Virtual Switch Vulnerability: When Network Traffic Leaks Secrets
New research reveals that Open vSwitch, a cornerstone of modern virtualization, is susceptible to remote side-channel attacks that could compromise network security and VM isolation.
New research reveals that Open vSwitch, a cornerstone of modern virtualization, is susceptible to remote side-channel attacks that could compromise network security and VM isolation.
New research delves into the subtle conditions that govern how the convex hulls of randomly distributed points transition from sparse to full configurations.
![The quantum dimer model, studied on a weighted triangular lattice and formalized as [latex] Eq. (5) [/latex], demonstrates a continuous phase transition-from a disordered ‘spin liquid’ to an ordered ‘columnar’ state-reflected in the macroscopic behavior of classical double-dimer coverings, where the prevalence of large loops indicates disorder ([latex]\alpha < 3[/latex]) and small loops/edges signify order ([latex]\alpha > 3[/latex]), offering an intuitive link between classical loop behavior and the observed vison correlator behavior within the quantum system.](https://arxiv.org/html/2601.15377v1/x3.png)
Researchers have pinpointed a topological phase transition in a quantum dimer model, revealing insights into exotic states of matter and their underlying physics.
New research leverages the AdS/CFT correspondence to calculate correlation functions in defect conformal field theories, offering a powerful tool for understanding strongly coupled systems.
![The framework dissects software vulnerabilities by translating virtual CPU states and function descriptions - termed Reflections and Introspections - into actionable bug data, uniquely identified and categorized as [latex] Reached \ \& \ Triggered [/latex], then standardizing this information alongside fuzzing campaign timing data to visually report performance metrics and expose underlying system behavior.](https://arxiv.org/html/2601.15774v1/x5.png)
Researchers have developed a comprehensive framework to rigorously evaluate the effectiveness of firmware fuzzers, tackling critical challenges in embedded system security.

A new study reveals how inaccuracies in speech-to-text transcription can significantly hinder understanding of spoken code, especially for learners and in multilingual settings.
New research establishes a rigorous mathematical link between microscopic fluctuations and the macroscopic rates of transitions between metastable states, offering insights into phenomena ranging from quantum chromodynamics to condensed matter physics.
![Despite being misled by manipulated reports of [latex] \text{voltage} [/latex] at point A and [latex] \text{current} [/latex] at point B, including a false claim of charging at 1330V and 1330A when actually receiving 448V and 87A, VehicleX continued to charge normally, demonstrating a vulnerability exploitable through real-time, interactive manipulation of communicated demand responses.](https://arxiv.org/html/2601.15515v1/x6.png)
New research reveals a successful wireless Man-in-the-Middle attack against CCS EV charging stations, highlighting critical vulnerabilities in current security protocols.

A new algorithm overcomes reconstruction artifacts in digital holographic microscopy, enabling accurate quantitative phase imaging of large tissue samples.

A new review reveals that determining if a specific record was used to train a model from tabular data is surprisingly difficult, despite growing concerns about data privacy.