Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎲 Fuzzing
fuzzer, AFL, libFuzzer, coverage-guided fuzzing, crash triage
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3171
posts in
14.3
ms
Quantamination
: Dynamic
Quantization
Leaks Your Data Across the Batch
🛡️
Exploit Mitigations
arxiv.org
·
21h
Bug-Report-Driven Fault
Localization
: Industrial Benchmarking and Lesson Learned at
ABB
Robotics
⚡
JIT Exploitation
arxiv.org
·
1d
LLM-Guided Issue Generation from
Uncovered
Code
Segments
⚡
JIT Exploitation
arxiv.org
·
21h
Well-Conditioned
Oblivious
Perturbations
in Linear Space
🧩
Intermediate Representation
arxiv.org
·
2d
Stealthy
Backdoor
Attacks against LLMs Based on Natural Style Triggers
🔌
Hardware Security
arxiv.org
·
6d
AI
Observability
for Large Language Model Systems: A Multi-Layer Analysis of Monitoring Approaches from Confidence
Calibration
to Infrastructure Tracing
🔣
Type Systems
arxiv.org
·
21h
RouteGuard
: Internal-Signal Detection of Skill
Poisoning
in LLM Agents
🛡️
Exploit Mitigations
arxiv.org
·
2d
Test-Time Safety
Alignment
✅
Formal Verification
arxiv.org
·
21h
SAFEdit
: Does Multi-Agent Decomposition Resolve the Reliability Challenges of
Instructed
Code Editing?
⚡
JIT Exploitation
arxiv.org
·
1d
A-IC3
: Learning-Guided Adaptive
Inductive
Generalization for Hardware Model Checking
✅
Formal Verification
arxiv.org
·
6d
One Word at a Time:
Incremental
Completion
Decomposition
Breaks LLM Safety
🧩
Intermediate Representation
arxiv.org
·
21h
Layerwise
Convergence Fingerprints for Runtime
Misbehavior
Detection in Large Language Models
💾
Binary Analysis
arxiv.org
·
2d
What Is the Cost of Energy Monitoring? An Empirical Study on the
Overhead
of
RAPL-Based
Tools
🔒
CFI
arxiv.org
·
21h
Breaking MCP with
Function
Hijacking
Attacks: Novel Threats for
Function
Calling and Agentic Models
⚡
JIT Exploitation
arxiv.org
·
6d
Enforcing
Benign
Trajectories: A Behavioral Firewall for Structured-Workflow AI Agents
🌊
Dataflow Analysis
arxiv.org
·
21h
AsmRAG
: LLM-Driven Malware Detection by Retrieving
Functionally
Similar Assembly Code
💾
Binary Analysis
arxiv.org
·
2d
eDySec
: A Deep Learning-based Explainable Dynamic Analysis Framework for Detecting Malicious Packages in
PyPI
Ecosystem
💾
Binary Analysis
arxiv.org
·
21h
Vulnerability
Identification
by
Harnessing
Inter-connected Multi-Source Information
🛡️
Vulnerability Research
arxiv.org
·
2d
Black-Box Skill Stealing Attack from
Proprietary
LLM Agents: An
Empirical
Study
🐧
Kernel Exploitation
arxiv.org
·
6d
From Prompt Risk to Response Risk:
Paired
Analysis of Safety
Behavior
of Large Language Model
🛡️
Exploit Mitigations
arxiv.org
·
21h
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help