Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2017

Total of 161 entries : 26-75 51-100 101-150 151-161
Showing up to 50 entries per page: fewer | more | all
[26] arXiv:1708.02749 [pdf, other]
Title: Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance
Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[27] arXiv:1708.02888 [pdf, other]
Title: Multi-message Authentication over Noisy Channel with Secure Channel Codes
Dajiang Chen, Ning Zhang, Nan Cheng, Kuan Zhang, Kan Yang, Zhiguang Qin, Xuemin Shen
Comments: 15 Pages, 15figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[28] arXiv:1708.02921 [pdf, other]
Title: Asymmetric Quantum Codes on Toric Surfaces
Johan P. Hansen
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG); Quantum Physics (quant-ph)
[29] arXiv:1708.03346 [pdf, other]
Title: Lempel-Ziv Jaccard Distance, an Effective Alternative to Ssdeep and Sdhash
Edward Raff, Charles K. Nicholas
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:1708.03387 [pdf, other]
Title: Multiparty Routing: Secure Routing for Mixnets
Fatemeh Shirazi, Elena Andreeva, Markulf Kohlweiss, Claudia Diaz
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1708.03468 [pdf, other]
Title: Key exchange with the help of a public ledger
Thanh Bui, Tuomas Aura
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1708.03513 [pdf, other]
Title: Early Stage Malware Prediction Using Recurrent Neural Networks
Matilda Rhode, Pete Burnap, Kevin Jones
Journal-ref: Computers & Security, Volume 77, August 2018, Pages 578-594
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1708.03520 [pdf, other]
Title: Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones
Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:1708.03766 [pdf, other]
Title: The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor
Comments: 55 pages
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1708.03778 [pdf, other]
Title: Chainspace: A Sharded Smart Contracts Platform
Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:1708.03807 [pdf, other]
Title: Principle of Need-to-Act
Ashish Kundu
Comments: 2 pages
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:1708.03978 [pdf, other]
Title: Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric
Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1708.04027 [pdf, other]
Title: Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
Comments: 24 pages, 14 figures
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1708.04278 [pdf, other]
Title: Sampling High Throughput Data for Anomaly Detection of Data-Base Activity
Hagit Grushka-Cohen, Oded Sofer, Ofer Biller, Michael Dymshits, Lior Rokach, Bracha Shapira
Comments: Proceedings of the 11th Pre-ICIS Workshop on Information Security and Privacy, Dublin, Ireland December 10, 2016
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40] arXiv:1708.04495 [pdf, other]
Title: Analysing Relations involving small number of Monomials in AES S- Box
Riddhi Ghosal
Comments: 5 pages, 1 table
Subjects: Cryptography and Security (cs.CR)
[41] arXiv:1708.04517 [pdf, other]
Title: Privacy-Preserving Mechanisms for Parametric Survival Analysis with Weibull Distribution
Thông T. Nguyên, Siu Cheung Hui
Comments: 8 pages, Trustcom17
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[42] arXiv:1708.04571 [pdf, other]
Title: A Machine Learning Based Intrusion Detection System for Software Defined 5G Network
Jiaqi Li, Zhifeng Zhao, Rongpeng Li
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[43] arXiv:1708.04726 [pdf, other]
Title: Privacy-Enabled Biometric Search
Scott Streit, Brian Streit, Stephen Suffian
Comments: 5 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[44] arXiv:1708.04748 [pdf, other]
Title: When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies
Steven Goldfeder, Harry Kalodner, Dillon Reisman, Arvind Narayanan
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:1708.04749 [pdf, other]
Title: Greedy and Evolutionary Algorithms for Mining Relationship-Based Access Control Policies
Thang Bui, Scott D. Stoller, Jiajie Li
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1708.04774 [pdf, other]
Title: CLIMEX: A Wireless Physical Layer Security Protocol Based on Clocked Impulse Exchanges
Satyam Dwivedi, John Olof Nilsson, Panos Papadimitratos, Peter Händel
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1708.04798 [pdf, other]
Title: Design-Time Quantification of Integrity in Cyber-Physical-Systems
Eric Rothstein Morris, Carlos G. Murguia, Martín Ochoa
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:1708.04866 [pdf, other]
Title: Economic Factors of Vulnerability Trade and Exploitation
Luca Allodi
Comments: 17 pages, 11 figures, 14 tables
Journal-ref: In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). ACM, New York, NY, USA, 1483-1499
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:1708.04871 [pdf, other]
Title: SMAUG: Secure Mobile Authentication Using Gestures
Christian A. Gorke, Frederik Armknecht
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1708.04963 [pdf, other]
Title: Introducing the truly chaotic finite state machines and their applications in security field
Christophe Guyeux, Qianxue Wang, Xiole Fang, Jacques Bahi
Subjects: Cryptography and Security (cs.CR)
[51] arXiv:1708.05044 [pdf, other]
Title: Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic
Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, Nick Feamster
Comments: 16 pages, 9 figures. This article draws heavily from arXiv:1705.06805 and arXiv:1705.06809
Subjects: Cryptography and Security (cs.CR)
[52] arXiv:1708.05050 [pdf, other]
Title: AntibIoTic: Protecting IoT Devices Against DDoS Attacks
Michele De Donno, Nicola Dragoni, Alberto Giaretta, Manuel Mazzara
Journal-ref: Proceedings of 5th International Conference in Software Engineering for Defence Applications. SEDA 2016. Advances in Intelligent Systems and Computing, vol 717. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[53] arXiv:1708.05124 [pdf, other]
Title: Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
Junqing Zhang, Trung Q. Duong, Roger Woods, Alan Marshall
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[54] arXiv:1708.05185 [pdf, other]
Title: Predicting Block Halving Party Times
Meni Rosenfeld
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:1708.05207 [pdf, other]
Title: Learning Universal Adversarial Perturbations with Generative Models
Jamie Hayes, George Danezis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[56] arXiv:1708.05374 [pdf, other]
Title: Medical Cyber-Physical Systems Development: A Forensics-Driven Approach
George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo
Comments: This is the pre-print version of a paper presented at the 2nd International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017)
Subjects: Cryptography and Security (cs.CR)
[57] arXiv:1708.05417 [pdf, other]
Title: Serverless Protocols for Inventory and Tracking with a UAV
Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette
Comments: 11 pages, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17)
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[58] arXiv:1708.05462 [pdf, other]
Title: Non-Malleable Codes with Leakage and Applications to Secure Communication
Fuchun Lin, Reihaneh Safavi-Naini, Mahdi Cheraghchi, Huaxiong Wang
Subjects: Cryptography and Security (cs.CR)
[59] arXiv:1708.05477 [pdf, other]
Title: WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks
Arash Shaghaghi, Mohamed Ali Kaafar, Sanjay Jha
Comments: Accepted to ASIACCS - Final version, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ACM, 2017
Subjects: Cryptography and Security (cs.CR)
[60] arXiv:1708.05680 [pdf, other]
Title: Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3
Kevin Atighehchi, Alexis Bonnecaze
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[61] arXiv:1708.05732 [pdf, other]
Title: Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, Serge Chaumette
Comments: 12 Pages, 7 Figures, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE); Robotics (cs.RO)
[62] arXiv:1708.05811 [pdf, other]
Title: Secure Search on the Cloud via Coresets and Sketches
Adi Akavia, Dan Feldman, Hayim Shaul
Comments: 25 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:1708.05844 [pdf, other]
Title: NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform
Paulo Matias, Pedro Barbosa, Thiago Cardoso, Diego Mariano, Diego Aranha
Comments: Accepted version
Journal-ref: IEEE Security & Privacy, vol. 16, no. 6, pp. 42-51, Nov.-Dec. 2018
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:1708.05907 [pdf, other]
Title: Electricity Theft Detection using Machine Learning
Niklas Dahringer
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[65] arXiv:1708.06131 [pdf, other]
Title: Evasion Attacks against Machine Learning at Test Time
Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli
Comments: In this paper, in 2013, we were the first to introduce the notion of evasion attacks (adversarial examples) created with high confidence (instead of minimum-distance misclassifications), and the notion of surrogate learners (substitute models). These two concepts are now widely re-used in developing attacks against deep networks (even if not always referring to the ideas reported in this work). arXiv admin note: text overlap with arXiv:1401.7727
Journal-ref: ECML PKDD, Part III, vol. 8190, LNCS, pp. 387--402. Springer, 2013
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66] arXiv:1708.06145 [pdf, other]
Title: Knock Knock, Who's There? Membership Inference on Aggregate Location Data
Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro
Journal-ref: Proceedings of the 25th Network and Distributed System Security Symposium (NDSS 2018)
Subjects: Cryptography and Security (cs.CR)
[67] arXiv:1708.06199 [pdf, other]
Title: Algorithm Substitution Attacks from a Steganographic Perspective
Sebastian Berndt, Maciej Liskiewicz
Comments: CCS 2017, 12 pages, double-column; fixed a typo in the advantage-definitions; removed the dependency on the random-oracle-model for the upper bound on the rate
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:1708.06308 [pdf, other]
Title: Detecting Location Fraud in Indoor Mobile Crowdsensing
Qiang Xu, Rong Zheng, Ezzeldin Tahoun
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:1708.06376 [pdf, other]
Title: Automated Website Fingerprinting through Deep Learning
Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, Wouter Joosen
Comments: To appear in the 25th Symposium on Network and Distributed System Security (NDSS 2018)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70] arXiv:1708.06384 [pdf, other]
Title: PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage
Gaurav Srivastava, Kunal Bhuwalka, Swarup Kumar Sahoo, Saksham Chitkara, Kevin Ku, Matt Fredrikson, Jason Hong, Yuvraj Agarwal
Subjects: Cryptography and Security (cs.CR)
[71] arXiv:1708.06437 [pdf, other]
Title: Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
Milad Tatar Mamaghani, Ali Kuhestani, Kai-Kit Wong
Comments: 14 pages, 6 figures, Submitted to IEEE Transactions on Vehicular Technology
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
[72] arXiv:1708.06508 [pdf, other]
Title: IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images
Athanasios Papadopoulos, Toan Nguyen, Emre Durmus, Nasir Memon
Comments: 15 pages, 10 figures, IEEE Transactions on Information Forensics and Security, 2017
Subjects: Cryptography and Security (cs.CR)
[73] arXiv:1708.06525 [pdf, other]
Title: Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song
Comments: ACM CCS 17
Subjects: Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[74] arXiv:1708.06562 [pdf, other]
Title: Secure two-way communication via a wireless powered untrusted relay and friendly jammer
Milad Tatar Mamaghani, Abbas Mohammadi, Phee Lep Yeoh, Ali Kuhestani
Comments: 6 pages, 5 figures, IEEE Global Communications Conference 2017 CISS (Accepted)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[75] arXiv:1708.06674 [pdf, other]
Title: Locally Differentially Private Heavy Hitter Identification
Tianhao Wang, Ninghui Li, Somesh Jha
Subjects: Cryptography and Security (cs.CR)
Total of 161 entries : 26-75 51-100 101-150 151-161
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack