Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2021

Total of 285 entries : 1-50 51-100 101-150 151-200 ... 251-285
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:2108.00003 [pdf, other]
Title: Secure solutions for Smart City Command Control Centre using AIOT
Balachandar.S, Chinnaiyan.R
Comments: 25 pages , 10 figures, 9 Tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[2] arXiv:2108.00026 [pdf, other]
Title: Private Retrieval, Computing and Learning: Recent Progress and Future Challenges
Sennur Ulukus, Salman Avestimehr, Michael Gastpar, Syed Jafar, Ravi Tandon, Chao Tian
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Retrieval (cs.IR); Information Theory (cs.IT)
[3] arXiv:2108.00078 [pdf, other]
Title: Technical Report for HW2VEC -- A Graph Learning Tool for Automating Hardware Security
Yasamin Moghaddas, Tommy Nguyen, Shih-Yuan Yu, Rozhin Yasaei, Mohammad Abdullah Al Faruque
Comments: arXiv admin note: text overlap with arXiv:2107.12328
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:2108.00079 [pdf, other]
Title: Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes
Michalis Kallitsis, Vasant Honavar, Rupesh Prajapati, Dinghao Wu, John Yen
Comments: 30 pages, 14 tables, 12 figures, arXiv.org perpetual, non-exclusive license
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[5] arXiv:2108.00100 [pdf, other]
Title: Quantum collision finding for homomorphic hash functions
Juan Carlos Garcia-Escartin, Vicent Gimeno, Julio José Moyano-Fernández
Comments: V2: Removed an example without quantum advantage
Subjects: Cryptography and Security (cs.CR); Commutative Algebra (math.AC); Quantum Physics (quant-ph)
[6] arXiv:2108.00352 [pdf, other]
Title: BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning
Jinyuan Jia, Yupei Liu, Neil Zhenqiang Gong
Comments: To appear in IEEE Symposium on Security and Privacy, 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[7] arXiv:2108.00476 [pdf, other]
Title: A Sequential Supervised Machine Learning Approach for Cyber Attack Detection in a Smart Grid System
Yasir Ali Farrukh, Irfan Khan, Zeeshan Ahmad, Rajvikram Madurai Elavarasan
Comments: 6 pages, 7 figures, to be published in North Americal Power Systems (NAPS 2021) Conference
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[8] arXiv:2108.00669 [pdf, other]
Title: Towards Making Deep Learning-based Vulnerability Detectors Robust
Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[9] arXiv:2108.00807 [pdf, other]
Title: Application of Blockchain in Healthcare and Health Insurance Sector
Debendranath Das
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:2108.00921 [pdf, other]
Title: On the Privacy of National Contact Tracing COVID-19 Applications: The Coronavírus-SUS Case
Jéferson Campos Nobre, Laura Rodrigues Soares, Briggette Olenka Roman Huaytalla, Elvandi da Silva Júnior, Lisandro Zambenedetti Granville
Comments: 7 pages, 3 figures, to be translated to Portuguese and submitted to the Regional Computer Networking Conference
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[11] arXiv:2108.00965 [pdf, other]
Title: Privacy-Aware Rejection Sampling
Jordan Awan, Vinayak Rao
Comments: 25 pages + references, 4 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Computation (stat.CO)
[12] arXiv:2108.01077 [pdf, other]
Title: Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution
Ron Shmelkin, Tomer Friedlander, Lior Wolf
Comments: accepted to IEEE International Conference on Automatic Face & Gesture Recognition 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[13] arXiv:2108.01124 [pdf, other]
Title: Efficacy of Statistical and Artificial Intelligence-based False Information Cyberattack Detection Models for Connected Vehicles
Sakib Mahmud Khan, Gurcan Comert, Mashrur Chowdhury
Comments: 18 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Applications (stat.AP)
[14] arXiv:2108.01281 [pdf, other]
Title: DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on Commercial EdgeML Device
Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin
Comments: 9 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:2108.01341 [pdf, other]
Title: Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
Ruomu Hou, Haifeng Yu, Prateek Saxena
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[16] arXiv:2108.01420 [pdf, other]
Title: Accountability and Forensics in Blockchains: XDC Consensus Engine DPoS 2.0
Gerui Wang, Jerome Wang, Liam Lai, Fisher Yu
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:2108.01521 [pdf, other]
Title: Bit-efficient Numerical Aggregation and Stronger Privacy for Trust in Federated Analytics
Graham Cormode, Igor L. Markov
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[18] arXiv:2108.01644 [pdf, other]
Title: The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models
Ambrish Rawat, Killian Levacher, Mathieu Sinn
Comments: 17 pages, 11 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[19] arXiv:2108.01696 [pdf, other]
Title: Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach
Benjamin Ampel, Sagar Samtani, Steven Ullman, Hsinchun Chen
Comments: Proceedings of 2021 ACM Conference Knowledge Discovery and Data Mining (KDD' 21) Workshop on AI-enabled Cybersecurity Analytics
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:2108.01753 [pdf, other]
Title: Optimally Hiding Object Sizes with Constrained Padding
Andrew C. Reed, Michael K. Reiter
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:2108.01755 [pdf, other]
Title: Finite Horizon Privacy of Stochastic Dynamical Systems: A Synthesis Framework for Dependent Gaussian Mechanisms
Haleh Hayati, Carlos Murguia, Nathan van de Wouw
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[22] arXiv:2108.01852 [pdf, other]
Title: Semi-supervised Conditional GAN for Simultaneous Generation and Detection of Phishing URLs: A Game theoretic Perspective
Sharif Amit Kamran, Shamik Sengupta, Alireza Tavakkoli
Comments: 5 Pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[23] arXiv:2108.01913 [pdf, other]
Title: Secure and Privacy-Preserving Federated Learning via Co-Utility
Josep Domingo-Ferrer, Alberto Blanco-Justicia, Jesús Manjón, David Sánchez
Comments: IEEE Internet of Things Journal, to appear
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[24] arXiv:2108.01979 [pdf, other]
Title: An Exhaustive Approach to Detecting Transient Execution Side Channels in RTL Designs of Processors
Mohammad Rahmani Fadiheh, Alex Wezel, Johannes Mueller, Joerg Bormann, Sayak Ray, Jason M. Fung, Subhasish Mitra, Dominik Stoffel, Wolfgang Kunz
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:2108.02006 [pdf, other]
Title: On the Importance of Domain-specific Explanations in AI-based Cybersecurity Systems (Technical Report)
Jose N. Paredes, Juan Carlos L. Teze, Gerardo I. Simari, Maria Vanina Martinez
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[26] arXiv:2108.02008 [pdf, other]
Title: Personal Devices for Contact Tracing: Smartphones and Wearables to Fight Covid-19
Pai Chet Ng, Petros Spachos, Stefano Gregori, Konstantinos Plataniotis
Comments: Accepted at the IEEE Communications Magazine
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[27] arXiv:2108.02100 [pdf, other]
Title: Blockchain-empowered Edge Intelligence for Internet of Medical Things Against COVID-19
Hong-Ning Dai, Yulei Wu, Hao Wang, Muhammad Imran, Noman Haider
Comments: 8 pages; 4 figures
Journal-ref: IEEE Internet of Things Magazine, Vol. 4, No. 2, June 2021
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[28] arXiv:2108.02156 [pdf, other]
Title: STBPU: A Reasonably Secure Branch Prediction Unit
Tao Zhang, Timothy Lesch, Kenneth Koltermann, Dmitry Evtyushkin
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[29] arXiv:2108.02287 [pdf, other]
Title: A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:2108.02293 [pdf, other]
Title: IoT Notary: Attestable Sensor Data Capture in IoT Environments
Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani
Comments: This version has been accepted in ACM Transactions on Internet Technology (TOIT), 2021. arXiv admin note: substantial text overlap with arXiv:1908.10033
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[31] arXiv:2108.02360 [pdf, other]
Title: Exploring Structure Consistency for Deep Model Watermarking
Jie Zhang, Dongdong Chen, Jing Liao, Han Fang, Zehua Ma, Weiming Zhang, Gang Hua, Nenghai Yu
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[32] arXiv:2108.02488 [pdf, other]
Title: Poison Ink: Robust and Invisible Backdoor Attack
Jie Zhang, Dongdong Chen, Qidong Huang, Jing Liao, Weiming Zhang, Huamin Feng, Gang Hua, Nenghai Yu
Comments: IEEE Transactions on Image Processing (TIP)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[33] arXiv:2108.02579 [pdf, other]
Title: Selective privacy in IoT smart-farms for battery-powered device longevity
Steph Rudd, Hamish Cunningham
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:2108.02618 [pdf, other]
Title: Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Erik Hemberg, Una-May O'Reilly
Comments: 5 pages, 2 Figures, 2 Tables, ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence- enabled Cybersecurity Analytics at KDD'21
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[35] arXiv:2108.02660 [pdf, other]
Title: Computing and Authentication Practices in Global Oil and Gas Fields
Mary Rose Martinez, Shriram Krishnamurthi
Comments: A partial and abbreviated version of this paper appears in EuroUSEC, the European Symposium on Usable Security, 2021
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[36] arXiv:2108.02713 [pdf, other]
Title: Role-based lateral movement detection with unsupervised learning
Brian A. Powell
Comments: 24 pages, 15 figures. Version submitted to JISA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[37] arXiv:2108.03107 [pdf, other]
Title: When Googling it doesn't work: The challenge of finding security advice for smart home devices
Sarah Turner, Jason R.C. Nurse, Shujun Li
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[38] arXiv:2108.03358 [pdf, other]
Title: PatchRNN: A Deep Learning-Based System for Security Patch Identification
Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck
Journal-ref: 2021 IEEE Military Communications Conference (MILCOM), 2021, pp. 595-600
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[39] arXiv:2108.03437 [pdf, other]
Title: Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption
Dimitris Stripelis, Hamza Saleem, Tanmay Ghai, Nikhil Dhinagar, Umang Gupta, Chrysovalantis Anastasiou, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, Jose Luis Ambite
Comments: 9 pages, 3 figures, 1 algorithm
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40] arXiv:2108.03629 [pdf, other]
Title: An Anonymous On-Street Parking Authentication Scheme via Zero-Knowledge Set Membership Proof
Jerry Chien Lin Ho, Chi-Yi Lin
Subjects: Cryptography and Security (cs.CR)
[41] arXiv:2108.03705 [pdf, other]
Title: The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization
Bumjin Im (1), Fangfei Yang (1), Chia-Che Tsai (2), Michael LeMay (3), Anjo Vahldiek-Oberwagner (3), Nathan Dautenhahn (1) ((1) Rice University, (2) Texas A&M University, (3) Intel Labs)
Comments: Revision: Fix 2 misspellings: 1) No white space in the title, 2) One of the Author's name
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:2108.03901 [pdf, other]
Title: Probabilistic annotations for protocol models
Dusko Pavlovic
Comments: 17 pages
Journal-ref: Lecture Notes in Computer Science, vol 13066, Springer 2021, pp. 332-347
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[43] arXiv:2108.03942 [pdf, other]
Title: ABBA: A quasi-deterministic Intrusion Detection System for the Internet of Things
Raoul Guiazon
Comments: Example implementation of the technique described at this https URL
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:2108.04040 [pdf, other]
Title: A novel reversible data hiding in encrypted images based on polynomial arithmetic
Lin Chen, Jianzhu Lu, Junguang Huang, Huiping Hu, Jiali Peng
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:2108.04125 [pdf, other]
Title: Mobile Blockchain Decentralized Applications (DApps): A Case Study Of IPTM Blockchain Certificate Verification System
Mohd Anuar Mat Isa, Muzaffar Hamzah, Daimler Benz Alebaba
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[46] arXiv:2108.04131 [pdf, other]
Title: Technical Report on a Virtual CTAP2 WebAuthn Authenticator
Chris Culnane, Christopher J. P. Newton, Helen Treharne
Comments: 28 pages, 3 figures, Open Source code repository: this https URL
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:2108.04183 [pdf, other]
Title: Understanding Fuchsia Security
Francesco Pagano, Luca Verderame, Alessio Merlo
Journal-ref: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, September 2021
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[48] arXiv:2108.04303 [pdf, other]
Title: Canonical Noise Distributions and Private Hypothesis Tests
Jordan Awan, Salil Vadhan
Comments: 23 pages + references and appendix. 4 figures
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[49] arXiv:2108.04314 [pdf, other]
Title: Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification
Fangtian Zhong, Zekai Chen, Minghui Xu, Guoming Zhang, Dongxiao Yu, Xiuzhen Cheng
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:2108.04374 [pdf, other]
Title: Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings
Martin Byrenheid, Stefanie Roos, Thorsten Strufe
Comments: 11 pages, 6 figures, Extended version of paper published at ICDCN 2022
Subjects: Cryptography and Security (cs.CR)
Total of 285 entries : 1-50 51-100 101-150 151-200 ... 251-285
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack