicheng Zhang, Peizhuo Lv, Mengke Wan, Jiang Fang, Diandian Guo, Yezeng Chen, Yinlong Liu, Wei Ma, Jiyan Sun, Liru Geng
https://arxiv.org/abs/2507.20650
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Unified Neural Backdoor Removal with Only Few Clean Samples through Unlearning and Relearning
Nay Myat Min, Long H. Pham, Jun Sun