Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for January 2018

Total of 170 entries : 1-100 101-170
Showing up to 100 entries per page: fewer | more | all
[1] arXiv:1801.00025 [pdf, other]
Title: A Deep Belief Network Based Machine Learning System for Risky Host Detection
Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle
Comments: 10 pages, 10 figures. The paper is accepted by IEEE Conference on Communications and Network Security 2017. However, it is not published because either of the authors showed up in the conference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[2] arXiv:1801.00129 [pdf, other]
Title: Why the Equifax Breach Should Not Have Mattered
Marten Lohstroh
Comments: Presented at the World Congress on Internet Security (WorldCIS) in Cambridge, UK on Dec 12, 2017
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3] arXiv:1801.00235 [pdf, other]
Title: Early detection of Crossfire attacks using deep learning
Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Matthias R. Brust, Ngai-Man Cheung
Comments: 5 pages, 5 this http URL at Deep Learning Security Workshop 2017, Singapore. Added references for section 2 and section 4. Added new author
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1801.00308 [pdf, other]
Title: Cyclic group based mutual authentication protocol for RFID system
Pramod Kumar Maurya, Satya Bagchi
Comments: 11 pages, 3 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1801.00528 [pdf, other]
Title: Bayesian Tabulation Audits: Explained and Extended
Ronald L. Rivest
Comments: 49 pages, 3 figures Version 2 of the paper replaces use of the bare Dirichlet model with the Dirichlet-multinomial, which is more standard and works better in edge cases, such as when the sample is very large
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Applications (stat.AP)
[6] arXiv:1801.00649 [pdf, other]
Title: Validation of Hardware Security and Trust: A Survey
Payman Behnam
Comments: 7 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1801.00694 [pdf, other]
Title: The New Threats of Information Hiding: the Road Ahead
K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, S. Zander
Comments: 9 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1801.00823 [pdf, other]
Title: MVG Mechanism: Differential Privacy under Matrix-Valued Query
Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal
Comments: Appeared in CCS'18
Journal-ref: Thee Chanyaswad, Alex Dytso, H. Vincent Poor, and Prateek Mittal. 2018. MVG Mechanism: Differential Privacy under Matrix-Valued Query. In 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS'18)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[9] arXiv:1801.00853 [pdf, other]
Title: Revisiting Email Spoofing Attacks
Hang Hu, Gang Wang
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1801.00932 [pdf, other]
Title: Power Analysis Based Side Channel Attack
Hasindu Gamaarachchi, Harsha Ganegoda
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1801.00933 [pdf, other]
Title: New Directions for Trust in the Certificate Authority Ecosystem
Jan-Ole Malchow, Benjamin Güldenring, Volker Roth
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1801.00938 [pdf, other]
Title: A Look at the Time Delays in CVSS Vulnerability Scoring
Jukka Ruohonen
Comments: this http URL
Journal-ref: Applied Computing and Informatics (published online in December 2017)
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1801.01048 [pdf, other]
Title: Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems
Chee-Wooi Ten, Koji Yamashita, Zhiyuan Yang, Athanasios V. Vasilakos, Andrew Ginter
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[14] arXiv:1801.01203 [pdf, other]
Title: Spectre Attacks: Exploiting Speculative Execution
Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1801.01207 [pdf, other]
Title: Meltdown
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1801.01314 [pdf, other]
Title: Learning automata based SVM for intrusion detection
Chong Di
Journal-ref: International Conference in Communications, Signal Processing, and Systems. CSPS 2017. Lecture Notes in Electrical Engineering, vol 463. Springer, Singapore
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17] arXiv:1801.01456 [pdf, other]
Title: Deep Random based Key Exchange protocol resisting unlimited MITM
Thibault de Valroger
Comments: 14 pages. V2: Updated reminder in the formalism of Deep Random assumption. arXiv admin note: text overlap with arXiv:1611.01683, arXiv:1507.08258
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1801.01571 [pdf, other]
Title: Robust PCA for Anomaly Detection in Cyber Networks
Randy Paffenroth, Kathleen Kay, Les Servi
Comments: 10 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1801.01594 [pdf, other]
Title: Differentially Private Releasing via Deep Generative Model (Technical Report)
Xinyang Zhang, Shouling Ji, Ting Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20] arXiv:1801.01612 [pdf, other]
Title: Secrecy by Witness-Functions under Equational Theories
Jaouhar Fattahi, Mohamed Mejri
Comments: this http URL
Journal-ref: 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2015
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1801.01633 [pdf, other]
Title: Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1801.01681 [pdf, other]
Title: VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[23] arXiv:1801.01710 [pdf, other]
Title: On the Resilience of a QKD Key Synchronization Protocol for IPsec
Stefan Marksteiner, Benjamin Rainer, Oliver Maurhart
Journal-ref: International Journal on Advances in Security, vol 9 no 3 & 4, year 2016
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1801.01932 [pdf, other]
Title: Tempest: Temporal Dynamics in Anonymity Systems
Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal
Comments: Conference version to appear at The 18th Privacy Enhancing Technologies Symposium (PETS 2018)
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1801.01970 [pdf, other]
Title: Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools
Jonathan Pan
Subjects: Cryptography and Security (cs.CR)
[26] arXiv:1801.02062 [pdf, other]
Title: SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
Md Nahid Hossain, Sadegh M Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R Sekar, Scott Stoller, VN Venkatakrishnan
Comments: 26th USENIX Security Symposium (USENIX Security 2017)
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1801.02069 [pdf, other]
Title: Privacy-Preserving Aggregate Queries for Optimal Location Selection
Emre Yilmaz, Hakan Ferhatosmanoglu, Erman Ayday, Remzi Can Aksoy
Comments: IEEE Transactions on Dependable and Secure Computing, 2017
Journal-ref: IEEE Transactions on Dependable and Secure Computing, 16(2), 329-343, 2019
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1801.02265 [pdf, other]
Title: Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright
Comments: To appear in the 2018 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018)
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1801.02318 [pdf, other]
Title: HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection
Li Chen, Salmin Sultana, Ravi Sahita
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[30] arXiv:1801.02330 [pdf, other]
Title: Evaluation of Machine Learning Algorithms for Intrusion Detection System
Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh
Journal-ref: Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International Symposium
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31] arXiv:1801.02332 [pdf, other]
Title: Behavioural Analytics: Beyond Risk-based MFA
Roy Henha Eyono
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1801.02381 [pdf, other]
Title: Benchmarking Crimes: An Emerging Threat in Systems Security
Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Gernot Heiser
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1801.02430 [pdf, other]
Title: A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition
Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi
Journal-ref: Mehran University Research Journal of Engineering and Technology, Mehran University Research Journal of Engineering and Technology, 2018, 37 (1), pp.59-68. http://publications.muet.edu.pk/index.php/muetrj/article/view/100/50
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Quantitative Methods (q-bio.QM)
[34] arXiv:1801.02440 [pdf, other]
Title: How to find a GSMem malicious activity via an AI approach
WeiJun Zhu, ShaoHuan Ban, YongWen Fan
Comments: 4 pages, 4 figures. We'd like to thank arXiv for giving us a chance to correct some typos in previous version of this paper. For examples, the words "FNR" and "FPR" in Fig.4 are marked incorrectly. And they should be replaced with each other. In addition, the experimental result obtained by a BP neural network is another typo in Fig.4. In this version, we check them carefully and correct them
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1801.02610 [pdf, other]
Title: Generating Adversarial Examples with Adversarial Networks
Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song
Comments: Accepted to IJCAI2018
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[36] arXiv:1801.02612 [pdf, other]
Title: Spatially Transformed Adversarial Examples
Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, Dawn Song
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[37] arXiv:1801.02685 [pdf, other]
Title: P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing
Ehab Zaghloul, Kai Zhou, Jian Ren
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1801.02742 [pdf, other]
Title: A Large Scale Investigation of Obfuscation Use in Google Play
Dominik Wermke, Nicolas Huaman, Yasemin Acar, Brad Reaves, Patrick Traynor, Sascha Fahl
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1801.02746 [pdf, other]
Title: Fusion of ANN and SVM Classifiers for Network Attack Detection
Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi
Comments: Accepted and presented at the 18th international conference on Sciences and Techniques of Automatic control and computer engineering STA'2017
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40] arXiv:1801.02780 [pdf, other]
Title: Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal, Mung Chiang
Comments: Extended abstract accepted for the 1st Deep Learning and Security Workshop; 5 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41] arXiv:1801.02789 [pdf, other]
Title: An efficient and secure two-party key agreement protocol based on chaotic maps
Nahid Yahyapoor, Hamed Yaghoobian, Manijeh Keshtgari
Comments: 1 figure, 20 Pages
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:1801.02837 [pdf, other]
Title: Malware detection techniques for mobile devices
Bela Amro
Comments: 11 pages, 6 figures
Journal-ref: International Journal of Mobile Network Communications & Telematics ( IJMNCT), vol 7, 2015
Subjects: Cryptography and Security (cs.CR)
[43] arXiv:1801.02850 [pdf, other]
Title: Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks
Yongshuai Liu, Jiyu Chen, Hao Chen
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[44] arXiv:1801.02950 [pdf, other]
Title: Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly
Comments: 1ST Deep Learning and Security Workshop (co-located with the 39th IEEE Symposium on Security and Privacy)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[45] arXiv:1801.03074 [pdf, other]
Title: Game of Drones - Detecting Streamed POI from Encrypted FPV Channel
Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici
Comments: this https URL
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1801.03218 [pdf, other]
Title: IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals
Zheng Zhou, Weiming Zhang, Nenghai Yu
Comments: 11 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1801.03239 [pdf, other]
Title: Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[48] arXiv:1801.03294 [pdf, other]
Title: A First Look at Identity Management Schemes on the Blockchain
Paul Dunphy, Fabien A.P. Petitcolas
Comments: To appear in IEEE Security and Privacy Magazine special issue on "Blockchain Security and Privacy" in 2018
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:1801.03528 [pdf, other]
Title: Applications of Blockchain Technology beyond Cryptocurrency
Mahdi H. Miraz, Maaruf Ali
Journal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-6, Vol. 2, No. 1, 1st January 2018, Available: http://aetic.theiaer.org/archive/v2n1/p1.pdf
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1801.03597 [pdf, other]
Title: Secrecy by Witness-Functions on Increasing Protocols
Jaouhar Fattahi, Mohamed Mejri, Hanane Houmani
Journal-ref: The 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2014
Subjects: Cryptography and Security (cs.CR)
[51] arXiv:1801.03688 [pdf, other]
Title: Repairing the Faure-Loidreau Public-Key Cryptosystem
Antonia Wachter-Zeh, Sven Puchinger, Julian Renner
Comments: 5 pages, accepted at IEEE International Symposium on Information Theory 2018
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[52] arXiv:1801.03758 [pdf, other]
Title: Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
K.Vishnu Priyanka, M.Gowthami, O.Susmitha, G.Prathyusha, Naresh Babu Muppalaneni
Subjects: Cryptography and Security (cs.CR)
[53] arXiv:1801.03984 [pdf, other]
Title: A Brain-Inspired Trust Management Model to Assure Security in a Cloud based IoT Framework for Neuroscience Applications
Mufti Mahmud, M. Shamim Kaiser, M. Mostafizur Rahman, M. Arifur Rahman, Antesar Shabut, Shamim Al-Mamun, Amir Hussain
Comments: 17 pages, 10 figures, 2 tables
Journal-ref: Cognitive Computation, 2018
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Neurons and Cognition (q-bio.NC)
[54] arXiv:1801.03998 [pdf, other]
Title: Decentralization in Bitcoin and Ethereum Networks
Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, Emin Gün Sirer
Comments: Financial Cryptography and Data Security 2018
Journal-ref: Financial Cryptography and Data Security (FC) 2018
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:1801.04084 [pdf, other]
Title: Speculose: Analyzing the Security Implications of Speculative Execution in CPUs
Giorgi Maisuradze, Christian Rossow
Subjects: Cryptography and Security (cs.CR)
[56] arXiv:1801.04372 [pdf, other]
Title: SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications
Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng
Comments: This is the extended technical report version of our SCLib paper accepted by ACM CODASPY 2018 (this http URL)
Subjects: Cryptography and Security (cs.CR)
[57] arXiv:1801.04416 [pdf, other]
Title: MOF-BC: A Memory Optimized and Flexible BlockChain for Large Scale Networks
Ali Dorri, Salil S. Kanhere, Raja Jurdak
Subjects: Cryptography and Security (cs.CR)
[58] arXiv:1801.04473 [pdf, other]
Title: Channel Whispering: a Protocol for Physical Layer Group Key Generation. Application to IR-UWB through Deconvolution
Iulia Tunaru, Benoît Denis, Régis Perrier, Bernard Uguen
Comments: 21 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[59] arXiv:1801.04565 [pdf, other]
Title: Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead
Eslam Elnikety, Deepak Garg, Peter Druschel
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[60] arXiv:1801.04569 [pdf, other]
Title: Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Luca Allodi, Sandro Etalle
Comments: Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[61] arXiv:1801.04609 [pdf, other]
Title: Tyche: Risk-Based Permissions for Smart Home Platforms
Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash
Subjects: Cryptography and Security (cs.CR)
[62] arXiv:1801.04703 [pdf, other]
Title: Attack Potential in Impact and Complexity
Luca Allodi, Fabio Massacci
Journal-ref: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017)
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:1801.04725 [pdf, other]
Title: Secure k-NN as a Service Over Encrypted Data in Multi-User Setting
Gagandeep Singh, Akshar Kaul, Sameep Mehta
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:1801.04961 [pdf, other]
Title: Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits
Rajit Karmakar, Santanu Chatopadhyay, Rohit Kapur
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:1801.05459 [pdf, other]
Title: Considerations regarding security issues impact on systems availability
Emil Pricop, Sanda Florentina Mihalache, Nicolae Paraschiv, Jaouhar Fattahi, Florin Zamfir
Comments: Paper accepted for 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI 2016) Proceedings, Ploiesti, Romania
Journal-ref: 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:1801.05507 [pdf, other]
Title: Gazelle: A Low Latency Framework for Secure Neural Network Inference
Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
Subjects: Cryptography and Security (cs.CR)
[67] arXiv:1801.05583 [pdf, other]
Title: Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices
Tom Mahler, Nir Nissim, Erez Shalom, Israel Goldenberg, Guy Hassman, Arnon Makori, Itzik Kochav, Yuval Elovici, Yuval Shahar
Comments: Presented at the RSNA Conference, November 2017, Chicago, IL, United States
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:1801.05659 [pdf, other]
Title: On Decoding Schemes for the MDPC-McEliece Cryptosystem
Hannes Bartz, Gianluigi Liva
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:1801.05764 [pdf, other]
Title: M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Nikolaos Alexopoulos, Sheikh Mahbub Habib, Steffen Schulz, Max Mühlhäuser
Comments: 18 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[70] arXiv:1801.05863 [pdf, other]
Title: Integrating Remote Attestation with Transport Layer Security
Thomas Knauth, Michael Steiner, Somnath Chakrabarti, Li Lei, Cedric Xing, Mona Vij
Subjects: Cryptography and Security (cs.CR)
[71] arXiv:1801.05915 [pdf, other]
Title: Security in Mobile Edge Caching with Reinforcement Learning
Liang Xiao, Xiaoyue Wan, Canhuang Dai, Xiaojiang Du, Xiang Chen, Mohsen Guizani
Subjects: Cryptography and Security (cs.CR)
[72] arXiv:1801.05958 [pdf, other]
Title: On a Generic Security Game Model
Vivek Shandilya, Sajjan Shiva
Comments: 31 pages
Journal-ref: Shandilya, V. and Shiva, S. (2017) On a Generic Security Game Model. Int. J. Communications , Network and System Sciences , 10, 142-172
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[73] arXiv:1801.05974 [pdf, other]
Title: Privacy-preserving Data Splitting: A Combinatorial Approach
Oriol Farràs, Jordi Ribes-González, Sara Ricci
Comments: 22 pages, 5 tables, 1 figure
Subjects: Cryptography and Security (cs.CR)
[74] arXiv:1801.06270 [pdf, other]
Title: Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach
Minghui Min, Liang Xiao, Caixia Xie, Mohammad Hajimirsadeghi, Narayan B. Mandayam
Subjects: Cryptography and Security (cs.CR)
[75] arXiv:1801.06275 [pdf, other]
Title: IoT Security Techniques Based on Machine Learning
Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu
Subjects: Cryptography and Security (cs.CR)
[76] arXiv:1801.06423 [pdf, other]
Title: Minimum spanning tree release under differential privacy constraints
Rafael Pinot
Comments: Thesis of Master Degree of Statistics, Université Paris 6 Pierre et Marie Curie
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST); Machine Learning (stat.ML)
[77] arXiv:1801.06730 [pdf, other]
Title: Web password recovery --- a necessary evil?
Fatma Al Maqbali, Chris J Mitchell
Comments: v2. Revised version
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:1801.06822 [pdf, other]
Title: ERIM: Secure, Efficient In-process Isolation with Memory Protection Keys (MPK)
Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg
Comments: USENIX Security Symposium 2019
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:1801.07090 [pdf, other]
Title: An Overview of Wireless IoT Protocol Security in the Smart Home Domain
Stefan Marksteiner, Víctor Juan Expósito Jiménez, Heribert Vallant, Herwig Zeiner
Comments: 8 pages, 4 figures
Journal-ref: Proceedings of the Joint 13th CTTE and 10th CMI Conference on Internet of Things Business Models, Users, and Networks, 2017
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:1801.07132 [pdf, other]
Title: SecSens: Secure State Estimation with Application to Localization and Time Synchronization
Amr Alanwar, Bernhard Etzlinger, Henrique Ferraz, Joao Hespanha, Mani Srivastava
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO); Systems and Control (eess.SY)
[81] arXiv:1801.07379 [pdf, other]
Title: Secure Mobile Crowdsensing with Deep Learning
Liang Xiao, Donghua Jiang, Dongjin Xu, Ning An
Comments: 7 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[82] arXiv:1801.07397 [pdf, other]
Title: HCIC: Hardware-assisted Control-flow Integrity Checking
Jiliang Zhang, Binhang Qi, Gang Qu
Comments: 14 pages
Journal-ref: IEEE Internet of Things Journal.(2018) 1-14
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[83] arXiv:1801.07447 [pdf, other]
Title: Block arrivals in the Bitcoin blockchain
R. Bowden, H.P. Keeler, A.E. Krzesinski, P.G. Taylor
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:1801.07501 [pdf, other]
Title: Deanonymizing Tor hidden service users through Bitcoin transactions analysis
Husam Al Jawaheri, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad
Subjects: Cryptography and Security (cs.CR)
[85] arXiv:1801.07518 [pdf, other]
Title: Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication
Adam J. Aviv, Ravi Kuber
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[86] arXiv:1801.07555 [pdf, other]
Title: Shake-n-Shack: Enabling Secure Data Exchange Between Smart Wearables via Handshakes
Yiran Shen, Fengyuan Yang, Bowen Du, Weitao Xu, Chengwen Luo, Hongkai Wen
Comments: To appear in PerCom'18
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:1801.07561 [pdf, other]
Title: A Multi-layer Recursive Residue Number System
Henk D.L. Hollmann, Ronald Rietman, Sebastiaan de Hoogh, Ludo M.G.M. Tolhuizen, Paul Gorissen
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[88] arXiv:1801.07702 [pdf, other]
Title: Post-Quantum Cryptography: Riemann Primitives and Chrysalis
Ian Malloy
Comments: Originally available on ResearchGate and now archived
Subjects: Cryptography and Security (cs.CR)
[89] arXiv:1801.07741 [pdf, other]
Title: Who Killed My Parked Car?
Kyong-Tak Cho, Yuseung Kim, Kang G. Shin
Subjects: Cryptography and Security (cs.CR)
[90] arXiv:1801.07759 [pdf, other]
Title: Whose Hands Are in the Finnish Cookie Jar?
Jukka Ruohonen, Ville Leppänen
Comments: Proceedings of the European Intelligence and Security Informatics Conference (EISIC 2017)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[91] arXiv:1801.07800 [pdf, other]
Title: qrypt0 - encrypted short messages exchanged between offline computers
Andreas O. Bender
Comments: 6 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[92] arXiv:1801.07814 [pdf, other]
Title: Blockchain moderated by empty blocks to reduce the energetic impact of crypto-moneys
Philippe Jacquet, Bernard Mans
Comments: preliminary version appeared in CryBlock'2019, The IEEE 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems (co-located with INFOCOM 2019), April 29th, 2019. Paris, France. Green Mining: toward a less energetic impact of cryptocurrencies, P. Jacquet and B. Mans, IEEE Press, 6 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[93] arXiv:1801.07844 [pdf, other]
Title: Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation
San Ling, Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
Comments: 24 pages
Subjects: Cryptography and Security (cs.CR)
[94] arXiv:1801.07965 [pdf, other]
Title: Winning the Caucus Race: Continuous Leader Election via Public Randomness
Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn
Subjects: Cryptography and Security (cs.CR)
[95] arXiv:1801.07983 [pdf, other]
Title: Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect
Wanpeng Li, Chris J Mitchell, Thomas Chen
Comments: 18 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[96] arXiv:1801.08064 [pdf, other]
Title: SoK: Uncentralisable Ledgers and their Impact on Voting Systems
Lionel Dricot, Olivier Pereira
Comments: 10 pages + biblio
Subjects: Cryptography and Security (cs.CR)
[97] arXiv:1801.08090 [pdf, other]
Title: An Algebraic Approach for Reasoning About Information Flow
Arthur Américo, Mário S. Alvim, Annabelle McIver
Subjects: Cryptography and Security (cs.CR)
[98] arXiv:1801.08115 [pdf, other]
Title: Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned
Guillermo Suarez-Tangil, Gianluca Stringhini
Comments: A shorter version of this paper appears in IEEE Transactions on Dependable and Secure Computing. This is a more detailed version, extended from the pre-print
Subjects: Cryptography and Security (cs.CR)
[99] arXiv:1801.08154 [pdf, other]
Title: On the Gold Standard for Security of Universal Steganography
Sebastian Berndt, Maciej Liśkiewicz
Comments: EUROCRYPT 2018, llncs style
Subjects: Cryptography and Security (cs.CR)
[100] arXiv:1801.08185 [pdf, other]
Title: Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack
Dean Wasil, Omar Nakhila, Salih Safa Bacanli, Cliff Zou, Damla Turgut
Comments: 5 pages, 6 figures, presented on IEEE MASS 2017
Journal-ref: IEEE International Conference on Mobile Ad-hoc Sensor Systems(IEEE MASS 2017), pp.550-554, October 2017
Subjects: Cryptography and Security (cs.CR)
Total of 170 entries : 1-100 101-170
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack