Renaud Bidou

367 Followers
38 Following
381 Posts
IT Security and Machine Learning, mostly...
Cybersecurity AI: A Game-Theoretic AI for Guiding Attack and Defense
https://arxiv.org/pdf/2601.05887
Can it Resolve DOOM? Game Engine in 2,000 DNS Records – blog.rice.is

To a guy like me, Crazy Frog is just a frog.

Postural Manipulation: How Semantically Benign Context Changes What an LLM Is Before It Acts
https://shapingrooms.com/postural-manipulation-paper.pdf
Computer control of a machine for exploring Mars, John McCarthy, June 1964
https://fermatslibrary.com/s/computer-control-of-a-machine-for-exploring-mars
Fermat's Library | Computer control of a machine for exploring Mars annotated/explained version.

Fermat's Library is a platform for illuminating academic papers.

Fermat's Library
Reverse CAPTCHA: Evaluating LLM Susceptibility to Invisible Unicode Instruction Injection
https://www.moltwire.com/research/reverse-captcha-zw-steganography
Reverse CAPTCHA: Evaluating LLM Susceptibility to Invisible Unicode Instruction Injection

A systematic evaluation of five frontier models across two encoding schemes, four hint levels, and tool use ablation — 8,308 graded outputs with full statistical analysis

Moltwire
Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs
https://arxiv.org/pdf/2512.09742
It's Owl in the Numbers: Token Entanglement in Subliminal Learning
https://owls.baulab.info/
It's Owl in the Numbers: Token Entanglement in Subliminal Learning

Entangled tokens help explain subliminal learning.

First verified SHA-256 second-preimage collision: Structural analysis of the W-schedule vulnerability
https://osf.io/2gdzq/files/dqghk
OSF

Cross-Service Threat Intelligence in LLM Services using Privacy-Preserving Fingerprints
https://arxiv.org/pdf/2509.05608v1
PerfektBlue - Universal 1-click Exploit to Pwn Automotive Industry
https://powerofcommunity.net/2025/slide/m-f2d1f.pdf