Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Language-based security
information-flow
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
26556
posts in
36.7
ms
CI-Work: Benchmarking
Contextual
Integrity
in Enterprise LLM Agents
🛡️
Proof-Carrying Data
arxiv.org
·
1d
Additive
Cryptography for
TLS
🌐
DNS Security
snkth.com
·
13h
DCP-AI
– Portable
accountability
layer for AI agents (post-quantum)
🌐
NetworkProtocols
github.com
·
3d
·
Hacker News
No
Exploit
Needed: How
Attackers
Walk Through the Front Door via Identity-Based Attacks
🎯
Threat Hunting
sans.org
·
1d
deadpixi/nondescript
: A simple embedded programming language
🔧
Binary Parsers
github.com
·
2d
·
Lobsters
An AI Agent Execution
Environment
to
Safeguard
User Data
🛡️
Preservation Proofs
arxiv.org
·
3d
Reinforcing privacy reasoning in LLMs via
normative
simulacra
from fiction
🛡️
Differential Privacy
arxiv.org
·
1d
False
Security Confidence in
Benign
LLM Code Generation
🧪
CBOR Fuzzing
arxiv.org
·
4d
Towards Secure
Logging
:
Characterizing
and Benchmarking
Logging
Code Security Issues with LLMs
⚡
Proof Automation
arxiv.org
·
2d
Understanding Secret
Leakage
Risks in Code LLMs: A
Tokenization
Perspective
💻
Local LLMs
arxiv.org
·
4d
Stealthy
Backdoor
Attacks against LLMs Based on Natural Style Triggers
🛡️
WASM Sandboxing
arxiv.org
·
1d
Making
TransactionIsolation
Checking
Practical
✅
Format Verification
arxiv.org
·
2d
Symbolic
Guardrails
for Domain-Specific Agents: Stronger Safety and Security Guarantees Without
Sacrificing
Utility
🧮
Z3 Solver
arxiv.org
·
5d
Behavioral
Consistency and Transparency Analysis on Large Language Model API
Gateways
🌐
Protocol Synthesis
arxiv.org
·
1d
Breaking Bad:
Interpretability-Based
Safety
Audits
of State-of-the-Art LLMs
⚡
Proof Automation
arxiv.org
·
1d
Compositional security
definitions
for higher-order where
declassification
🎯
Dependent Preservation
arxiv.org
·
4d
SoK
: Security of Autonomous LLM Agents in Agentic
Commerce
🌳
Archive Merkle Trees
arxiv.org
·
5d
·
Hacker News
Towards Optimal Agentic
Architectures
for
Offensive
Security Tasks
🎯
Threat Hunting
arxiv.org
·
3d
Interactive Safety Verification of Distributed
Protocols
by
Inductive
Proof Decomposition
🌐
Protocol Synthesis
arxiv.org
·
3d
Systematic
Capability
Benchmarking of Frontier Large Language Models for Offensive Cyber Tasks
🎯
Threat Hunting
arxiv.org
·
4d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help