Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for January 2018

Total of 170 entries : 1-25 26-50 51-75 76-100 ... 151-170
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1801.00025 [pdf, other]
Title: A Deep Belief Network Based Machine Learning System for Risky Host Detection
Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle
Comments: 10 pages, 10 figures. The paper is accepted by IEEE Conference on Communications and Network Security 2017. However, it is not published because either of the authors showed up in the conference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[2] arXiv:1801.00129 [pdf, other]
Title: Why the Equifax Breach Should Not Have Mattered
Marten Lohstroh
Comments: Presented at the World Congress on Internet Security (WorldCIS) in Cambridge, UK on Dec 12, 2017
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3] arXiv:1801.00235 [pdf, other]
Title: Early detection of Crossfire attacks using deep learning
Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Matthias R. Brust, Ngai-Man Cheung
Comments: 5 pages, 5 this http URL at Deep Learning Security Workshop 2017, Singapore. Added references for section 2 and section 4. Added new author
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1801.00308 [pdf, other]
Title: Cyclic group based mutual authentication protocol for RFID system
Pramod Kumar Maurya, Satya Bagchi
Comments: 11 pages, 3 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1801.00528 [pdf, other]
Title: Bayesian Tabulation Audits: Explained and Extended
Ronald L. Rivest
Comments: 49 pages, 3 figures Version 2 of the paper replaces use of the bare Dirichlet model with the Dirichlet-multinomial, which is more standard and works better in edge cases, such as when the sample is very large
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Applications (stat.AP)
[6] arXiv:1801.00649 [pdf, other]
Title: Validation of Hardware Security and Trust: A Survey
Payman Behnam
Comments: 7 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1801.00694 [pdf, other]
Title: The New Threats of Information Hiding: the Road Ahead
K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, S. Zander
Comments: 9 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1801.00823 [pdf, other]
Title: MVG Mechanism: Differential Privacy under Matrix-Valued Query
Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal
Comments: Appeared in CCS'18
Journal-ref: Thee Chanyaswad, Alex Dytso, H. Vincent Poor, and Prateek Mittal. 2018. MVG Mechanism: Differential Privacy under Matrix-Valued Query. In 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS'18)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[9] arXiv:1801.00853 [pdf, other]
Title: Revisiting Email Spoofing Attacks
Hang Hu, Gang Wang
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1801.00932 [pdf, other]
Title: Power Analysis Based Side Channel Attack
Hasindu Gamaarachchi, Harsha Ganegoda
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1801.00933 [pdf, other]
Title: New Directions for Trust in the Certificate Authority Ecosystem
Jan-Ole Malchow, Benjamin Güldenring, Volker Roth
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1801.00938 [pdf, other]
Title: A Look at the Time Delays in CVSS Vulnerability Scoring
Jukka Ruohonen
Comments: this http URL
Journal-ref: Applied Computing and Informatics (published online in December 2017)
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1801.01048 [pdf, other]
Title: Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems
Chee-Wooi Ten, Koji Yamashita, Zhiyuan Yang, Athanasios V. Vasilakos, Andrew Ginter
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[14] arXiv:1801.01203 [pdf, other]
Title: Spectre Attacks: Exploiting Speculative Execution
Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1801.01207 [pdf, other]
Title: Meltdown
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1801.01314 [pdf, other]
Title: Learning automata based SVM for intrusion detection
Chong Di
Journal-ref: International Conference in Communications, Signal Processing, and Systems. CSPS 2017. Lecture Notes in Electrical Engineering, vol 463. Springer, Singapore
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17] arXiv:1801.01456 [pdf, other]
Title: Deep Random based Key Exchange protocol resisting unlimited MITM
Thibault de Valroger
Comments: 14 pages. V2: Updated reminder in the formalism of Deep Random assumption. arXiv admin note: text overlap with arXiv:1611.01683, arXiv:1507.08258
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1801.01571 [pdf, other]
Title: Robust PCA for Anomaly Detection in Cyber Networks
Randy Paffenroth, Kathleen Kay, Les Servi
Comments: 10 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1801.01594 [pdf, other]
Title: Differentially Private Releasing via Deep Generative Model (Technical Report)
Xinyang Zhang, Shouling Ji, Ting Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20] arXiv:1801.01612 [pdf, other]
Title: Secrecy by Witness-Functions under Equational Theories
Jaouhar Fattahi, Mohamed Mejri
Comments: this http URL
Journal-ref: 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2015
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1801.01633 [pdf, other]
Title: Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1801.01681 [pdf, other]
Title: VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[23] arXiv:1801.01710 [pdf, other]
Title: On the Resilience of a QKD Key Synchronization Protocol for IPsec
Stefan Marksteiner, Benjamin Rainer, Oliver Maurhart
Journal-ref: International Journal on Advances in Security, vol 9 no 3 & 4, year 2016
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1801.01932 [pdf, other]
Title: Tempest: Temporal Dynamics in Anonymity Systems
Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal
Comments: Conference version to appear at The 18th Privacy Enhancing Technologies Symposium (PETS 2018)
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1801.01970 [pdf, other]
Title: Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools
Jonathan Pan
Subjects: Cryptography and Security (cs.CR)
Total of 170 entries : 1-25 26-50 51-75 76-100 ... 151-170
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack