Poisoning the Well: Backdoors in Code-Generating AI

A new study reveals how malicious actors can subtly compromise AI code generators by injecting vulnerabilities into the data retrieval process.

A new study reveals how malicious actors can subtly compromise AI code generators by injecting vulnerabilities into the data retrieval process.

New research clarifies the fundamental limits of securely distributing quantum information among multiple parties.
Researchers have uncovered a fundamental duality principle within sheaf codes that links seemingly disparate parameters, paving the way for more efficient quantum error correction strategies.
![The system leverages an ancilla qubit to measure [latex]ZZZZ[/latex] interactions, integrating out spins based on interaction count and weighting combined interactions by spacetime locality-a process susceptible to errors that manifest as sign flips on the underlying spin model, particularly impacting both [latex]HXH\_X[/latex] and [latex]HZH\_Z[/latex] components.](https://arxiv.org/html/2512.21991v1/x2.png)
A new framework connects quantum error correction to the principles of statistical mechanics, offering a fresh perspective on building resilient quantum circuits.

A new architecture combining atomic qubits and photonic links promises to overcome distance limitations in long-range quantum communication.
![The research constructs and categorizes quantum codes-derived from three classical codes-into four distinct types, demonstrating that these codes are structured around [latex]ZZ[/latex]- and [latex]XX[/latex]-check blocks, with the number of variations within each type-indicated by a multiplicative factor-highlighting the diversity achievable through this construction method.](https://arxiv.org/html/2512.22116v1/x1.png)
Researchers have developed a generalized approach to creating quantum error-correcting codes by leveraging the power of multiple classical codes.

A new model provides a practical framework for optimizing key rotation intervals when using Quantum Key Distribution alongside conventional block ciphers.
![The study demonstrates that interlayer excitons in heterostructures of 2H-MoSe2/WSe2 exhibit helicity-dependent photoluminescence, revealing distinct excitation pathways: direct electronic transitions following resonant excitation of individual layer excitons or interlayer singlets, and chiral-phonon-assisted excitation which transfers pseudo-angular momentum to the excitonic system, ultimately influencing the formation of interlayer excitons with specific polarization characteristics [latex]IX^{-}_{T}[/latex].](https://arxiv.org/html/2512.21125v1/Figures/Article_Fig3-V3_bis.png)
Researchers have discovered a way to selectively excite and control the chirality of interlayer excitons trapped within moiré superlattices using chiral optical phonons.
As data centers grow in scale, a novel approach to grid resilience using braking resistors is emerging to address challenges posed by increasing inverter-based resources.

Despite advancements in security protocols, this review demonstrates that passive attacks targeting 5G and future networks remain a tangible threat, particularly through analysis of control and physical layer signals.