Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for May 2017

Total of 122 entries : 1-50 51-100 101-122
Showing up to 50 entries per page: fewer | more | all
[51] arXiv:1705.06715 [pdf, other]
Title: Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System
Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer
Comments: International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[52] arXiv:1705.06784 [pdf, other]
Title: Detect Kernel-Mode Rootkits via Real Time Logging & Controlling Memory Access
Igor Korkin, Satoshi Tanda
Comments: Proceedings of the 12th annual Conference on Digital Forensics, Security and Law (CDFSL), Embry-Riddle Aeronautical University, Daytona Beach, Florida, USA. May 15-16 2017. 31 pages, 14 figures, 3 tables, 101 references
Subjects: Cryptography and Security (cs.CR)
[53] arXiv:1705.06805 [pdf, other]
Title: A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic
Noah Apthorpe, Dillon Reisman, Nick Feamster
Comments: 6 pages, 2 figures, appears in Workshop on Data and Algorithmic Transparency (DAT '16)
Subjects: Cryptography and Security (cs.CR)
[54] arXiv:1705.06809 [pdf, other]
Title: Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers
Noah Apthorpe, Dillon Reisman, Nick Feamster
Comments: 6 pages, 3 figures, appears in Workshop on Technology and Consumer Protection (ConPro '17)
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:1705.06903 [pdf, other]
Title: Optimized Certificate Revocation List Distribution for Secure V2X Communications
Giovanni Rigazzi, Andrea Tassi, Robert J. Piechocki, Theo Tryfonas, Andrew Nix
Comments: Accepted for publication in IEEE VTC Fall 2017 conference proceedings
Subjects: Cryptography and Security (cs.CR)
[56] arXiv:1705.07065 [pdf, other]
Title: Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS)
Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[57] arXiv:1705.07069 [pdf, other]
Title: CacheShuffle: An Oblivious Shuffle Algorithm Using Caches
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
Comments: 29 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS)
[58] arXiv:1705.07121 [pdf, other]
Title: BAMHealthCloud: A Biometric Authentication and Data Management System for Healthcare Data in Cloud
Kashish A. Shakil, Farhana J. Zareen, Mansaf Alam, Suraiya Jabin
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC)
[59] arXiv:1705.07289 [pdf, other]
Title: Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter
Comments: Accepted to ACM CCS 2017
Subjects: Cryptography and Security (cs.CR)
[60] arXiv:1705.07375 [pdf, other]
Title: Detecting Recycled Commodity SoCs: Exploiting Aging-Induced SRAM PUF Unreliability
Yansong Gao, Hua Ma, Said F. Al-Sarawi, Derek Abbott, Damith C. Ranasinghe
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:1705.07512 [pdf, other]
Title: Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization
Mathias Lecuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen
Subjects: Cryptography and Security (cs.CR)
[62] arXiv:1705.07535 [pdf, other]
Title: Evading Classifiers by Morphing in the Dark
Hung Dang, Yue Huang, Ee-Chien Chang
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:1705.07663 [pdf, other]
Title: LOGAN: Membership Inference Attacks Against Generative Models
Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro
Journal-ref: Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2019, Issue 1
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64] arXiv:1705.07807 [pdf, other]
Title: Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs
Anupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen
Comments: extended CCS 2017 camera-ready: several new discussions, and complexity results added to appendix
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[65] arXiv:1705.08279 [pdf, other]
Title: Countermeasure against Side-Channel Attack in Shared Memory of TrustZone
Na-Young Ahn, Dong Hoon Lee
Comments: 13 pages, 16 figures, PLOSONE 2017. arXiv admin note: text overlap with arXiv:1212.1651 by other authors
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:1705.08378 [pdf, other]
Title: Detecting Adversarial Image Examples in Deep Networks with Adaptive Noise Reduction
Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiaofeng Wang
Comments: 14 pages, this http URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[67] arXiv:1705.08522 [pdf, other]
Title: Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash
Comments: published at IEEE Security and Privacy Magazine, July 2017: Systems Attacks and Defenses
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:1705.08568 [pdf, other]
Title: The Future of Ad Blocking: An Analytical Framework and New Techniques
Grant Storey, Dillon Reisman, Jonathan Mayer, Arvind Narayanan
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:1705.08779 [pdf, other]
Title: Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms
Simon Oya, Carmela Troncoso, Fernando Pérez-González
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)
[70] arXiv:1705.08889 [pdf, other]
Title: PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme -- Konzept und rechtliche Zulässigkeit
Max Maass, Anne Laubach, Dominik Herrmann
Comments: Extended version of a paper accepted to Recht und Technik 2017. Partially a translation of arXiv:1705.05139. 13 pages in German
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[71] arXiv:1705.08963 [pdf, other]
Title: DeepSecure: Scalable Provably-Secure Deep Learning
Bita Darvish Rouhani, M. Sadegh Riazi, Farinaz Koushanfar
Subjects: Cryptography and Security (cs.CR)
[72] arXiv:1705.08994 [pdf, other]
Title: On the Privacy of the Opal Data Release: A Response
Hassan Jameel Asghar, Paul Tyler, Mohamed Ali Kaafar
Subjects: Cryptography and Security (cs.CR)
[73] arXiv:1705.09044 [pdf, other]
Title: Detecting Malignant TLS Servers Using Machine Learning Techniques
Sankalp Bagaria, R. Balaji, B. S. Bindhumadhava
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[74] arXiv:1705.09064 [pdf, other]
Title: MagNet: a Two-Pronged Defense against Adversarial Examples
Dongyu Meng, Hao Chen
Comments: Accepted at the ACM Conference on Computer and Communications Security (CCS), 2017
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[75] arXiv:1705.09165 [pdf, other]
Title: Bunshin: Compositing Security Mechanisms through Diversification (with Appendix)
Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee
Comments: To be appeared in Proceedings of the 2017 USENIX Annual Technical Conference (ATC)
Subjects: Cryptography and Security (cs.CR)
[76] arXiv:1705.09404 [pdf, other]
Title: Confidentiality-Preserving Publish/Subscribe: A Survey
Emanuel Onica, Pascal Felber, Hugues Mercier, Etienne Rivière
Journal-ref: ACM Computing Surveys, Volume 49, Issue 2, November 2016
Subjects: Cryptography and Security (cs.CR)
[77] arXiv:1705.09460 [pdf, other]
Title: DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback
Alfonso Iacovazzi, Sanat Sarda, Daniel Frassinelli, Yuval Elovici
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:1705.09819 [pdf, other]
Title: Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions
B. B. Gupta, Nalin Asanka Gamagedara Arachchilage, Konstantinos E. Psannis
Comments: 32, Telecommunication Systems, Springer, 2017
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:1705.09823 [pdf, other]
Title: Adversarial Learning: A Critical Review and Active Learning Study
David J. Miller, Xinyi Hu, Zhicong Qiu, George Kesidis
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:1705.09872 [pdf, other]
Title: An Efficient Keyless Fragmentation Algorithm for Data Protection
Katarzyna Kapusta, Gerard Memmi, Hassan Noura
Subjects: Cryptography and Security (cs.CR)
[81] arXiv:1705.09936 [pdf, other]
Title: Fast and Accurate Likelihood Ratio Based Biometric Comparison in the Encrypted Domain
Joep Peeters, Andreas Peter, Raymond N.J. Veldhuis
Subjects: Cryptography and Security (cs.CR)
[82] arXiv:1705.10085 [pdf, other]
Title: Temporal anomaly detection: calibrating the surprise
Eyal Gutflaish, Aryeh Kontorovich, Sivan Sabato, Ofer Biller, Oded Sofer
Comments: AAAI-19
Journal-ref: Proceedings of the AAAI Conference on Artificial Intelligence, 33(01), 3755-3762 (2019)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[83] arXiv:1705.10295 [pdf, other]
Title: HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:1705.10482 [pdf, other]
Title: A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications
Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[85] arXiv:1705.10669 [pdf, other]
Title: SecureTime: Secure Multicast Time Synchronization
Robert Annessi, Joachim Fabini, Tanja Zseby
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[86] arXiv:1705.10686 [pdf, other]
Title: Feature Squeezing Mitigates and Detects Carlini/Wagner Adversarial Examples
Weilin Xu, David Evans, Yanjun Qi
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[87] arXiv:1705.10747 [pdf, other]
Title: Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit
Nilesh Chakraborty, Samrat Mondal
Subjects: Cryptography and Security (cs.CR)
[88] arXiv:1705.10771 [pdf, other]
Title: On The Limitation of Some Fully Observable Multiple Session Resilient Shoulder Surfing Defense Mechanisms
Nilesh Chakraborty, Samrat Mondal
Subjects: Cryptography and Security (cs.CR)
[89] arXiv:1705.00139 (cross-list from quant-ph) [pdf, other]
Title: On Statistically-Secure Quantum Homomorphic Encryption
Ching-Yi Lai, Kai-Min Chung
Comments: 7 pages. IQP+ and IQPP are removed since IQP+ is equivalent to IQP if input states are restricted to the product of plus states
Journal-ref: Quant. Inf. Comput., vol. 18, no. 9&10, pp. 0785-0794, 2018
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[90] arXiv:1705.00370 (cross-list from cs.NI) [pdf, other]
Title: Software-Defined Adversarial Trajectory Sampling
Kashyap Thimmaraju, Liron Schiff, Stefan Schmid
Comments: SDN Security, Trajectory Sampling, Forwarding Attacks, Malicious Router, Malicious Data Plane, Compromised Data Plane, Data Plane Security
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[91] arXiv:1705.01085 (cross-list from cs.NI) [pdf, other]
Title: When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance
Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui
Comments: 10 pages, double column
Journal-ref: IEEE Conference on Communications and Network Security (CNS), Oct 2017, pp. 1-9
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[92] arXiv:1705.02316 (cross-list from math.NT) [pdf, other]
Title: Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography
Travis Scholl
Comments: 18 pages
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[93] arXiv:1705.02749 (cross-list from cs.CY) [pdf, other]
Title: A study of cyber security in hospitality industry- threats and countermeasures: case study in Reno, Nevada
Neda Shabani
Comments: 47 page
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[94] arXiv:1705.02828 (cross-list from cs.DS) [pdf, other]
Title: Faster tuple lattice sieving using spherical locality-sensitive filters
Thijs Laarhoven
Comments: 12 pages + references, 2 figures. Subsumed/merged into Cryptology ePrint Archive 2017/228, available at this https URL
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[95] arXiv:1705.02900 (cross-list from cs.CV) [pdf, other]
Title: Keeping the Bad Guys Out: Protecting and Vaccinating Deep Learning with JPEG Compression
Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Fred Hohman, Li Chen, Michael E. Kounavis, Duen Horng Chau
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[96] arXiv:1705.03345 (cross-list from cs.SI) [pdf, other]
Title: Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali
Comments: In 28th ACM Conference on Hypertext and Social Media (ACM HyperText 2017)
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[97] arXiv:1705.04148 (cross-list from quant-ph) [pdf, other]
Title: Device-independent Randomness Amplification and Privatization
Max Kessler, Rotem Arnon
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[98] arXiv:1705.05264 (cross-list from cs.LG) [pdf, other]
Title: Extending Defensive Distillation
Nicolas Papernot, Patrick McDaniel
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[99] arXiv:1705.05491 (cross-list from cs.DC) [pdf, other]
Title: Distributed Statistical Machine Learning in Adversarial Settings: Byzantine Gradient Descent
Yudong Chen, Lili Su, Jiaming Xu
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[100] arXiv:1705.05684 (cross-list from cs.DC) [pdf, other]
Title: A lightweight MapReduce framework for secure processing with SGX
Rafael Pires, Daniel Gavril, Pascal Felber, Emanuel Onica, Marcelo Pasin
Comments: 8 pages WACC@CCGRID International Workshop on Assured Cloud Computing and QoS aware Big Data
Journal-ref: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
Total of 122 entries : 1-50 51-100 101-122
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack