Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for July 2021

Total of 299 entries : 51-150 101-200 201-299
Showing up to 100 entries per page: fewer | more | all
[51] arXiv:2107.04008 [pdf, other]
Title: Malware Classification Using Deep Boosted Learning
Muhammad Asam, Saddam Hussain Khan, Tauseef Jamal, Umme Zahoora, Asifullah Khan
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[52] arXiv:2107.04075 [pdf, other]
Title: Defender Policy Evaluation and Resource Allocation Using MITRE ATT&CK Evaluations Data
Alexander V. Outkin, Patricia V. Schulz, Timothy Schulz, Thomas D. Tarman, Ali Pinar
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[53] arXiv:2107.04175 [pdf, other]
Title: A Survey on RISC-V Security: Hardware and Architecture
Tao Lu
Comments: 39 pages, 12 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[54] arXiv:2107.04245 [pdf, other]
Title: Private Graph Data Release: A Survey
Yang Li, Michael Purcell, Thierry Rakotoarivelo, David Smith, Thilina Ranbaduge, Kee Siong Ng
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:2107.04248 [pdf, other]
Title: Publicly Auditable MPC-as-a-Service with succinct verification and universal setup
Sanket Kanjalkar, Ye Zhang, Shreyas Gandlur, Andrew Miller
Subjects: Cryptography and Security (cs.CR)
[56] arXiv:2107.04284 [pdf, other]
Title: Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems
Shangyu Xie, Han Wang, Yu Kong, Yuan Hong
Comments: Accepted to Oakland'2022
Subjects: Cryptography and Security (cs.CR)
[57] arXiv:2107.04315 [pdf, other]
Title: Darlin: Recursive Proofs using Marlin
Ulrich Haböck, Alberto Garoffolo, Daniele Di Benedetto
Subjects: Cryptography and Security (cs.CR)
[58] arXiv:2107.04436 [pdf, other]
Title: Large Scale Measurement on the Adoption of Encrypted DNS
Sebastián García, Karel Hynek, Dmtrii Vekshin, Tomáš Čejka, Armin Wasicek
Comments: 16 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[59] arXiv:2107.04506 [pdf, other]
Title: SherLOCKED: A Detective-themed Serious Game for Cyber Security Education
Alice Jaffray, Conor Finn, Jason R.C. Nurse
Journal-ref: 15th IFIP International Symposium on Human Aspects of Information Security & Assurance (HAISA 2021)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[60] arXiv:2107.04743 [pdf, other]
Title: HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis
Yueming Wu, Deqing Zou, Wei Yang, Xiang Li, Hai Jin
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:2107.04910 [pdf, other]
Title: Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends
Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, Miroslav Bures, Robert Atkinson, Christos Tachtatzis, Xavier Bellekens
Comments: 25 pages, 3 figures, 4 tables
Subjects: Cryptography and Security (cs.CR)
[62] arXiv:2107.04940 [pdf, other]
Title: You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries
Jenny Blessing, Michael A. Specter, Daniel J. Weitzner
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:2107.05054 [pdf, other]
Title: BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains
Heini Bergsson Debes, Thanassis Giannetsos, Ioannis Krontiris
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:2107.05127 [pdf, other]
Title: Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning
Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[65] arXiv:2107.05172 [pdf, other]
Title: Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks
Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed
Comments: 23 Pages, 14 Figures, 6 Tables with Appendix
Journal-ref: MDPI Sensor, 2021, 21(14), 4736
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[66] arXiv:2107.05220 [pdf, other]
Title: On the undecidability of the Panopticon detection problem
Vasiliki Liagkou, Panayotis Nastou, Paul Spirakis, Yannis Stamatiou
Comments: 13 pages, no figures, technical report
Subjects: Cryptography and Security (cs.CR)
[67] arXiv:2107.05252 [pdf, other]
Title: OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning
Jiacheng Liang, Songze Li, Bochuan Cao, Wensi Jiang, Chaoyang He
Comments: An initial version of the article has been published in International Workshop on Federated Learning for User Privacy and Data Confidentiality in Conjunction with ICML 2021(this http URL). This version has been submmited to AAAI'22
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[68] arXiv:2107.05411 [pdf, other]
Title: Weakened Random Oracle Models with Target Prefix
Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka
Journal-ref: SecITC 2018
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:2107.05602 [pdf, other]
Title: Understanding the Communist Party of China's Information Operations
Rohit Dube
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[70] arXiv:2107.05692 [pdf, other]
Title: Hidden Cosets and Applications to Unclonable Cryptography
Andrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry
Comments: Minor updates
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[71] arXiv:2107.05749 [pdf, other]
Title: Resurrecting Address Clustering in Bitcoin
Malte Möser, Arvind Narayanan
Comments: Financial Cryptography and Data Security, 2022
Subjects: Cryptography and Security (cs.CR)
[72] arXiv:2107.05754 [pdf, other]
Title: EvoBA: An Evolution Strategy as a Strong Baseline forBlack-Box Adversarial Attacks
Andrei Ilie, Marius Popescu, Alin Stefanescu
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[73] arXiv:2107.05824 [pdf, other]
Title: Covariance's Loss is Privacy's Gain: Computationally Efficient, Private and Accurate Synthetic Data
March Boedihardjo, Thomas Strohmer, Roman Vershynin
Subjects: Cryptography and Security (cs.CR); Probability (math.PR); Statistics Theory (math.ST)
[74] arXiv:2107.05863 [pdf, other]
Title: Toward Safe Integration of Legacy SCADA Systems in the Smart Grid
Aldar C-F. Chan, Jianying Zhou
Comments: 22 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[75] arXiv:2107.05868 [pdf, other]
Title: Security and Privacy of Wireless Beacon Systems
Aldar C-F. Chan, Raymond M. H. Chung
Comments: 13 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[76] arXiv:2107.05924 [pdf, other]
Title: An Improvement of a Key Exchange Protocol Relying on Polynomial Maps
Keita Suzuki, Koji Nuida
Subjects: Cryptography and Security (cs.CR)
[77] arXiv:2107.05939 [pdf, other]
Title: A QUIC(K) Way Through Your Firewall?
Konrad Yuri Gbur, Florian Tschorsch
Comments: 7 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[78] arXiv:2107.06024 [pdf, other]
Title: A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation
Stefan Marksteiner, Peter Priller
Comments: 7 pages, 6 figures, accepted for the joint SRCNAS/STRIVE workshop at the 6th IEEE European Symposium on Security and Privacy
Journal-ref: 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) - Safety vs Security in the Air and on the Ground
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:2107.06049 [pdf, other]
Title: Argus: A Fully Transparent Incentive System for Anti-Piracy Campaigns (Extended Version)
Xian Zhang, Xiaobing Guo, Zixuan Zeng, Wenyan Liu, Zhongxin Guo, Yang Chen, Shuo Chen, Qiufeng Yin, Mao Yang, Lidong Zhou
Comments: To appear in SRDS 2021. This is an extended version
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:2107.06090 [pdf, other]
Title: PakeMail: authentication and key management in decentralized secure email and messaging via PAKE
Itzel Vazquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y.A. Ryan
Comments: arXiv admin note: substantial text overlap with arXiv:2005.10787
Subjects: Cryptography and Security (cs.CR)
[81] arXiv:2107.06100 [pdf, other]
Title: Secure Charging and Payment System for Electric Land Vehicles with Authentication Protocol
Omer Aydin
Comments: in Turkish language. 4th INTERNATIONAL CONGRESS ON ECONOMICS FINANCE AND ENERGY (2020). Electric land vehicle, Authentication protocol, Encryption, Security, Payment system, Charging system
Subjects: Cryptography and Security (cs.CR)
[82] arXiv:2107.06119 [pdf, other]
Title: On SDVS Sender Privacy In The Multi-Party Setting
Jeroen van Wier
Subjects: Cryptography and Security (cs.CR)
[83] arXiv:2107.06372 [pdf, other]
Title: On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment
Vafa Andalibi, Eliot Lear, DongInn Kim, L. Jean Camp
Comments: 22 pages, 6 figures, 3 algorithms, To be published in 5th EAI International Conference on Safety and Security in Internet of Things (SaSeIoT)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[84] arXiv:2107.06415 [pdf, other]
Title: The Master and Parasite Attack
Lukas Baumann, Elias Heftrig, Haya Shulman, Michael Waidner
Comments: The paper has been accepted for publication at the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021)
Subjects: Cryptography and Security (cs.CR)
[85] arXiv:2107.06578 [pdf, other]
Title: A Distance Measure for Privacy-preserving Process Mining based on Feature Learning
Fabian Rösel, Stephan A. Fahrenkrog-Petersen, Han van der Aa, Matthias Weidlich
Comments: Accepted for 17th International Workshop on Business Process Intelligence
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[86] arXiv:2107.06590 [pdf, other]
Title: Self-Determined Reciprocal Recommender System with Strong Privacy Guarantees
S. Nuñez von Voigt, E. Daniel, F. Tschorsch
Comments: Accepted at The 16th International Conference on Availability, Reliability and Security (ARES 2021)
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:2107.06662 [pdf, other]
Title: A Reputation-based Approach using Consortium Blockchain for Cyber Threat Intelligence Sharing
Zhang Xiaohui, Miao Xianghua
Comments: 16 pages,8 figures and 8 tables,submitted to journal
Subjects: Cryptography and Security (cs.CR)
[88] arXiv:2107.06833 [pdf, other]
Title: A Review-based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras
Ravi Teja Batchu, Abeer Alsadoon, P.W.C. Prasad, Rasha S. Ali, Tarik A. Rashid, Ghossoon Alsadoon, Oday D. Jerew
Comments: 29 pages
Journal-ref: Journal of Applied Security Research, 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[89] arXiv:2107.06849 [pdf, other]
Title: Digital Passport and Visa Asset Management Using Private and Permissioned Blockchain
Keenu Chandra, Maroof Mushtaq, Nalini N
Subjects: Cryptography and Security (cs.CR)
[90] arXiv:2107.06946 [pdf, other]
Title: Towards Quantifying the Carbon Emissions of Differentially Private Machine Learning
Rakshit Naidu, Harshita Diddee, Ajinkya Mulay, Aleti Vardhan, Krithika Ramesh, Ahmed Zamzam
Comments: 4+3 pages; 6 figures; 8 tables. Accepted at SRML workshop at ICML'21
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91] arXiv:2107.07060 [pdf, other]
Title: Blockchain-based Trust Information Storage in Crowdsourced IoT Services
Mohammed Bahutair, Athman Bouguettaya
Comments: 10 pages, Accepted and to appear in 2021 IEEE International Conference on Web Services (ICWS). Content may change prior to final publication
Subjects: Cryptography and Security (cs.CR)
[92] arXiv:2107.07063 [pdf, other]
Title: BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-Domain Routing Via Blockchain
I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kaafar
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[93] arXiv:2107.07065 [pdf, other]
Title: Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques
Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni
Comments: 18 pages, 2 figures, 2 tables; paper published at 2022 IEEE Symposium on Security and Privacy (S&P)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[94] arXiv:2107.07223 [pdf, other]
Title: Improving Security in McAdams Coefficient-Based Speaker Anonymization by Watermarking Method
Candy Olivia Mawalim, Masashi Unoki
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[95] arXiv:2107.07297 [pdf, other]
Title: Shard Scheduler: object placement and migration in sharded account-based blockchains
Michał Król, Onur Ascigil, Sergi Rene, Alberto Sonnino, Mustafa Al-Bassam, Etienne Rivière
Subjects: Cryptography and Security (cs.CR)
[96] arXiv:2107.07355 [pdf, other]
Title: Using Cyber Digital Twins for Automated Automotive Cybersecurity Testing
Stefan Marksteiner, Slava Bronfman, Markus Wolf, Eddie Lazebnik
Comments: 6 pages, 3 figures, accepted for the joint SRCNAS/STRIVE workshop at the 6th IEEE European Symposium on Security and Privacy
Journal-ref: 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) - Safety vs Security in the Air and on the Ground
Subjects: Cryptography and Security (cs.CR)
[97] arXiv:2107.07416 [pdf, other]
Title: Cheatsheets for Authentication and Key Agreements in 2G, 3G, 4G, and 5G
Prajwol Kumar Nakarmi
Comments: 15 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[98] arXiv:2107.07759 [pdf, other]
Title: Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version)
Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang
Comments: Extended version of Usenix'21 paper
Subjects: Cryptography and Security (cs.CR)
[99] arXiv:2107.07784 [pdf, other]
Title: A Security Cost Modelling Framework for Cyber-Physical Systems
Igor Ivkic, Patrizia Sailer, Antonios Gouglidis, Andreas Mauthe, Markus Tauber
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF)
[100] arXiv:2107.07818 [pdf, other]
Title: Revisiting IoT Device Identification
Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi
Comments: To appear in TMA 2021 conference. 9 pages, 6 figures. arXiv admin note: text overlap with arXiv:2011.08605
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[101] arXiv:2107.07916 [pdf, other]
Title: A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems
Alvi Ataur Khalil, Javier Franco, Imtiaz Parvez, Selcuk Uluagac, Mohammad Ashiqur Rahman
Comments: 6 pages, 2 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[102] arXiv:2107.07923 [pdf, other]
Title: BRR: Preserving Privacy of Text Data Efficiently on Device
Ricardo Silva Carvalho, Theodore Vasiloudis, Oluwaseyi Feyisetan
Subjects: Cryptography and Security (cs.CR)
[103] arXiv:2107.07928 [pdf, other]
Title: TEM: High Utility Metric Differential Privacy on Text
Ricardo Silva Carvalho, Theodore Vasiloudis, Oluwaseyi Feyisetan
Subjects: Cryptography and Security (cs.CR)
[104] arXiv:2107.07964 [pdf, other]
Title: Blockchain Technology: Bitcoins, Cryptocurrency and Applications
Bosubabu Sambana
Comments: 7 Pages, 4 Figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[105] arXiv:2107.07972 [pdf, other]
Title: Demo -- Zelig: Customizable Blockchain Simulator
Ege Erdogan, Can Arda Aydin, Oznur Ozkasap, Waris Gill
Comments: 40th International Symposium on Reliable Distributed Systems (SRDS 2021)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[106] arXiv:2107.08094 [pdf, other]
Title: LAORAM: A Look Ahead ORAM Architecture for Training Large Embedding Tables
Rachit Rajat, Yongqin Wang, Murali Annavaram
Subjects: Cryptography and Security (cs.CR)
[107] arXiv:2107.08279 [pdf, other]
Title: Anonymous Blockchain-based System for Consortium
Qin Wang, Shiping Chen, Yang Xiang
Comments: Published in ACM TMIS 2021
Subjects: Cryptography and Security (cs.CR)
[108] arXiv:2107.08367 [pdf, other]
Title: SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks
Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[109] arXiv:2107.08590 [pdf, other]
Title: EvilModel: Hiding Malware Inside of Neural Network Models
Zhi Wang, Chaoge Liu, Xiang Cui
Comments: To be appear at 26th IEEE Symposium on Computers and Communications (ISCC 2021)
Journal-ref: 2021 IEEE Symposium on Computers and Communications (ISCC)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[110] arXiv:2107.08624 [pdf, other]
Title: Trends in Blockchain and Federated Learning for Data Sharing in Distributed Platforms
Haemin Lee, Joongheon Kim
Subjects: Cryptography and Security (cs.CR)
[111] arXiv:2107.08671 [pdf, other]
Title: Zero Trust Service Function Chaining
Leonard Bradatsch, Frank Kargl, Oleksandr Miroshkin
Comments: 3 pages, 2 figures. to be published at the Conference on Networked Systems (NetSys 2021)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[112] arXiv:2107.08688 [pdf, other]
Title: Structural Watermarking to Deep Neural Networks via Network Channel Pruning
Xiangyu Zhao, Yinzhe Yao, Hanzhou Wu, Xinpeng Zhang
Comments: Accepted by IEEE International Workshop on Information Forensics and Security 2021
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[113] arXiv:2107.08695 [pdf, other]
Title: Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks
Dominik Sisejkovic, Farhad Merchant, Lennart M. Reimann, Rainer Leupers
Comments: Accepted at IEEE TCAD 2021
Journal-ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), July, 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[114] arXiv:2107.08832 [pdf, other]
Title: Higher-degree supersingular group actions
Mathilde Chenu (GRACE), Benjamin Smith (GRACE)
Comments: Mathematical Cryptology, Florida Online Journals, In press
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[115] arXiv:2107.08909 [pdf, other]
Title: MEGEX: Data-Free Model Extraction Attack against Gradient-Based Explainable AI
Takayuki Miura, Satoshi Hasegawa, Toshiki Shibahara
Comments: 10 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[116] arXiv:2107.08970 [pdf, other]
Title: Indexing structures for the PLS blockchain
Alex Shafarenko
Comments: 28 pages, 10 figures
Journal-ref: Cybersecurity (2024) 7:34
Subjects: Cryptography and Security (cs.CR)
[117] arXiv:2107.09113 [pdf, other]
Title: The approach with the Data Protection and Privacy Relationships Model (DAPPREMO)
Nicola Fabiano
Journal-ref: The Journal on Systemics, Cybernetics and Informatics: JSCI - Volume 19 - Number 7 - Year 2021, pp. 1-19 - ISSN: 1690-4524
Subjects: Cryptography and Security (cs.CR)
[118] arXiv:2107.09130 [pdf, other]
Title: GNN4IP: Graph Neural Network for Hardware Intellectual Property Piracy Detection
Rozhin Yasaei, Shih-Yuan Yu, Emad Kasaeyan Naeini, Mohammad Abdullah Al Faruque
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119] arXiv:2107.09199 [pdf, other]
Title: A Non-invasive Technique to Detect Authentic/Counterfeit SRAM Chips
B. M. S. Bahar Talukder, Farah Ferdaus, Md Tauhidur Rahman
Journal-ref: ACM Journal on Emerging Technologies in Computing Systems, 2023
Subjects: Cryptography and Security (cs.CR)
[120] arXiv:2107.09373 [pdf, other]
Title: Image-Hashing-Based Anomaly Detection for Privacy-Preserving Online Proctoring
Waheeb Yaqub, Manoranjan Mohanty, Basem Suleiman
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Human-Computer Interaction (cs.HC)
[121] arXiv:2107.09470 [pdf, other]
Title: RansomClave: Ransomware Key Management using SGX
Alpesh Bhudia, Daniel O'Keeffe, Daniele Sgandurra, Darren Hurley-Smith
Subjects: Cryptography and Security (cs.CR)
[122] arXiv:2107.09789 [pdf, other]
Title: NeurObfuscator: A Full-stack Obfuscation Tool to Mitigate Neural Architecture Stealing
Jingtao Li, Zhezhi He, Adnan Siraj Rakin, Deliang Fan, Chaitali Chakrabarti
Comments: Accepted by HOST 2021
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:2107.09804 [pdf, other]
Title: Using Undervolting as an On-Device Defense Against Adversarial Machine Learning Attacks
Saikat Majumdar, Mohammad Hossein Samavatian, Kristin Barber, Radu Teodorescu
Journal-ref: 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[124] arXiv:2107.09833 [pdf, other]
Title: Leaking Secrets through Modern Branch Predictor in the Speculative World
Md Hafizul Islam Chowdhuryy, Fan Yao
Comments: Camera ready version will appear in a future issue of IEEE Transactions on Computers (TC). DOI: this https URL
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[125] arXiv:2107.09856 [pdf, other]
Title: Firmware Re-hosting Through Static Binary-level Porting
Mingfeng Xin, Hui Wen, Liting Deng, Hong Li, Qiang Li, Limin Sun
Subjects: Cryptography and Security (cs.CR)
[126] arXiv:2107.09863 [pdf, other]
Title: PoF: Proof-of-Following for Vehicle Platoons
Ziqi Xu, Jingcheng Li, Yanjun Pan, Loukas Lazos, Ming Li, Nirnimesh Ghose
Comments: 18 pages, 23 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[127] arXiv:2107.09926 [pdf, other]
Title: Hygiea: A secure, smart, privacy-preserving and interoperable Blockchain solution for the Covid-19 pandemic
Sofia Maria Dima, Alexandros Hasikos, Stylianos Kampakis, Theodosis Mourouzis, Andreas Papageorgiou
Subjects: Cryptography and Security (cs.CR)
[128] arXiv:2107.09986 [pdf, other]
Title: The analysis approach of ThreatGet
Korbinian Christl, Thorsten Tarrach
Comments: This report gives a formal syntax and semantics of the analysis language used by the tool ThreatGet (this http URL), developed and maintained by the AIT Austrian Institute of Technology
Subjects: Cryptography and Security (cs.CR)
[129] arXiv:2107.10045 [pdf, other]
Title: A Tandem Framework Balancing Privacy and Security for Voice User Interfaces
Ranya Aloufi, Hamed Haddadi, David Boyle
Comments: 14 pages, 6 figures. arXiv admin note: text overlap with arXiv:2008.03648, arXiv:2010.13995, arXiv:1911.01601 by other authors
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[130] arXiv:2107.10070 [pdf, other]
Title: How Lightning's Routing Diminishes its Anonymity
Satwik Prabhu Kumble, Dick Epema, Stefanie Roos
Comments: 10 pages, 4 figures, 1 table, The 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17--20, 2021, Vienna, Austria
Subjects: Cryptography and Security (cs.CR)
[131] arXiv:2107.10133 [pdf, other]
Title: HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices
Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref
Comments: This paper is an extension of work presented in ISCISC 2019
Subjects: Cryptography and Security (cs.CR)
[132] arXiv:2107.10138 [pdf, other]
Title: Secure Random Sampling in Differential Privacy
Naoise Holohan, Stefano Braghin
Subjects: Cryptography and Security (cs.CR)
[133] arXiv:2107.10139 [pdf, other]
Title: Generative Models for Security: Attacks, Defenses, and Opportunities
Luke A. Bauer, Vincent Bindschaedler
Subjects: Cryptography and Security (cs.CR)
[134] arXiv:2107.10147 [pdf, other]
Title: Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging (Extended Version)
Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik
Comments: This is the extended version prepared for journal submission. For remarks on the changes, see the last paragraph of Section 1
Subjects: Cryptography and Security (cs.CR)
[135] arXiv:2107.10230 [pdf, other]
Title: Multi-institution encrypted medical imaging AI validation without data sharing
Arjun Soin, Pratik Bhatu, Rohit Takhar, Nishanth Chandran, Divya Gupta, Javier Alvarez-Valle, Rahul Sharma, Vidur Mahajan, Matthew P Lungren
Subjects: Cryptography and Security (cs.CR)
[136] arXiv:2107.10232 [pdf, other]
Title: A low-overhead approach for self-sovereign identity in IoT
Geovane Fedrecheski, Laisa C. P. Costa, Samira Afzal, Jan M. Rabaey, Roseli D. Lopes, Marcelo K. Zuffo
Subjects: Cryptography and Security (cs.CR)
[137] arXiv:2107.10238 [pdf, other]
Title: Secure Access Control for DAG-based Distributed Ledgers
Lianna Zhao, Luigi Vigneri, Andrew Cullen, William Sanders, Pietro Ferraro, Robert Shorten
Comments: Submitted for consideration for publication in IEEE IoT Journal
Subjects: Cryptography and Security (cs.CR)
[138] arXiv:2107.10242 [pdf, other]
Title: Machine Learning Enhanced Blockchain Consensus with Transaction Prioritization for Smart Cities
S. Valli Sanghami, John J. Lee, Qin Hu
Comments: 12 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[139] arXiv:2107.10243 [pdf, other]
Title: Federated Learning using Smart Contracts on Blockchains, based on Reward Driven Approach
Monik Raj Behera, Sudhir Upadhyay, Suresh Shetty
Comments: 9 pages, 7 figures and 1 table
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[140] arXiv:2107.10302 [pdf, other]
Title: Adversarial for Good? How the Adversarial ML Community's Values Impede Socially Beneficial Uses of Attacks
Kendra Albert, Maggie Delano, Bogdan Kulynych, Ram Shankar Siva Kumar
Comments: Author list is ordered alphabetically as there is equal contribution. 4 pages Accepted by the ICML 2021 workshop on "A Blessing in Disguise:The Prospects and Perils of Adversarial Machine Learning"
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[141] arXiv:2107.10407 [pdf, other]
Title: Designing a Location Trace Anonymization Contest
Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada, Takayasu Yamaguchi, Yuji Yamaoka
Comments: Accepted at PoPETs (Proceedings on Privacy Enhancing Technologies) 2023
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[142] arXiv:2107.10443 [pdf, other]
Title: Spinning Sequence-to-Sequence Models with Meta-Backdoors
Eugene Bagdasaryan, Vitaly Shmatikov
Comments: Outdated. Superseded by arXiv:2112.05224 and published at IEEE S&P'22 with title: "Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures"
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[143] arXiv:2107.10467 [pdf, other]
Title: Improving Blockchain Consistency Bound by Assigning Weights to Random Blocks
Qing Zhang, Xueping Gong, Huizhong Li, Hao Wu, Jiheng Zhang
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[144] arXiv:2107.10533 [pdf, other]
Title: CGuard: Efficient Spatial Safety for C
Piyus Kedia, Rahul Purandare, Udit Kumar Agarwal, Rishabh
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[145] arXiv:2107.10536 [pdf, other]
Title: Improving the Authentication with Built-in Camera Protocol Using Built-in Motion Sensors: A Deep Learning Solution
Cezara Benegui, Radu Tudor Ionescu
Comments: Accepted for publication in Mathematics
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[146] arXiv:2107.10571 [pdf, other]
Title: Always on Voting: A Framework for Repetitive Voting on the Blockchain
Sarad Venugopalan, Ivana Stančíková, Ivan Homoliak
Subjects: Cryptography and Security (cs.CR)
[147] arXiv:2107.10634 [pdf, other]
Title: Factors determining maximum energy consumption of Bitcoin miners
Jesus M. Gonzalez-Barahona
Comments: 24 pages, request for comments
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[148] arXiv:2107.10659 [pdf, other]
Title: Differentially Private Algorithms for 2020 Census Detailed DHC Race \& Ethnicity
Sam Haney, William Sexton, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau
Comments: Presented at Theory and Practice of Differential Privacy Workshop (TPDP) 2021
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Applications (stat.AP)
[149] arXiv:2107.10733 [pdf, other]
Title: Review of internet of things of security threats and Challenges
Fehim Köylü, Ahmed O. Ali, Mohamud M. Hassan, Muhiadin M. Sabriye, Abdirisak Ali Osman, Ali Ammar Hilal, Qazwan Abdullah
Comments: 6pages
Subjects: Cryptography and Security (cs.CR)
[150] arXiv:2107.10830 [pdf, other]
Title: ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes
Narmeen Shafqat, Daniel J. Dubois, David Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan
Comments: An updated version of the authors' previous submission (arXiv:2107.10830). It has been accepted at the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022
Subjects: Cryptography and Security (cs.CR)
Total of 299 entries : 51-150 101-200 201-299
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack