Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for January 2018

Total of 170 entries : 1-50 51-100 101-150 151-170
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:1801.00025 [pdf, other]
Title: A Deep Belief Network Based Machine Learning System for Risky Host Detection
Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle
Comments: 10 pages, 10 figures. The paper is accepted by IEEE Conference on Communications and Network Security 2017. However, it is not published because either of the authors showed up in the conference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[2] arXiv:1801.00129 [pdf, other]
Title: Why the Equifax Breach Should Not Have Mattered
Marten Lohstroh
Comments: Presented at the World Congress on Internet Security (WorldCIS) in Cambridge, UK on Dec 12, 2017
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3] arXiv:1801.00235 [pdf, other]
Title: Early detection of Crossfire attacks using deep learning
Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Matthias R. Brust, Ngai-Man Cheung
Comments: 5 pages, 5 this http URL at Deep Learning Security Workshop 2017, Singapore. Added references for section 2 and section 4. Added new author
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1801.00308 [pdf, other]
Title: Cyclic group based mutual authentication protocol for RFID system
Pramod Kumar Maurya, Satya Bagchi
Comments: 11 pages, 3 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1801.00528 [pdf, other]
Title: Bayesian Tabulation Audits: Explained and Extended
Ronald L. Rivest
Comments: 49 pages, 3 figures Version 2 of the paper replaces use of the bare Dirichlet model with the Dirichlet-multinomial, which is more standard and works better in edge cases, such as when the sample is very large
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Applications (stat.AP)
[6] arXiv:1801.00649 [pdf, other]
Title: Validation of Hardware Security and Trust: A Survey
Payman Behnam
Comments: 7 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1801.00694 [pdf, other]
Title: The New Threats of Information Hiding: the Road Ahead
K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, S. Zander
Comments: 9 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1801.00823 [pdf, other]
Title: MVG Mechanism: Differential Privacy under Matrix-Valued Query
Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal
Comments: Appeared in CCS'18
Journal-ref: Thee Chanyaswad, Alex Dytso, H. Vincent Poor, and Prateek Mittal. 2018. MVG Mechanism: Differential Privacy under Matrix-Valued Query. In 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS'18)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[9] arXiv:1801.00853 [pdf, other]
Title: Revisiting Email Spoofing Attacks
Hang Hu, Gang Wang
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1801.00932 [pdf, other]
Title: Power Analysis Based Side Channel Attack
Hasindu Gamaarachchi, Harsha Ganegoda
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1801.00933 [pdf, other]
Title: New Directions for Trust in the Certificate Authority Ecosystem
Jan-Ole Malchow, Benjamin Güldenring, Volker Roth
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1801.00938 [pdf, other]
Title: A Look at the Time Delays in CVSS Vulnerability Scoring
Jukka Ruohonen
Comments: this http URL
Journal-ref: Applied Computing and Informatics (published online in December 2017)
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1801.01048 [pdf, other]
Title: Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems
Chee-Wooi Ten, Koji Yamashita, Zhiyuan Yang, Athanasios V. Vasilakos, Andrew Ginter
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[14] arXiv:1801.01203 [pdf, other]
Title: Spectre Attacks: Exploiting Speculative Execution
Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1801.01207 [pdf, other]
Title: Meltdown
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1801.01314 [pdf, other]
Title: Learning automata based SVM for intrusion detection
Chong Di
Journal-ref: International Conference in Communications, Signal Processing, and Systems. CSPS 2017. Lecture Notes in Electrical Engineering, vol 463. Springer, Singapore
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17] arXiv:1801.01456 [pdf, other]
Title: Deep Random based Key Exchange protocol resisting unlimited MITM
Thibault de Valroger
Comments: 14 pages. V2: Updated reminder in the formalism of Deep Random assumption. arXiv admin note: text overlap with arXiv:1611.01683, arXiv:1507.08258
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1801.01571 [pdf, other]
Title: Robust PCA for Anomaly Detection in Cyber Networks
Randy Paffenroth, Kathleen Kay, Les Servi
Comments: 10 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1801.01594 [pdf, other]
Title: Differentially Private Releasing via Deep Generative Model (Technical Report)
Xinyang Zhang, Shouling Ji, Ting Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20] arXiv:1801.01612 [pdf, other]
Title: Secrecy by Witness-Functions under Equational Theories
Jaouhar Fattahi, Mohamed Mejri
Comments: this http URL
Journal-ref: 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2015
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1801.01633 [pdf, other]
Title: Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1801.01681 [pdf, other]
Title: VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[23] arXiv:1801.01710 [pdf, other]
Title: On the Resilience of a QKD Key Synchronization Protocol for IPsec
Stefan Marksteiner, Benjamin Rainer, Oliver Maurhart
Journal-ref: International Journal on Advances in Security, vol 9 no 3 & 4, year 2016
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1801.01932 [pdf, other]
Title: Tempest: Temporal Dynamics in Anonymity Systems
Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal
Comments: Conference version to appear at The 18th Privacy Enhancing Technologies Symposium (PETS 2018)
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1801.01970 [pdf, other]
Title: Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools
Jonathan Pan
Subjects: Cryptography and Security (cs.CR)
[26] arXiv:1801.02062 [pdf, other]
Title: SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
Md Nahid Hossain, Sadegh M Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R Sekar, Scott Stoller, VN Venkatakrishnan
Comments: 26th USENIX Security Symposium (USENIX Security 2017)
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1801.02069 [pdf, other]
Title: Privacy-Preserving Aggregate Queries for Optimal Location Selection
Emre Yilmaz, Hakan Ferhatosmanoglu, Erman Ayday, Remzi Can Aksoy
Comments: IEEE Transactions on Dependable and Secure Computing, 2017
Journal-ref: IEEE Transactions on Dependable and Secure Computing, 16(2), 329-343, 2019
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1801.02265 [pdf, other]
Title: Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright
Comments: To appear in the 2018 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018)
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1801.02318 [pdf, other]
Title: HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection
Li Chen, Salmin Sultana, Ravi Sahita
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[30] arXiv:1801.02330 [pdf, other]
Title: Evaluation of Machine Learning Algorithms for Intrusion Detection System
Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh
Journal-ref: Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International Symposium
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31] arXiv:1801.02332 [pdf, other]
Title: Behavioural Analytics: Beyond Risk-based MFA
Roy Henha Eyono
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1801.02381 [pdf, other]
Title: Benchmarking Crimes: An Emerging Threat in Systems Security
Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Gernot Heiser
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1801.02430 [pdf, other]
Title: A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition
Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi
Journal-ref: Mehran University Research Journal of Engineering and Technology, Mehran University Research Journal of Engineering and Technology, 2018, 37 (1), pp.59-68. http://publications.muet.edu.pk/index.php/muetrj/article/view/100/50
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Quantitative Methods (q-bio.QM)
[34] arXiv:1801.02440 [pdf, other]
Title: How to find a GSMem malicious activity via an AI approach
WeiJun Zhu, ShaoHuan Ban, YongWen Fan
Comments: 4 pages, 4 figures. We'd like to thank arXiv for giving us a chance to correct some typos in previous version of this paper. For examples, the words "FNR" and "FPR" in Fig.4 are marked incorrectly. And they should be replaced with each other. In addition, the experimental result obtained by a BP neural network is another typo in Fig.4. In this version, we check them carefully and correct them
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1801.02610 [pdf, other]
Title: Generating Adversarial Examples with Adversarial Networks
Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song
Comments: Accepted to IJCAI2018
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[36] arXiv:1801.02612 [pdf, other]
Title: Spatially Transformed Adversarial Examples
Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, Dawn Song
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[37] arXiv:1801.02685 [pdf, other]
Title: P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing
Ehab Zaghloul, Kai Zhou, Jian Ren
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1801.02742 [pdf, other]
Title: A Large Scale Investigation of Obfuscation Use in Google Play
Dominik Wermke, Nicolas Huaman, Yasemin Acar, Brad Reaves, Patrick Traynor, Sascha Fahl
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1801.02746 [pdf, other]
Title: Fusion of ANN and SVM Classifiers for Network Attack Detection
Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi
Comments: Accepted and presented at the 18th international conference on Sciences and Techniques of Automatic control and computer engineering STA'2017
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40] arXiv:1801.02780 [pdf, other]
Title: Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal, Mung Chiang
Comments: Extended abstract accepted for the 1st Deep Learning and Security Workshop; 5 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41] arXiv:1801.02789 [pdf, other]
Title: An efficient and secure two-party key agreement protocol based on chaotic maps
Nahid Yahyapoor, Hamed Yaghoobian, Manijeh Keshtgari
Comments: 1 figure, 20 Pages
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:1801.02837 [pdf, other]
Title: Malware detection techniques for mobile devices
Bela Amro
Comments: 11 pages, 6 figures
Journal-ref: International Journal of Mobile Network Communications & Telematics ( IJMNCT), vol 7, 2015
Subjects: Cryptography and Security (cs.CR)
[43] arXiv:1801.02850 [pdf, other]
Title: Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks
Yongshuai Liu, Jiyu Chen, Hao Chen
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[44] arXiv:1801.02950 [pdf, other]
Title: Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly
Comments: 1ST Deep Learning and Security Workshop (co-located with the 39th IEEE Symposium on Security and Privacy)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[45] arXiv:1801.03074 [pdf, other]
Title: Game of Drones - Detecting Streamed POI from Encrypted FPV Channel
Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici
Comments: this https URL
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1801.03218 [pdf, other]
Title: IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals
Zheng Zhou, Weiming Zhang, Nenghai Yu
Comments: 11 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1801.03239 [pdf, other]
Title: Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[48] arXiv:1801.03294 [pdf, other]
Title: A First Look at Identity Management Schemes on the Blockchain
Paul Dunphy, Fabien A.P. Petitcolas
Comments: To appear in IEEE Security and Privacy Magazine special issue on "Blockchain Security and Privacy" in 2018
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:1801.03528 [pdf, other]
Title: Applications of Blockchain Technology beyond Cryptocurrency
Mahdi H. Miraz, Maaruf Ali
Journal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-6, Vol. 2, No. 1, 1st January 2018, Available: http://aetic.theiaer.org/archive/v2n1/p1.pdf
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1801.03597 [pdf, other]
Title: Secrecy by Witness-Functions on Increasing Protocols
Jaouhar Fattahi, Mohamed Mejri, Hanane Houmani
Journal-ref: The 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2014
Subjects: Cryptography and Security (cs.CR)
Total of 170 entries : 1-50 51-100 101-150 151-170
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack