Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for January 2018

Total of 170 entries
Showing up to 2000 entries per page: fewer | more | all
[1] arXiv:1801.00025 [pdf, other]
Title: A Deep Belief Network Based Machine Learning System for Risky Host Detection
Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle
Comments: 10 pages, 10 figures. The paper is accepted by IEEE Conference on Communications and Network Security 2017. However, it is not published because either of the authors showed up in the conference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[2] arXiv:1801.00129 [pdf, other]
Title: Why the Equifax Breach Should Not Have Mattered
Marten Lohstroh
Comments: Presented at the World Congress on Internet Security (WorldCIS) in Cambridge, UK on Dec 12, 2017
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3] arXiv:1801.00235 [pdf, other]
Title: Early detection of Crossfire attacks using deep learning
Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Matthias R. Brust, Ngai-Man Cheung
Comments: 5 pages, 5 this http URL at Deep Learning Security Workshop 2017, Singapore. Added references for section 2 and section 4. Added new author
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1801.00308 [pdf, other]
Title: Cyclic group based mutual authentication protocol for RFID system
Pramod Kumar Maurya, Satya Bagchi
Comments: 11 pages, 3 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1801.00528 [pdf, other]
Title: Bayesian Tabulation Audits: Explained and Extended
Ronald L. Rivest
Comments: 49 pages, 3 figures Version 2 of the paper replaces use of the bare Dirichlet model with the Dirichlet-multinomial, which is more standard and works better in edge cases, such as when the sample is very large
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Applications (stat.AP)
[6] arXiv:1801.00649 [pdf, other]
Title: Validation of Hardware Security and Trust: A Survey
Payman Behnam
Comments: 7 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1801.00694 [pdf, other]
Title: The New Threats of Information Hiding: the Road Ahead
K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, S. Zander
Comments: 9 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1801.00823 [pdf, other]
Title: MVG Mechanism: Differential Privacy under Matrix-Valued Query
Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal
Comments: Appeared in CCS'18
Journal-ref: Thee Chanyaswad, Alex Dytso, H. Vincent Poor, and Prateek Mittal. 2018. MVG Mechanism: Differential Privacy under Matrix-Valued Query. In 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS'18)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[9] arXiv:1801.00853 [pdf, other]
Title: Revisiting Email Spoofing Attacks
Hang Hu, Gang Wang
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1801.00932 [pdf, other]
Title: Power Analysis Based Side Channel Attack
Hasindu Gamaarachchi, Harsha Ganegoda
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1801.00933 [pdf, other]
Title: New Directions for Trust in the Certificate Authority Ecosystem
Jan-Ole Malchow, Benjamin Güldenring, Volker Roth
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1801.00938 [pdf, other]
Title: A Look at the Time Delays in CVSS Vulnerability Scoring
Jukka Ruohonen
Comments: this http URL
Journal-ref: Applied Computing and Informatics (published online in December 2017)
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1801.01048 [pdf, other]
Title: Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems
Chee-Wooi Ten, Koji Yamashita, Zhiyuan Yang, Athanasios V. Vasilakos, Andrew Ginter
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[14] arXiv:1801.01203 [pdf, other]
Title: Spectre Attacks: Exploiting Speculative Execution
Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1801.01207 [pdf, other]
Title: Meltdown
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1801.01314 [pdf, other]
Title: Learning automata based SVM for intrusion detection
Chong Di
Journal-ref: International Conference in Communications, Signal Processing, and Systems. CSPS 2017. Lecture Notes in Electrical Engineering, vol 463. Springer, Singapore
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17] arXiv:1801.01456 [pdf, other]
Title: Deep Random based Key Exchange protocol resisting unlimited MITM
Thibault de Valroger
Comments: 14 pages. V2: Updated reminder in the formalism of Deep Random assumption. arXiv admin note: text overlap with arXiv:1611.01683, arXiv:1507.08258
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1801.01571 [pdf, other]
Title: Robust PCA for Anomaly Detection in Cyber Networks
Randy Paffenroth, Kathleen Kay, Les Servi
Comments: 10 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1801.01594 [pdf, other]
Title: Differentially Private Releasing via Deep Generative Model (Technical Report)
Xinyang Zhang, Shouling Ji, Ting Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20] arXiv:1801.01612 [pdf, other]
Title: Secrecy by Witness-Functions under Equational Theories
Jaouhar Fattahi, Mohamed Mejri
Comments: this http URL
Journal-ref: 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2015
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1801.01633 [pdf, other]
Title: Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1801.01681 [pdf, other]
Title: VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[23] arXiv:1801.01710 [pdf, other]
Title: On the Resilience of a QKD Key Synchronization Protocol for IPsec
Stefan Marksteiner, Benjamin Rainer, Oliver Maurhart
Journal-ref: International Journal on Advances in Security, vol 9 no 3 & 4, year 2016
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1801.01932 [pdf, other]
Title: Tempest: Temporal Dynamics in Anonymity Systems
Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal
Comments: Conference version to appear at The 18th Privacy Enhancing Technologies Symposium (PETS 2018)
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1801.01970 [pdf, other]
Title: Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools
Jonathan Pan
Subjects: Cryptography and Security (cs.CR)
[26] arXiv:1801.02062 [pdf, other]
Title: SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
Md Nahid Hossain, Sadegh M Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R Sekar, Scott Stoller, VN Venkatakrishnan
Comments: 26th USENIX Security Symposium (USENIX Security 2017)
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1801.02069 [pdf, other]
Title: Privacy-Preserving Aggregate Queries for Optimal Location Selection
Emre Yilmaz, Hakan Ferhatosmanoglu, Erman Ayday, Remzi Can Aksoy
Comments: IEEE Transactions on Dependable and Secure Computing, 2017
Journal-ref: IEEE Transactions on Dependable and Secure Computing, 16(2), 329-343, 2019
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1801.02265 [pdf, other]
Title: Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright
Comments: To appear in the 2018 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018)
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1801.02318 [pdf, other]
Title: HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection
Li Chen, Salmin Sultana, Ravi Sahita
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[30] arXiv:1801.02330 [pdf, other]
Title: Evaluation of Machine Learning Algorithms for Intrusion Detection System
Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh
Journal-ref: Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International Symposium
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31] arXiv:1801.02332 [pdf, other]
Title: Behavioural Analytics: Beyond Risk-based MFA
Roy Henha Eyono
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1801.02381 [pdf, other]
Title: Benchmarking Crimes: An Emerging Threat in Systems Security
Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Gernot Heiser
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1801.02430 [pdf, other]
Title: A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition
Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi
Journal-ref: Mehran University Research Journal of Engineering and Technology, Mehran University Research Journal of Engineering and Technology, 2018, 37 (1), pp.59-68. http://publications.muet.edu.pk/index.php/muetrj/article/view/100/50
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Quantitative Methods (q-bio.QM)
[34] arXiv:1801.02440 [pdf, other]
Title: How to find a GSMem malicious activity via an AI approach
WeiJun Zhu, ShaoHuan Ban, YongWen Fan
Comments: 4 pages, 4 figures. We'd like to thank arXiv for giving us a chance to correct some typos in previous version of this paper. For examples, the words "FNR" and "FPR" in Fig.4 are marked incorrectly. And they should be replaced with each other. In addition, the experimental result obtained by a BP neural network is another typo in Fig.4. In this version, we check them carefully and correct them
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1801.02610 [pdf, other]
Title: Generating Adversarial Examples with Adversarial Networks
Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song
Comments: Accepted to IJCAI2018
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[36] arXiv:1801.02612 [pdf, other]
Title: Spatially Transformed Adversarial Examples
Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, Dawn Song
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[37] arXiv:1801.02685 [pdf, other]
Title: P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing
Ehab Zaghloul, Kai Zhou, Jian Ren
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1801.02742 [pdf, other]
Title: A Large Scale Investigation of Obfuscation Use in Google Play
Dominik Wermke, Nicolas Huaman, Yasemin Acar, Brad Reaves, Patrick Traynor, Sascha Fahl
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1801.02746 [pdf, other]
Title: Fusion of ANN and SVM Classifiers for Network Attack Detection
Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi
Comments: Accepted and presented at the 18th international conference on Sciences and Techniques of Automatic control and computer engineering STA'2017
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40] arXiv:1801.02780 [pdf, other]
Title: Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal, Mung Chiang
Comments: Extended abstract accepted for the 1st Deep Learning and Security Workshop; 5 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41] arXiv:1801.02789 [pdf, other]
Title: An efficient and secure two-party key agreement protocol based on chaotic maps
Nahid Yahyapoor, Hamed Yaghoobian, Manijeh Keshtgari
Comments: 1 figure, 20 Pages
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:1801.02837 [pdf, other]
Title: Malware detection techniques for mobile devices
Bela Amro
Comments: 11 pages, 6 figures
Journal-ref: International Journal of Mobile Network Communications & Telematics ( IJMNCT), vol 7, 2015
Subjects: Cryptography and Security (cs.CR)
[43] arXiv:1801.02850 [pdf, other]
Title: Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks
Yongshuai Liu, Jiyu Chen, Hao Chen
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[44] arXiv:1801.02950 [pdf, other]
Title: Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly
Comments: 1ST Deep Learning and Security Workshop (co-located with the 39th IEEE Symposium on Security and Privacy)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[45] arXiv:1801.03074 [pdf, other]
Title: Game of Drones - Detecting Streamed POI from Encrypted FPV Channel
Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici
Comments: this https URL
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1801.03218 [pdf, other]
Title: IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals
Zheng Zhou, Weiming Zhang, Nenghai Yu
Comments: 11 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1801.03239 [pdf, other]
Title: Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[48] arXiv:1801.03294 [pdf, other]
Title: A First Look at Identity Management Schemes on the Blockchain
Paul Dunphy, Fabien A.P. Petitcolas
Comments: To appear in IEEE Security and Privacy Magazine special issue on "Blockchain Security and Privacy" in 2018
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:1801.03528 [pdf, other]
Title: Applications of Blockchain Technology beyond Cryptocurrency
Mahdi H. Miraz, Maaruf Ali
Journal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-6, Vol. 2, No. 1, 1st January 2018, Available: http://aetic.theiaer.org/archive/v2n1/p1.pdf
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1801.03597 [pdf, other]
Title: Secrecy by Witness-Functions on Increasing Protocols
Jaouhar Fattahi, Mohamed Mejri, Hanane Houmani
Journal-ref: The 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2014
Subjects: Cryptography and Security (cs.CR)
[51] arXiv:1801.03688 [pdf, other]
Title: Repairing the Faure-Loidreau Public-Key Cryptosystem
Antonia Wachter-Zeh, Sven Puchinger, Julian Renner
Comments: 5 pages, accepted at IEEE International Symposium on Information Theory 2018
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[52] arXiv:1801.03758 [pdf, other]
Title: Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
K.Vishnu Priyanka, M.Gowthami, O.Susmitha, G.Prathyusha, Naresh Babu Muppalaneni
Subjects: Cryptography and Security (cs.CR)
[53] arXiv:1801.03984 [pdf, other]
Title: A Brain-Inspired Trust Management Model to Assure Security in a Cloud based IoT Framework for Neuroscience Applications
Mufti Mahmud, M. Shamim Kaiser, M. Mostafizur Rahman, M. Arifur Rahman, Antesar Shabut, Shamim Al-Mamun, Amir Hussain
Comments: 17 pages, 10 figures, 2 tables
Journal-ref: Cognitive Computation, 2018
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Neurons and Cognition (q-bio.NC)
[54] arXiv:1801.03998 [pdf, other]
Title: Decentralization in Bitcoin and Ethereum Networks
Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, Emin Gün Sirer
Comments: Financial Cryptography and Data Security 2018
Journal-ref: Financial Cryptography and Data Security (FC) 2018
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:1801.04084 [pdf, other]
Title: Speculose: Analyzing the Security Implications of Speculative Execution in CPUs
Giorgi Maisuradze, Christian Rossow
Subjects: Cryptography and Security (cs.CR)
[56] arXiv:1801.04372 [pdf, other]
Title: SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications
Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng
Comments: This is the extended technical report version of our SCLib paper accepted by ACM CODASPY 2018 (this http URL)
Subjects: Cryptography and Security (cs.CR)
[57] arXiv:1801.04416 [pdf, other]
Title: MOF-BC: A Memory Optimized and Flexible BlockChain for Large Scale Networks
Ali Dorri, Salil S. Kanhere, Raja Jurdak
Subjects: Cryptography and Security (cs.CR)
[58] arXiv:1801.04473 [pdf, other]
Title: Channel Whispering: a Protocol for Physical Layer Group Key Generation. Application to IR-UWB through Deconvolution
Iulia Tunaru, Benoît Denis, Régis Perrier, Bernard Uguen
Comments: 21 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[59] arXiv:1801.04565 [pdf, other]
Title: Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead
Eslam Elnikety, Deepak Garg, Peter Druschel
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[60] arXiv:1801.04569 [pdf, other]
Title: Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Luca Allodi, Sandro Etalle
Comments: Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[61] arXiv:1801.04609 [pdf, other]
Title: Tyche: Risk-Based Permissions for Smart Home Platforms
Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash
Subjects: Cryptography and Security (cs.CR)
[62] arXiv:1801.04703 [pdf, other]
Title: Attack Potential in Impact and Complexity
Luca Allodi, Fabio Massacci
Journal-ref: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017)
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:1801.04725 [pdf, other]
Title: Secure k-NN as a Service Over Encrypted Data in Multi-User Setting
Gagandeep Singh, Akshar Kaul, Sameep Mehta
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:1801.04961 [pdf, other]
Title: Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits
Rajit Karmakar, Santanu Chatopadhyay, Rohit Kapur
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:1801.05459 [pdf, other]
Title: Considerations regarding security issues impact on systems availability
Emil Pricop, Sanda Florentina Mihalache, Nicolae Paraschiv, Jaouhar Fattahi, Florin Zamfir
Comments: Paper accepted for 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI 2016) Proceedings, Ploiesti, Romania
Journal-ref: 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:1801.05507 [pdf, other]
Title: Gazelle: A Low Latency Framework for Secure Neural Network Inference
Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
Subjects: Cryptography and Security (cs.CR)
[67] arXiv:1801.05583 [pdf, other]
Title: Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices
Tom Mahler, Nir Nissim, Erez Shalom, Israel Goldenberg, Guy Hassman, Arnon Makori, Itzik Kochav, Yuval Elovici, Yuval Shahar
Comments: Presented at the RSNA Conference, November 2017, Chicago, IL, United States
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:1801.05659 [pdf, other]
Title: On Decoding Schemes for the MDPC-McEliece Cryptosystem
Hannes Bartz, Gianluigi Liva
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:1801.05764 [pdf, other]
Title: M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Nikolaos Alexopoulos, Sheikh Mahbub Habib, Steffen Schulz, Max Mühlhäuser
Comments: 18 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[70] arXiv:1801.05863 [pdf, other]
Title: Integrating Remote Attestation with Transport Layer Security
Thomas Knauth, Michael Steiner, Somnath Chakrabarti, Li Lei, Cedric Xing, Mona Vij
Subjects: Cryptography and Security (cs.CR)
[71] arXiv:1801.05915 [pdf, other]
Title: Security in Mobile Edge Caching with Reinforcement Learning
Liang Xiao, Xiaoyue Wan, Canhuang Dai, Xiaojiang Du, Xiang Chen, Mohsen Guizani
Subjects: Cryptography and Security (cs.CR)
[72] arXiv:1801.05958 [pdf, other]
Title: On a Generic Security Game Model
Vivek Shandilya, Sajjan Shiva
Comments: 31 pages
Journal-ref: Shandilya, V. and Shiva, S. (2017) On a Generic Security Game Model. Int. J. Communications , Network and System Sciences , 10, 142-172
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[73] arXiv:1801.05974 [pdf, other]
Title: Privacy-preserving Data Splitting: A Combinatorial Approach
Oriol Farràs, Jordi Ribes-González, Sara Ricci
Comments: 22 pages, 5 tables, 1 figure
Subjects: Cryptography and Security (cs.CR)
[74] arXiv:1801.06270 [pdf, other]
Title: Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach
Minghui Min, Liang Xiao, Caixia Xie, Mohammad Hajimirsadeghi, Narayan B. Mandayam
Subjects: Cryptography and Security (cs.CR)
[75] arXiv:1801.06275 [pdf, other]
Title: IoT Security Techniques Based on Machine Learning
Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu
Subjects: Cryptography and Security (cs.CR)
[76] arXiv:1801.06423 [pdf, other]
Title: Minimum spanning tree release under differential privacy constraints
Rafael Pinot
Comments: Thesis of Master Degree of Statistics, Université Paris 6 Pierre et Marie Curie
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST); Machine Learning (stat.ML)
[77] arXiv:1801.06730 [pdf, other]
Title: Web password recovery --- a necessary evil?
Fatma Al Maqbali, Chris J Mitchell
Comments: v2. Revised version
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:1801.06822 [pdf, other]
Title: ERIM: Secure, Efficient In-process Isolation with Memory Protection Keys (MPK)
Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg
Comments: USENIX Security Symposium 2019
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:1801.07090 [pdf, other]
Title: An Overview of Wireless IoT Protocol Security in the Smart Home Domain
Stefan Marksteiner, Víctor Juan Expósito Jiménez, Heribert Vallant, Herwig Zeiner
Comments: 8 pages, 4 figures
Journal-ref: Proceedings of the Joint 13th CTTE and 10th CMI Conference on Internet of Things Business Models, Users, and Networks, 2017
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:1801.07132 [pdf, other]
Title: SecSens: Secure State Estimation with Application to Localization and Time Synchronization
Amr Alanwar, Bernhard Etzlinger, Henrique Ferraz, Joao Hespanha, Mani Srivastava
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO); Systems and Control (eess.SY)
[81] arXiv:1801.07379 [pdf, other]
Title: Secure Mobile Crowdsensing with Deep Learning
Liang Xiao, Donghua Jiang, Dongjin Xu, Ning An
Comments: 7 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[82] arXiv:1801.07397 [pdf, other]
Title: HCIC: Hardware-assisted Control-flow Integrity Checking
Jiliang Zhang, Binhang Qi, Gang Qu
Comments: 14 pages
Journal-ref: IEEE Internet of Things Journal.(2018) 1-14
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[83] arXiv:1801.07447 [pdf, other]
Title: Block arrivals in the Bitcoin blockchain
R. Bowden, H.P. Keeler, A.E. Krzesinski, P.G. Taylor
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:1801.07501 [pdf, other]
Title: Deanonymizing Tor hidden service users through Bitcoin transactions analysis
Husam Al Jawaheri, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad
Subjects: Cryptography and Security (cs.CR)
[85] arXiv:1801.07518 [pdf, other]
Title: Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication
Adam J. Aviv, Ravi Kuber
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[86] arXiv:1801.07555 [pdf, other]
Title: Shake-n-Shack: Enabling Secure Data Exchange Between Smart Wearables via Handshakes
Yiran Shen, Fengyuan Yang, Bowen Du, Weitao Xu, Chengwen Luo, Hongkai Wen
Comments: To appear in PerCom'18
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:1801.07561 [pdf, other]
Title: A Multi-layer Recursive Residue Number System
Henk D.L. Hollmann, Ronald Rietman, Sebastiaan de Hoogh, Ludo M.G.M. Tolhuizen, Paul Gorissen
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[88] arXiv:1801.07702 [pdf, other]
Title: Post-Quantum Cryptography: Riemann Primitives and Chrysalis
Ian Malloy
Comments: Originally available on ResearchGate and now archived
Subjects: Cryptography and Security (cs.CR)
[89] arXiv:1801.07741 [pdf, other]
Title: Who Killed My Parked Car?
Kyong-Tak Cho, Yuseung Kim, Kang G. Shin
Subjects: Cryptography and Security (cs.CR)
[90] arXiv:1801.07759 [pdf, other]
Title: Whose Hands Are in the Finnish Cookie Jar?
Jukka Ruohonen, Ville Leppänen
Comments: Proceedings of the European Intelligence and Security Informatics Conference (EISIC 2017)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[91] arXiv:1801.07800 [pdf, other]
Title: qrypt0 - encrypted short messages exchanged between offline computers
Andreas O. Bender
Comments: 6 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[92] arXiv:1801.07814 [pdf, other]
Title: Blockchain moderated by empty blocks to reduce the energetic impact of crypto-moneys
Philippe Jacquet, Bernard Mans
Comments: preliminary version appeared in CryBlock'2019, The IEEE 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems (co-located with INFOCOM 2019), April 29th, 2019. Paris, France. Green Mining: toward a less energetic impact of cryptocurrencies, P. Jacquet and B. Mans, IEEE Press, 6 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[93] arXiv:1801.07844 [pdf, other]
Title: Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation
San Ling, Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
Comments: 24 pages
Subjects: Cryptography and Security (cs.CR)
[94] arXiv:1801.07965 [pdf, other]
Title: Winning the Caucus Race: Continuous Leader Election via Public Randomness
Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn
Subjects: Cryptography and Security (cs.CR)
[95] arXiv:1801.07983 [pdf, other]
Title: Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect
Wanpeng Li, Chris J Mitchell, Thomas Chen
Comments: 18 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[96] arXiv:1801.08064 [pdf, other]
Title: SoK: Uncentralisable Ledgers and their Impact on Voting Systems
Lionel Dricot, Olivier Pereira
Comments: 10 pages + biblio
Subjects: Cryptography and Security (cs.CR)
[97] arXiv:1801.08090 [pdf, other]
Title: An Algebraic Approach for Reasoning About Information Flow
Arthur Américo, Mário S. Alvim, Annabelle McIver
Subjects: Cryptography and Security (cs.CR)
[98] arXiv:1801.08115 [pdf, other]
Title: Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned
Guillermo Suarez-Tangil, Gianluca Stringhini
Comments: A shorter version of this paper appears in IEEE Transactions on Dependable and Secure Computing. This is a more detailed version, extended from the pre-print
Subjects: Cryptography and Security (cs.CR)
[99] arXiv:1801.08154 [pdf, other]
Title: On the Gold Standard for Security of Universal Steganography
Sebastian Berndt, Maciej Liśkiewicz
Comments: EUROCRYPT 2018, llncs style
Subjects: Cryptography and Security (cs.CR)
[100] arXiv:1801.08185 [pdf, other]
Title: Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack
Dean Wasil, Omar Nakhila, Salih Safa Bacanli, Cliff Zou, Damla Turgut
Comments: 5 pages, 6 figures, presented on IEEE MASS 2017
Journal-ref: IEEE International Conference on Mobile Ad-hoc Sensor Systems(IEEE MASS 2017), pp.550-554, October 2017
Subjects: Cryptography and Security (cs.CR)
[101] arXiv:1801.08225 [pdf, other]
Title: Knock-Knock: The unbearable lightness of Android Notifications
Constantinos Patsakis, Efthimios Alepis
Comments: Presented at International Conference on Information Systems Security and Privacy (ICISSP 2018)
Subjects: Cryptography and Security (cs.CR)
[102] arXiv:1801.08271 [pdf, other]
Title: A Comprehensive Survey of Watermarking Relational Databases Research
Muhammad Kamran, Muddassar Farooq
Comments: We intend to submit this paper for possible publication in a suitable journal in near future. Some part of this paper is included as a chapter in Ph.D. thesis of first author (Muhammad Kamran) under the supervision of second author (Muddassar Farooq). This thesis can be found at this http URL. We are uploading the manuscript at arxiv.org for public access
Subjects: Cryptography and Security (cs.CR)
[103] arXiv:1801.08323 [pdf, other]
Title: Forward-Secure Group Signatures from Lattices
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
Subjects: Cryptography and Security (cs.CR)
[104] arXiv:1801.08353 [pdf, other]
Title: A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
Mustafa A. Mustafa, Sara Cleemput, Abelrahaman Aly, Aysajan Abidin
Comments: Accepted for publication at IEEE Transactions on Smart Grid
Subjects: Cryptography and Security (cs.CR)
[105] arXiv:1801.08354 [pdf, other]
Title: Secure and Privacy-Friendly Local Electricity Trading and Billing in Smart Grid
Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa
Subjects: Cryptography and Security (cs.CR)
[106] arXiv:1801.08410 [pdf, other]
Title: Relaxed Conditions for Secrecy in a Role-Based Specification
Jaouhar Fattahi, Mohamed Mejri, Hanane Houmani
Comments: The initial version of this paper was published in the International Journal of Information Security, 2014. V1, pp 33-36. This is an enhanced version and an extended one of it that includes the proofs of correcntess of increasing protocols. It is a prerequisite for arXiv:1408.2774 and all the series of other papers related to witness functions
Journal-ref: International Journal of Information Security, 2014. V1, pp 33-36 (initial version)
Subjects: Cryptography and Security (cs.CR)
[107] arXiv:1801.08535 [pdf, other]
Title: CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter
Comments: Accepted by USENIX Security 2018
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[108] arXiv:1801.08589 [pdf, other]
Title: A New Algorithm for Double Scalar Multiplication over Koblitz Curves
J. Adikari, V. S. Dimitrov, R. J. Cintra
Comments: 5 pages, 2 figures, 1 table
Journal-ref: Circuits and Systems (ISCAS), 2011 IEEE International Symposium on
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[109] arXiv:1801.08629 [pdf, other]
Title: Forecasting Suspicious Account Activity at Large-Scale Online Service Providers
Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu
Subjects: Cryptography and Security (cs.CR)
[110] arXiv:1801.08664 [pdf, other]
Title: Linear Complexity and Autocorrelation of two Classes of New Interleaved Sequences of Period $2N$
Shidong Zhang, Tongjiang Yan
Subjects: Cryptography and Security (cs.CR)
[111] arXiv:1801.08737 [pdf, other]
Title: Lattice-Based Group Signatures: Achieving Full Dynamicity (and Deniability) with Ease
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
Subjects: Cryptography and Security (cs.CR)
[112] arXiv:1801.08867 [pdf, other]
Title: LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini
Comments: 21 pages, 3 tables
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[113] arXiv:1801.08917 [pdf, other]
Title: Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning
Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, Phil Roth
Subjects: Cryptography and Security (cs.CR)
[114] arXiv:1801.09011 [pdf, other]
Title: Linking Received Packet to the Transmitter Through Physical-Fingerprinting of Controller Area Network
Omid Avatefipour, Azeem Hafeez, Muhammad Tayyab, Hafiz Malik
Comments: 6 pages, 5 figures, 9th IEEE International Workshop on Information Forensics and Security (WIFS 2017
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[115] arXiv:1801.09308 [pdf, other]
Title: A Survey on Behavioral Biometric Authentication on Smartphones
Ahmed Mahfouz, Tarek M. Mahmoud, Ahmed Sharaf Eldin
Journal-ref: Journal of Information Security and Applications. 2017 Dec 31;37:28-37
Subjects: Cryptography and Security (cs.CR)
[116] arXiv:1801.09535 [pdf, other]
Title: The Scalability of Trustless Trust
Dominik Harz, Magnus Boman
Comments: 16 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Multiagent Systems (cs.MA)
[117] arXiv:1801.09781 [pdf, other]
Title: Early Warnings of Cyber Threats in Online Discussions
Anna Sapienza, Alessandro Bessi, Saranya Damodaran, Paulo Shakarian, Kristina Lerman, Emilio Ferrara
Journal-ref: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), pp:667-674, 2017
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[118] arXiv:1801.10117 [pdf, other]
Title: PrivPy: Enabling Scalable and General Privacy-Preserving Machine Learning
Yi Li, Yitao Duan, Yu Yu, Shuoyao Zhao, Wei Xu
Subjects: Cryptography and Security (cs.CR)
[119] arXiv:1801.10391 [pdf, other]
Title: Internet of things forensics: Challenges and Case Study
Saad Alabdulsalam, Kevin Schaefer, Tahar Kechadi, Nhien-An Le-Khac
Subjects: Cryptography and Security (cs.CR)
[120] arXiv:1801.00318 (cross-list from cs.NE) [pdf, other]
Title: Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine (SVM) for Malware Classification
Abien Fred Agarap
Comments: 5 pages, 5 figures, 3 tables
Subjects: Neural and Evolutionary Computing (cs.NE); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Machine Learning (stat.ML)
[121] arXiv:1801.00349 (cross-list from cs.CV) [pdf, other]
Title: A General Framework for Adversarial Examples with Objectives
Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter
Comments: Accepted for publication at ACM TOPS
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[122] arXiv:1801.00554 (cross-list from cs.CL) [pdf, other]
Title: Did you hear that? Adversarial Examples Against Automatic Speech Recognition
Moustafa Alzantot, Bharathan Balaji, Mani Srivastava
Comments: Published in NIPS 2017 Machine Deception workshop
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[123] arXiv:1801.00634 (cross-list from cs.CV) [pdf, other]
Title: High Dimensional Spaces, Deep Learning and Adversarial Examples
Simant Dube
Comments: 29 pages, 15 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[124] arXiv:1801.00903 (cross-list from cs.SE) [pdf, other]
Title: Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Yuqi Chen, Christopher M. Poskitt, Jun Sun
Comments: Accepted by IEEE S&P 2018
Journal-ref: In Proc. IEEE Symposium on Security & Privacy (S&P 2018), pages 648-660. IEEE, 2018
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[125] arXiv:1801.01117 (cross-list from cs.LG) [pdf, other]
Title: Learning from Pseudo-Randomness With an Artificial Neural Network - Does God Play Pseudo-Dice?
Fenglei Fan, Ge Wang
Comments: 9 pages, 5 figures, 22 references
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[126] arXiv:1801.01421 (cross-list from cs.DC) [pdf, other]
Title: Towards Application Portability on Blockchains
Kazuyuki Shudo, Reiki Kanda, Kenji Saito
Comments: Proc. IEEE HotICN 2018, August 2018
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[127] arXiv:1801.01618 (cross-list from cs.DB) [pdf, other]
Title: Enabling Strong Database Integrity using Trusted Execution Environments
Kai Mast, Lequn Chen, Emin Gün Sirer
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[128] arXiv:1801.01944 (cross-list from cs.LG) [pdf, other]
Title: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Nicholas Carlini, David Wagner
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[129] arXiv:1801.01949 (cross-list from cs.CV) [pdf, other]
Title: Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[130] arXiv:1801.02300 (cross-list from cs.NI) [pdf, other]
Title: A Novel Framework for DDoS Detectionin Huge Scale Networks, Thanksto QoS Features
Hamed Rezaei, Nima Ghazanfari motlagha, Yaghoub Farjamib, Mohammad Hossein Yektae
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[131] arXiv:1801.02484 (cross-list from cs.LO) [pdf, other]
Title: Monitoring Data Minimisation
Srinivas Pinisetty, Thibaud Antignac, David Sands, Gerardo Schneider
Comments: 24 pages
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL)
[132] arXiv:1801.02613 (cross-list from cs.LG) [pdf, other]
Title: Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality
Xingjun Ma, Bo Li, Yisen Wang, Sarah M. Erfani, Sudanthi Wijewickrema, Grant Schoenebeck, Dawn Song, Michael E. Houle, James Bailey
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[133] arXiv:1801.02918 (cross-list from cs.NI) [pdf, other]
Title: A Survey among Network Operators on BGP Prefix Hijacking
Pavlos Sermpezis, Vasileios Kotronis, Alberto Dainotti, Xenofontas Dimitropoulos
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[134] arXiv:1801.03079 (cross-list from cs.IT) [pdf, other]
Title: Asymmetry Hurts: Private Information Retrieval Under Asymmetric Traffic Constraints
Karim Banawan, Sennur Ulukus
Comments: Submitted to IEEE Transactions on Information Theory, January 2018
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[135] arXiv:1801.03494 (cross-list from cs.IT) [pdf, other]
Title: Secure Retrospective Interference Alignment
Mohamed Seif, Ravi Tandon, Ming Li
Comments: Submitted to IEEE Transactions on Wireless Communications
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[136] arXiv:1801.03656 (cross-list from cs.IT) [pdf, other]
Title: Quantum Encryption and Generalized Quantum Shannon Impossibility
Ching-Yi Lai, Kai-Min Chung
Comments: 10 pages. corrected a few errors in the previous version
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[137] arXiv:1801.04179 (cross-list from cs.DC) [pdf, other]
Title: Arhuaco: Deep Learning and Isolation Based Security for Distributed High-Throughput Computing
A. Gomez Ramirez, C. Lara, L. Betev, D. Bilanovic, U. Kebschull (and for the ALICE Collaboration)
Comments: Manuscript submitted to the Journal of Grid Computing
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[138] arXiv:1801.04354 (cross-list from cs.CL) [pdf, other]
Title: Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Ji Gao, Jack Lanchantin, Mary Lou Soffa, Yanjun Qi
Comments: This is an extended version of the 6page Workshop version appearing in 1st Deep Learning and Security Workshop colocated with IEEE S&P
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG)
[139] arXiv:1801.04589 (cross-list from cs.AI) [pdf, other]
Title: Deep Reinforcement Fuzzing
Konstantin Böttinger, Patrice Godefroid, Rishabh Singh
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[140] arXiv:1801.04598 (cross-list from quant-ph) [pdf, other]
Title: Non-Locality in Interactive Proofs
Claude Crépeau, Nan Yang
Comments: 32 pages, 14 figures. Submitted to Crypto 2019, Feb 2019. Report arXiv:1804.02724 merged here in the update process
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[141] arXiv:1801.04668 (cross-list from cs.IT) [pdf, other]
Title: The decoding failure probability of MDPC codes
Jean-Pierre Tillich
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[142] arXiv:1801.04693 (cross-list from cs.LG) [pdf, other]
Title: Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks
Bo Luo, Yannan Liu, Lingxiao Wei, Qiang Xu
Comments: Adversarial example attacks, Robust and Imperceptible, Human perceptual system, Neural Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[143] arXiv:1801.04775 (cross-list from cs.IT) [pdf, other]
Title: Two High-performance Schemes of Transmit Antenna Selection for Secure Spatial Modulation
Feng Shu, Zhengwang Wang, Riqing Chen, Yongpeng Wu, Jiangzhou Wang
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[144] arXiv:1801.05768 (cross-list from cs.IT) [pdf, other]
Title: The Asymptotic Capacity of Private Search
Zhen Chen, Zhiying Wang, Syed Jafar
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[145] arXiv:1801.05926 (cross-list from cs.IT) [pdf, other]
Title: The Utility Cost of Robust Privacy Guarantees
Hao Wang, Mario Diaz, Flavio P. Calmon, Lalitha Sankar
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[146] arXiv:1801.06171 (cross-list from cs.IT) [pdf, other]
Title: Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security
Karim Banawan, Sennur Ulukus
Comments: Submitted to IEEE Transactions on Information Theory, January 2018
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[147] arXiv:1801.06232 (cross-list from cs.DS) [pdf, other]
Title: NAE-SAT-based probabilistic membership filters
Chao Fang, Zheng Zhu, Helmut G. Katzgraber
Comments: 13 pages, 4 figures, 3 pages
Subjects: Data Structures and Algorithms (cs.DS); Statistical Mechanics (cond-mat.stat-mech); Cryptography and Security (cs.CR)
[148] arXiv:1801.06368 (cross-list from cs.CY) [pdf, other]
Title: No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games
Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim
Comments: 10 pages, 11 figures, In Proceedings of the 27th International World Wide Web Conference (WWW) 2018
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[149] arXiv:1801.06542 (cross-list from cs.IT) [pdf, other]
Title: Further study on the maximum number of bent components of vectorial functions
Sihem Mesnager, Fengrong Zhang, Chunming Tang, Yong Zhou
Comments: 17 pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[150] arXiv:1801.06736 (cross-list from cs.IT) [pdf, other]
Title: On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields
Danilo Gligoroski, Kristian Gjosteen, Katina Kralevska
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM)
[151] arXiv:1801.06810 (cross-list from cs.SE) [pdf, other]
Title: Guidelines for Systematic Mapping Studies in Security Engineering
Michael Felderer, Jeffrey C. Carver
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[152] arXiv:1801.06825 (cross-list from cs.SI) [pdf, other]
Title: Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks
Cheng Wang, Bo Yang
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[153] arXiv:1801.06827 (cross-list from cs.SI) [pdf, other]
Title: Artificial Impostors for Location Privacy Preservation
Cheng Wang, Zhiyang Xie
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[154] arXiv:1801.07003 (cross-list from cs.IT) [pdf, other]
Title: Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography
Peter Beelen, Martin Bossert, Sven Puchinger, Johan Rosenkilde
Comments: 5 pages, accepted at: IEEE International Symposium on Information Theory 2018
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[155] arXiv:1801.07175 (cross-list from cs.CL) [pdf, other]
Title: Adversarial Texts with Gradient Methods
Zhitao Gong, Wenlu Wang, Bo Li, Dawn Song, Wei-Shinn Ku
Comments: This work lacks some crucial details. After careful discussion, we decided to withdraw it temporarily and resubmit a full version afterward
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[156] arXiv:1801.07215 (cross-list from cs.AI) [pdf, other]
Title: Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing
Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley Malin
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Databases (cs.DB); Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA)
[157] arXiv:1801.07301 (cross-list from cs.DS) [pdf, other]
Title: Secure $k$-ish Nearest Neighbors Classifier
Hayim Shaul, Dan Feldman, Daniela Rus
Subjects: Data Structures and Algorithms (cs.DS); Computational Geometry (cs.CG); Cryptography and Security (cs.CR)
[158] arXiv:1801.07356 (cross-list from cs.IT) [pdf, other]
Title: Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems
Dongyang Xu, Pinyi Ren, James A. Ritcey, Yichen Wang
Comments: accepted to IEEE Transactions on Information Forensics and Security, Jan. 2018
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[159] arXiv:1801.07434 (cross-list from quant-ph) [pdf, other]
Title: Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack
Georgios M. Nikolopoulos
Comments: Close to the published version
Journal-ref: Physical Review A 97, 012324 (2018)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[160] arXiv:1801.07484 (cross-list from cs.IT) [pdf, other]
Title: Protograph-based Quasi-Cyclic MDPC Codes for McEliece Cryptosystems
Gianluigi Liva, Hannes Bartz
Comments: 5 pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[161] arXiv:1801.08926 (cross-list from cs.CV) [pdf, other]
Title: Deflecting Adversarial Attacks with Pixel Deflection
Aaditya Prakash, Nick Moran, Solomon Garber, Antonella DiLillo, James Storer
Comments: Accepted to IEEE CVPR 2018 as Spotlight
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[162] arXiv:1801.09250 (cross-list from cs.OS) [pdf, other]
Title: Virtual Breakpoints for x86/64
Gregory Michael Price
Comments: 12 Pages, Presented at BSides Las Vegas 2019
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[163] arXiv:1801.09577 (cross-list from cs.NI) [pdf, other]
Title: First Demonstration of an Automatic Multilayer Intent-Based Secure Service Creation by an Open Source SDN Orchestrator
Thomas Szyrkowiec, Michele Santuari, Mohit Chamania, Domenico Siracusa, Achim Autenrieth, Victor Lopez
Comments: Parts of the presented work has received funding from the European Commission within the H2020 Research and Innovation Programme, under grant agreeement n.645127, project ACINO
Journal-ref: ECOC 2016 - Post Deadline Paper - 42nd European Conference on Optical Communication (see https://www.vde-verlag.de/proceedings-de/454283011.html)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[164] arXiv:1801.09741 (cross-list from cs.MM) [pdf, other]
Title: An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data
Muhammad Kamran, Muddassar Farooq
Comments: A shortened version of this work was published in IEEE Transactions on Knowledge and Data Engineering in 2012
Journal-ref: IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 11, pp. 1950-1962, 2012
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[165] arXiv:1801.10228 (cross-list from cs.DC) [pdf, other]
Title: Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, Jason Yellick
Comments: Appears in proceedings of EuroSys 2018 conference
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[166] arXiv:1801.10294 (cross-list from cs.NI) [pdf, other]
Title: Protecting Privacy in VANETs Using Mix Zones With Virtual Pseudonym Change
Belal Amro
Comments: 10 pages, 3 figures, 3 tables
Journal-ref: International Journal of Network Security & Its Applications volume 10 number 1 2018
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[167] arXiv:1801.10295 (cross-list from cs.CY) [pdf, other]
Title: A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain
Yining Hu, Ahsan Manzoor, Parinya Ekparinya, Madhusanka Liyanage, Kanchana Thilakarathna, Guillaume Jourjon, Aruna Seneviratne, Mika E Ylianttila
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[168] arXiv:1801.10323 (cross-list from cs.DB) [pdf, other]
Title: Privacy-Preserving Secret Shared Computations using MapReduce
Shlomi Dolev, Peeyush Gupta, Yin Li, Sharad Mehrotra, Shantanu Sharma
Comments: IEEE Transactions on Dependable and Secure Computing, Accepted 01 Aug. 2019
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[169] arXiv:1801.10365 (cross-list from cs.CV) [pdf, other]
Title: Synchronized Detection and Recovery of Steganographic Messages with Adversarial Learning
Haichao Shi, Xiao-Yu Zhang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[170] arXiv:1801.10578 (cross-list from stat.ML) [pdf, other]
Title: Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach
Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel
Comments: Accepted by Sixth International Conference on Learning Representations (ICLR 2018). Tsui-Wei Weng and Huan Zhang contributed equally
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Total of 170 entries
Showing up to 2000 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack