Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2017

Total of 161 entries : 1-25 26-50 51-75 76-100 101-125 126-150 151-161
Showing up to 25 entries per page: fewer | more | all
[101] arXiv:1708.08475 [pdf, other]
Title: How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services
Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz
Comments: Accepted by ACM CCS 2017
Subjects: Cryptography and Security (cs.CR)
[102] arXiv:1708.08510 [pdf, other]
Title: Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security
Peter Snyder, Cynthia Taylor, Chris Kanich
Subjects: Cryptography and Security (cs.CR)
[103] arXiv:1708.08519 [pdf, other]
Title: Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Panagiotis Kintis (1), Najmeh Miramirkhani (2), Charles Lever (1), Yizheng Chen (1), Rosa Romero-Gómez (1), Nikolaos Pitropakis (3), Nick Nikiforakis (2), Manos Antonakakis (1) ((1) Georgia Institute of Technology, (2) Stony Brook University, (3) London South Bank University)
Comments: ACM CCS 17
Subjects: Cryptography and Security (cs.CR)
[104] arXiv:1708.08542 [pdf, other]
Title: Verified Correctness and Security of mbedTLS HMAC-DRBG
Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel
Comments: Appearing in CCS '17
Subjects: Cryptography and Security (cs.CR)
[105] arXiv:1708.08596 [pdf, other]
Title: Nonmalleable Information Flow: Technical Report
Ethan Cecchetti, Andrew C. Myers, Owen Arden
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[106] arXiv:1708.08725 [pdf, other]
Title: Machine Learning Approach for Detection of nonTor Traffic
Elike Hodo, Xavier Bellekens, Ephraim Iorkyase, Andrew Hamilton, Christos Tachtatzis, Robert Atkinson
Comments: 6 pages, 4 figures, Accepted and Presented in ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security
Journal-ref: Information 2018, 9(9), 231
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[107] arXiv:1708.08759 [pdf, other]
Title: Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith
Subjects: Cryptography and Security (cs.CR)
[108] arXiv:1708.08786 [pdf, other]
Title: Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs
Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow
Subjects: Cryptography and Security (cs.CR)
[109] arXiv:1708.08895 [pdf, other]
Title: Cryptographically Secure Information Flow Control on Key-Value Stores
Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong
Comments: Full version of conference paper appearing in CCS 2017
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[110] arXiv:1708.08972 [pdf, other]
Title: Node Authentication Using BLS Signature in Distributed PKI Based MANETS
N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah, Y. V. Subba Rao
Journal-ref: International Journal of Network Security & Its Applications (IJNSA) Vol.9, No.4, July 2017
Subjects: Cryptography and Security (cs.CR)
[111] arXiv:1708.09051 [pdf, other]
Title: Investigation and Automating Extraction of Thumbnails Produced by Image viewers
Wybren van der Meer, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, M-Tahar Kechadi
Subjects: Cryptography and Security (cs.CR)
[112] arXiv:1708.09053 [pdf, other]
Title: Increasing digital investigator availability through efficient workflow management and automation
Ronald In de Braekt, Nhien-An Le-Khac, Jason Farina, Mark Scanlon, M-Tahar Kechadi
Subjects: Cryptography and Security (cs.CR)
[113] arXiv:1708.09056 [pdf, other]
Title: Practical Attacks Against Graph-based Clustering
Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou
Comments: ACM CCS 2017
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[114] arXiv:1708.09058 [pdf, other]
Title: POISED: Spotting Twitter Spam Off the Beaten Paths
Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, Jose Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[115] arXiv:1708.09099 [pdf, other]
Title: Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations
Yi Han, Sriharsha Etigowni, Hua Li, Saman Zonouz, Athina Petropulu
Journal-ref: CCS '17, October 30-November 3, 2017, Dallas, TX, USA
Subjects: Cryptography and Security (cs.CR)
[116] arXiv:1708.09114 [pdf, other]
Title: FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution
Grant Hernandez, Farhaan Fowze, Dave Tian, Tuba Yavuz, Kevin R. B. Butler
Comments: 18 pages, CCS 2017
Subjects: Cryptography and Security (cs.CR)
[117] arXiv:1708.09333 [pdf, other]
Title: Fluid Passwords - Mitigating the effects of password leaks at the user level
Michael Farcasin, Akhileshwar Guli, Eric Chan-Tin
Subjects: Cryptography and Security (cs.CR)
[118] arXiv:1708.09334 [pdf, other]
Title: Tug-of-War: Observations on Unified Content Handling
Theofilos Petsios, Adrian Tang, Dimitris Mitropoulos, Salvatore Stolfo, Angelos D. Keromytis, Suman Jana
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[119] arXiv:1708.09366 [pdf, other]
Title: Secure Pick Up: Implicit Authentication When You Start Using the Smartphone
Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, Ruby B. Lee
Comments: Published on ACM Symposium on Access Control Models and Technologies (SACMAT) 2017
Subjects: Cryptography and Security (cs.CR)
[120] arXiv:1708.09445 [pdf, other]
Title: Coppersmith's lattices and "focus groups": an attack on small-exponent RSA
Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan
Comments: 21 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[121] arXiv:1708.09535 [pdf, other]
Title: A secure blind watermarking scheme based on DCT domain of the scrambled image
Lei Chen, Shihong Wang
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[122] arXiv:1708.09537 [pdf, other]
Title: DolphinAtack: Inaudible Voice Commands
Guoming Zhang, Chen Yan, Xiaoyu Ji, Taimin Zhang, Tianchen Zhang, Wenyuan Xu
Comments: 15 pages, 17 figures
Journal-ref: published on ACM Conference on Computer and Communications Security (CCS) 2017
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:1708.09538 [pdf, other]
Title: A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for Cache-Side-Channel Elimination in Clouds
Read Sprabery (1), Konstantin Evchenko (1), Abhilash Raj (2), Rakesh B. Bobba (2), Sibin Mohan (1), Roy H. Campbell (1) ((1) University of Illinois Urbana-Champaign, (2) Oregon State University)
Subjects: Cryptography and Security (cs.CR)
[124] arXiv:1708.09721 [pdf, other]
Title: Blockchain Based Intelligent Vehicle Data sharing Framework
Madhusudan Singh, Shiho Kim
Comments: 4 pages, 5 figures. arXiv admin note: substantial text overlap with arXiv:1707.07442
Subjects: Cryptography and Security (cs.CR)
[125] arXiv:1708.09754 [pdf, other]
Title: Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning
Wei-Han Lee, Ruby B. Lee
Comments: Published on the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017. arXiv admin note: substantial text overlap with arXiv:1703.03523
Subjects: Cryptography and Security (cs.CR)
Total of 161 entries : 1-25 26-50 51-75 76-100 101-125 126-150 151-161
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack