MIT Open Access Articles: Recent submissions
Now showing items 136-138 of 55010
-
Securing Cryptographic Software via Typed Assembly Language
(ACM|Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025-11-22)Authors of cryptographic software are well aware that their code should not leak secrets through its timing behavior, and, until 2018, they believed that following industry-standard constant-time coding guidelines was ... -
Study on LLMs for Promptagator-Style Dense Retriever Training
(ACM|Proceedings of the 34th ACM International Conference on Information and Knowledge Management, 2025-11-10)Promptagator demonstrated that Large Language Models (LLMs) with few-shot prompts can be used as task-specific query generators for fine-tuning domain-specialized dense retrieval models. However, the original Promptagator ... -
One-Sided Bounded Noise: Theory, Optimization Algorithms and Applications
(ACM|Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025-11-22)We investigate the optimal trade-off between utility and privacy using one-sided perturbation. Unlike conventional privacy-preserving statistical releases, randomization for obfuscating side-channel information is often ...


