Untangling Program Logic with AI-Powered Symbolic Execution
Researchers are leveraging the power of large language models to enhance symbolic execution, overcoming challenges in analyzing complex software and improving program coverage.
Researchers are leveraging the power of large language models to enhance symbolic execution, overcoming challenges in analyzing complex software and improving program coverage.

Researchers have developed a new simulator to proactively analyze the security vulnerabilities inherent in serverless computing architectures.
A new protocol enables real-time verification of system behavior while safeguarding sensitive data from exposure.
A new coding scheme leverages spherical and temporal dimensions to dramatically improve the reliability of multibeam phased array systems in challenging wireless environments.

A new approach combines variational inference with homomorphic encryption to enable privacy-preserving Model Predictive Control without sacrificing real-time performance.
Researchers demonstrate a practical side-channel attack leveraging laser illumination to extract cryptographic keys from an elliptic curve accelerator.

New research systematically assesses the vulnerability of the Lilliput lightweight block cipher to differential fault analysis attacks.
![The concatenated repetition code, employing both RM(128,8) and RS( [latex]n_{RS}[/latex],16) constructions, defines the decoding frontier for HQC-128, demonstrating a pathway to robust information recovery despite potential data corruption.](https://arxiv.org/html/2603.20156v1/x1.png)
Researchers have developed a new decoding scheme for HQC, a leading post-quantum cryptography candidate, significantly improving performance and resource efficiency.

New research demonstrates the practical implementation of NIST-standardized post-quantum algorithms on severely resource-constrained ARM Cortex-M0+ microcontrollers used in many IoT devices.
A new generalization of backup control barrier functions allows for larger safe operating regions and online adaptation, improving the safety and performance of control systems with input limitations.