Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2021

Total of 285 entries : 1-100 101-200 201-285
Showing up to 100 entries per page: fewer | more | all
[101] arXiv:2108.08273 [pdf, other]
Title: User configurable 3D object regeneration for spatial privacy
Arpit Nama, Amaya Dharmasiri, Kanchana Thilakarathna, Albert Zomaya, Jaybie Agullo de Guzman
Subjects: Cryptography and Security (cs.CR)
[102] arXiv:2108.08275 [pdf, other]
Title: TB-ICT: A Trustworthy Blockchain-Enabled System for Indoor COVID-19 Contact Tracing
Mohammad Salimibeni, Zohreh Hajiakhondi-Meybodi, Arash Mohammadi, Yingxu Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[103] arXiv:2108.08282 [pdf, other]
Title: OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations
Pengcheng Jiang, Kenji Tei
Comments: 9 pages, 15 figures, 3 tables. This paper has been accepted for presentation at the 2021 IEEE Symposium Series on Computational Intelligence (SSCI) (SSCI 2021) and for publication in the conference proceedings published by IEEE
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Machine Learning (cs.LG)
[104] arXiv:2108.08288 [pdf, other]
Title: On computations with Double Schubert Automaton and stable maps of Multivariate Cryptography
Vasyl Ustimenko
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Group Theory (math.GR); Rings and Algebras (math.RA)
[105] arXiv:2108.08338 [pdf, other]
Title: Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy
Frederico Schardong, Ricardo Custódio
Subjects: Cryptography and Security (cs.CR); Digital Libraries (cs.DL)
[106] arXiv:2108.08394 [pdf, other]
Title: Learning to Detect: A Data-driven Approach for Network Intrusion Detection
Zachary Tauscher, Yushan Jiang, Kai Zhang, Jian Wang, Houbing Song
Comments: Accepted paper in the IEEE 40th International Performance Computing and Communications Conference - IPCCC 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[107] arXiv:2108.08455 [pdf, other]
Title: BackREST: A Model-Based Feedback-Driven Greybox Fuzzer for Web Applications
François Gauthier (1), Behnaz Hassanshahi (1), Benjamin Selwyn-Smith (1), Trong Nhan Mai (1), Max Schlüter (1), Micah Williams (2) ((1) Oracle Labs, (2) Oracle)
Subjects: Cryptography and Security (cs.CR)
[108] arXiv:2108.08471 [pdf, other]
Title: Decentralized Policy Information Points for Multi-Domain Environments
M Ridwanur Rahman, Ahmad Salehi Shahraki, Carsten Rudolph
Subjects: Cryptography and Security (cs.CR)
[109] arXiv:2108.08476 [pdf, other]
Title: Proceedings of the 1st International Workshop on Adaptive Cyber Defense
Damian Marriott, Kimberly Ferguson-Walter, Sunny Fugate, Marco Carvalho
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[110] arXiv:2108.08546 [pdf, other]
Title: Secure Decision Forest Evaluation
Slim Bettaieb, Loic Bidoux, Olivier Blazy (XLIM), Baptiste Cottier (DI-ENS, CASCADE, ENS Paris), David Pointcheval (DI-ENS, CASCADE, ENS Paris)
Journal-ref: ARES 2021 - 16th International Conference on Availability, Reliability and Security, Aug 2021, Vienna, Austria. pp.1-12
Subjects: Cryptography and Security (cs.CR)
[111] arXiv:2108.08581 [pdf, other]
Title: F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure
Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig
Comments: Network and Distributed System Security Symposium (NDSS) 2022
Subjects: Cryptography and Security (cs.CR)
[112] arXiv:2108.08624 [pdf, other]
Title: 2PPS -- Publish/Subscribe with Provable Privacy
Sarah Abdelwahab Gaballah, Christoph Coijanovic, Thorsten Strufe, Max Mühlhäuser
Comments: --
Subjects: Cryptography and Security (cs.CR)
[113] arXiv:2108.08683 [pdf, other]
Title: MESH: A Memory-Efficient Safe Heap for C/C++
Emanuel Q. Vintila, Philipp Zieris, Julian Horsch
Comments: Original publication in The 16th International Conference on Availability, Reliability and Security (ARES 2021)
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[114] arXiv:2108.08881 [pdf, other]
Title: Signal Injection Attacks against CCD Image Sensors
Sebastian Köhler, Richard Baker, Ivan Martinovic
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[115] arXiv:2108.08924 [pdf, other]
Title: Network Security Modeling using NetFlow Data: Detecting Botnet attacks in IP Traffic
Ganesh Subramaniam, Huan Chen, Ravi Varadhan, Robert Archibald
Subjects: Cryptography and Security (cs.CR)
[116] arXiv:2108.08977 [pdf, other]
Title: CloudShield: Real-time Anomaly Detection in the Cloud
Zecheng He, Ruby B. Lee
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[117] arXiv:2108.09019 [pdf, other]
Title: Privacy-Preserving Batch-based Task Assignment in Spatial Crowdsourcing with Untrusted Server
Maocheng Li, Jiachuan Wang, Libin Zheng, Han Wu, Peng Cheng, Lei Chen, Xuemin Lin
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118] arXiv:2108.09033 [pdf, other]
Title: UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
Comments: Proceedings of the 21st Workshop on Privacy in the Electronic Society (WPES '22), November 7, 2022, Los Angeles, CA, USA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119] arXiv:2108.09052 [pdf, other]
Title: SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
Comments: Proceedings of the 21st Workshop on Privacy in the Electronic Society (WPES '22), November 7, 2022, Los Angeles, CA, USA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[120] arXiv:2108.09062 [pdf, other]
Title: Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks
Yuwei Sun, Hideya Ochiai, Hiroshi Esaki
Comments: 5 pages, 7 figures, submitted to 2022 IEEE Consumer Communications & Networking Conference
Subjects: Cryptography and Security (cs.CR)
[121] arXiv:2108.09065 [pdf, other]
Title: Regulating Ownership Verification for Deep Neural Networks: Scenarios, Protocols, and Prospects
Fang-Qi Li, Shi-Lin Wang, Alan Wee-Chung Liew
Comments: IJCAI 2021 Workshop on Toward IPR on Deep Learning as Services
Subjects: Cryptography and Security (cs.CR)
[122] arXiv:2108.09118 [pdf, other]
Title: CybORG: A Gym for the Development of Autonomous Cyber Agents
Maxwell Standen, Martin Lucas, David Bowman, Toby J. Richer, Junae Kim, Damian Marriott
Comments: Presented at IJCAI-21 1st International Workshop on Adaptive Cyber Defense
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:2108.09187 [pdf, other]
Title: Quantization Backdoors to Deep Learning Commercial Frameworks
Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Zhang Jiliang, Said Al-Sarawi, Derek Abbott
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[124] arXiv:2108.09199 [pdf, other]
Title: An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks
Mahdi Soltani, Behzad Ousat, Mahdi Jafari Siavoshani, Amir Hossein Jahangir
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[125] arXiv:2108.09249 [pdf, other]
Title: Mining Secure Behavior of Hardware Designs
Calvin Deutschbein
Comments: Final accepted version of Ph.D. Thesis. 121 Pages, 18 figures, 24 tables. Chapter 5 based on work in arXiv:2106.07449. Advised by Cynthia Sturton, approved by Fabian Monrose, Peng Huang, Donald Porter, Michael Reiter. Based on work with Cynthia Sturton, Andres Meza, Francesco Restuccia, Ryan Kastner. Completed at UNC-CH, author currently at Willamette University
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[126] arXiv:2108.09293 [pdf, other]
Title: Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions
Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri
Comments: Accepted for publication in IEEE Symposium on Security and Privacy 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[127] arXiv:2108.09358 [pdf, other]
Title: Crown Jewels Analysis using Reinforcement Learning with Attack Graphs
Rohit Gangupantulu, Tyler Cody, Abdul Rahman, Christopher Redino, Ryan Clark, Paul Park
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[128] arXiv:2108.09369 [pdf, other]
Title: OSRM-CCTV: Open-source CCTV-aware routing and navigation system for privacy, anonymity and safety (Preprint)
Lauri Sintonen, Hannu Turtiainen, Andrei Costin, Timo Hamalainen, Tuomo Lahtinen
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[129] arXiv:2108.09370 [pdf, other]
Title: Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon, Laszlo B. Kish
Comments: 11 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[130] arXiv:2108.09454 [pdf, other]
Title: "Adversarial Examples" for Proof-of-Learning
Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wu, Qingbiao Wang, Kui Ren
Comments: To appear in the 43rd IEEE Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[131] arXiv:2108.09508 [pdf, other]
Title: Data Security and Privacy in Cloud Computing: Concepts and Emerging Trends
Rishabh Gupta, Deepika Saxena, Ashutosh Kumar Singh
Comments: 9 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[132] arXiv:2108.09528 [pdf, other]
Title: Statistical Quantification of Differential Privacy: A Local Approach
Önder Askin, Tim Kutta, Holger Dette
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST); Methodology (stat.ME)
[133] arXiv:2108.09539 [pdf, other]
Title: SAI-BA-IoMT: Secure AI-Based Blockchain-Assisted Internet of Medical Things Tool to Moderate the Outbreak of COVID-19 Crisis
Mahender Kumar, Ruby Rani
Subjects: Cryptography and Security (cs.CR)
[134] arXiv:2108.09576 [pdf, other]
Title: A Survey on Common Threats in npm and PyPi Registries
Berkay Kaplan, Jingyu Qian
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[135] arXiv:2108.09879 [pdf, other]
Title: AMPPERE: A Universal Abstract Machine for Privacy-Preserving Entity Resolution Evaluation
Yixiang Yao, Tanmay Ghai, Srivatsan Ravi, Pedro Szekely
Comments: 10 pages, 6 figures, Published in CIKM '21; corrected title & fixed abstract formatting
Subjects: Cryptography and Security (cs.CR)
[136] arXiv:2108.09931 [pdf, other]
Title: Towards a Formal Modelling, Analysis, and Verification of a Clone Node Attack Detection Scheme in the Internet of Things
Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang
Subjects: Cryptography and Security (cs.CR)
[137] arXiv:2108.10071 [pdf, other]
Title: Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts
Christof Ferreira Torres, Hugo Jonker, Radu State
Subjects: Cryptography and Security (cs.CR)
[138] arXiv:2108.10251 [pdf, other]
Title: Kryptonite: An Adversarial Attack Using Regional Focus
Yogesh Kulkarni, Krisha Bhambani
Comments: Paper Accepted at ACNS'21 (Workshops)
Journal-ref: LNCS, volume 12809, 2021
Subjects: Cryptography and Security (cs.CR)
[139] arXiv:2108.10319 [pdf, other]
Title: Enhancing Security in VANETs with Efficient Sybil Attack Detection using Fog Computing
Anirudh Paranjothi, Mohammed Atiquzzaman
Comments: arXiv admin note: substantial text overlap with arXiv:2102.00839, arXiv:2108.10267
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[140] arXiv:2108.10344 [pdf, other]
Title: Issuing Green Bonds on the Algorand Blockchain
Gidon Katten
Subjects: Cryptography and Security (cs.CR)
[141] arXiv:2108.10381 [pdf, other]
Title: On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps
Jordan Samhi, Alexandre Bartel
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[142] arXiv:2108.10422 [pdf, other]
Title: An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors
George Karantzas, Constantinos Patsakis
Comments: This is the revised (and final) version of this https URL with more EDRs and proper classification of products into EDRs and EPPs
Subjects: Cryptography and Security (cs.CR)
[143] arXiv:2108.10534 [pdf, other]
Title: Authentication and Access Control in 5G Device-to-Device Communication
Jithu Geevargheese Panicker, Ahmad Salehi S., Carsten Rudolph
Subjects: Cryptography and Security (cs.CR)
[144] arXiv:2108.10567 [pdf, other]
Title: Image-based Insider Threat Detection via Geometric Transformation
Dongyang Li, Lin Yang, Hongguang Zhang, Xiaolei Wang, Linru Ma, Junchao Xiao
Comments: 15 pages, 8 figures,6 tables
Subjects: Cryptography and Security (cs.CR)
[145] arXiv:2108.10770 [pdf, other]
Title: On the linear complexity of feedforward clock-controlled sequence
Yangpan Zhang, Maozhi Xu
Comments: 18 pages, 1 figures. This paper was accepted by inscrypt2021(The 17th International Conference on Information Security and Cryptology)
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[146] arXiv:2108.10771 [pdf, other]
Title: Transient Execution of Non-Canonical Accesses
Saidgani Musaev, Christof Fetzer
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[147] arXiv:2108.10799 [pdf, other]
Title: Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts
Lu Liu, Lili Wei, Wuqi Zhang, Ming Wen, Yepang Liu, Shing-Chi Cheung
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[148] arXiv:2108.10908 [pdf, other]
Title: GGNB: Graph-Based Gaussian Naive Bayes Intrusion Detection System for CAN Bus
Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[149] arXiv:2108.10990 [pdf, other]
Title: Online Dictionary Learning Based Fault and Cyber Attack Detection for Power Systems
Gabriel Intriago, Yu Zhang
Comments: Accepted to the 2021 IEEE Power and Energy Society (PES) General Meeting
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[150] arXiv:2108.11023 [pdf, other]
Title: EncoderMI: Membership Inference against Pre-trained Encoders in Contrastive Learning
Hongbin Liu, Jinyuan Jia, Wenjie Qu, Neil Zhenqiang Gong
Comments: To appear in ACM Conference on Computer and Communications Security (CCS), 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[151] arXiv:2108.11037 [pdf, other]
Title: Decoys in Cybersecurity: An Exploratory Study to Test the Effectiveness of 2-sided Deception
Palvi Aggarwal, Yinuo Du, Kuldeep Singh, Cleotilde Gonzalez
Comments: Presented at 1st International Workshop on Adaptive Cyber Defense, 2021 (arXiv:2108.08476)
Subjects: Cryptography and Security (cs.CR)
[152] arXiv:2108.11115 [pdf, other]
Title: Correlation Differential Power Analysis Attack to Midori64
Behrooz Khadem, Hamid Ghanbari, Amin Masoumi souteh
Comments: 9 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[153] arXiv:2108.11206 [pdf, other]
Title: Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT&CK
Robert Pell, Sotiris Moschoyiannis, Emmanouil Panaousis, Ryan Heartfield
Subjects: Cryptography and Security (cs.CR)
[154] arXiv:2108.11207 [pdf, other]
Title: Multi-Stage Threat Modelling and Security Monitoring in 5GCN
Robert Pell, Sotiris Moschoyiannis, Emmanouil Panaousis
Subjects: Cryptography and Security (cs.CR)
[155] arXiv:2108.11335 [pdf, other]
Title: A Tutorial on Design Obfuscation: from Transistors to Systems
Samuel Pagliarini
Comments: 3 pages + ieee copyright notice
Subjects: Cryptography and Security (cs.CR)
[156] arXiv:2108.11444 [pdf, other]
Title: PIVODL: Privacy-preserving vertical federated learning over distributed labels
Hangyu Zhu, Rui Wang, Yaochu Jin, Kaitai Liang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[157] arXiv:2108.11445 [pdf, other]
Title: Group Authentication for Drone Swarms
Yucel Aydin, Gunes Karabulur Kurt, Enver Ozdemir, Halim Yanikomeroglu
Comments: Published in IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE)
Journal-ref: 2021 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE)
Subjects: Cryptography and Security (cs.CR)
[158] arXiv:2108.11527 [pdf, other]
Title: Subspace Differential Privacy
Jie Gao, Ruobin Gong, Fang-Yi Yu
Comments: 25 pages, 3 figures; Published in AAAI'22
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[159] arXiv:2108.11818 [pdf, other]
Title: Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain
Banwari Lal, Rachit Agarwal, Sandeep Kumar Shukla
Comments: Submitted
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[160] arXiv:2108.11861 [pdf, other]
Title: Security and privacy for 6G: A survey on prospective technologies and challenges
Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
Comments: 45 pages, 28 figures, accepted at IEEE Communications Surveys and Tutorials, 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[161] arXiv:2108.12032 [pdf, other]
Title: Blockchain in Supply Chain: Opportunities and Design Considerations
Gowri Sankar Ramachandran, Sidra Malik, Shantanu Pal, Ali Dorri, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak
Subjects: Cryptography and Security (cs.CR)
[162] arXiv:2108.12071 [pdf, html, other]
Title: Identifying Non-Control Security-Critical Data through Program Dependence Learning
Zhilong Wang, Haizhou Wang, Hong Hu, Peng Liu
Comments: 13 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[163] arXiv:2108.12079 [pdf, other]
Title: Dimming Down LED: An Open-source Threshold Implementation on Light Encryption Device (LED) Block Cipher
Yuan Yao, Mo Yang, Pantea Kiaei, Patrick Schaumont
Comments: Side-channel Analysis, Side-channel Countermeasure, Threshold Implementation, Open-source
Subjects: Cryptography and Security (cs.CR)
[164] arXiv:2108.12161 [pdf, other]
Title: On Securing MAC Layer Broadcast Signals Against Covert Channel Exploitation in 5G, 6G & Beyond
Reza Soosahabi (1 and 2), Magdy Bayoumi (2) ((1) Keysight Technologies Inc., (2) University of Louisiana at Lafayette)
Comments: 8 pages, 7 figures, "This is a significantly revised version of the earlier submission arXiv:2108.12161 in 2021. This work will be published in IEEE Future Networks World Forum 2022 conference proceedings. The copy right will be transferred to IEEE without notice upon the publication."
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
[165] arXiv:2108.12336 [pdf, other]
Title: Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks
Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[166] arXiv:2108.12392 [pdf, other]
Title: Pairing for Greenhorn: Survey and Future Perspective
Mahender Kumar, Satish Chand
Subjects: Cryptography and Security (cs.CR)
[167] arXiv:2108.12473 [pdf, other]
Title: Mal2GCN: A Robust Malware Detection Approach Using Deep Graph Convolutional Networks With Non-Negative Weights
Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili
Comments: 13 pages, 12 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[168] arXiv:2108.12479 [pdf, other]
Title: Modeling and Analyzing Attacker Behavior in IoT Botnet using Temporal Convolution Network (TCN)
Farhan Sadique, Shamik Sengupta
Comments: arXiv admin note: text overlap with arXiv:2106.04720
Subjects: Cryptography and Security (cs.CR)
[169] arXiv:2108.12579 [pdf, other]
Title: Power-Based Attacks on Spatial DNN Accelerators
Ge Li, Mohit Tiwari, Michael Orshansky
Comments: 18 pages, 10 figures, accepted by the ACM Journal on Emerging Technologies in Computing Systems
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[170] arXiv:2108.12705 [pdf, other]
Title: CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services
David Buckley, Gueltoum Bendiab, Stavros Shiaeles, Nick Savage, Nicholas Kolokotronis
Comments: 7 pages, 4 figures, 1 table
Journal-ref: 2021 IEEE International Conference on Communications Workshops (ICC Workshops)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[171] arXiv:2108.12726 [pdf, other]
Title: Characterizing Malicious URL Campaigns
Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[172] arXiv:2108.12732 [pdf, other]
Title: Feature Analysis for Machine Learning-based IoT Intrusion Detection
Mohanad Sarhan, Siamak Layeghy, Marius Portmann
Comments: 22 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:2108.12722
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[173] arXiv:2108.12739 [pdf, other]
Title: Risk-Aware Fine-Grained Access Control in Cyber-Physical Contexts
Jinxin Liu, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew Malton, Andrew Walenstein
Comments: ACM Digital Threats: Research and Practice, 2021 30 pages, 14 Figures, 14 Tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[174] arXiv:2108.12792 [pdf, other]
Title: Making Honey Files Sweeter: SentryFS -- A Service-Oriented Smart Ransomware Solution
Abdul Rahim Saleh, Gihad Al-Nemera, Saif Al-Otaibi, Rashid Tahir, Mohammed Alkhatib
Comments: Editor: Barbara Gallina. 17th European Dependable Computing Conference (EDCC 2021), September 13-16, 2021, Munich, Germany. Fast Abstract Proceedings- EDCC 2021
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[175] arXiv:2108.13086 [pdf, other]
Title: A New Lever Function with Adequate Indeterminacy
Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[176] arXiv:2108.13261 [pdf, other]
Title: Thermal Management in Large Data Centers: Security Threats and Mitigation
Betty Saridou, Gueltoum Bendiab, Stavros N. Shiaeles, Basil K. Papadopoulos
Comments: 15 pages, 3 figures
Journal-ref: Security in Computing and Communications. SSCC 2020. Communications in Computer and Information Science, vol 1364. Springer, Singapore
Subjects: Cryptography and Security (cs.CR)
[177] arXiv:2108.13307 [pdf, other]
Title: Security For System-On-Chip (SoC) Using Neural Networks
Vedant Ghodke, Shubham Deshmukh, Atharva Deshpande, Ninad Ekbote, Swati Shilaskar
Comments: Challenges with content validity
Subjects: Cryptography and Security (cs.CR)
[178] arXiv:2108.13333 [pdf, other]
Title: A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning
Luke Barlow, Gueltoum Bendiaby, Stavros Shiaelesy, Nick Savage
Comments: 7 pages, 6 figures, 1 table
Journal-ref: 2020 IEEE World Congress on Services (SERVICES)
Subjects: Cryptography and Security (cs.CR)
[179] arXiv:2108.13373 [pdf, other]
Title: ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[180] arXiv:2108.13502 [pdf, other]
Title: Generalizing Weighted Trees: A Bridge from Bitcoin to GHOST
Ignacio Amores-Sesar, Christian Cachin, Anna Parker
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[181] arXiv:2108.13617 [pdf, other]
Title: Segmentation Fault: A Cheap Defense Against Adversarial Machine Learning
Doha Al Bared, Mohamed Nassar
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[182] arXiv:2108.13785 [pdf, other]
Title: DLPFS: The Data Leakage Prevention FileSystem
Stefano Braghin, Marco Simioni, Mathieu Sinn
Comments: 11 pages, 11 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[183] arXiv:2108.13797 [pdf, other]
Title: Sample Efficient Detection and Classification of Adversarial Attacks via Self-Supervised Embeddings
Mazda Moayeri, Soheil Feizi
Comments: Accepted to ICCV 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[184] arXiv:2108.13807 [pdf, other]
Title: Identifying Ransomware Actors in the Bitcoin Network
Siddhartha Dalal, Zihe Wang, Siddhanth Sabharwal
Journal-ref: MLIOB-2 Conference, 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[185] arXiv:2108.13818 [pdf, other]
Title: Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks
Hernán Ponce-de-León, Johannes Kinder
Journal-ref: IEEE Symposium on Security and Privacy, 2022
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[186] arXiv:2108.13872 [pdf, other]
Title: Reinforcement Learning Based Sparse Black-box Adversarial Attack on Video Recognition Models
Zeyuan Wang, Chaofeng Sha, Su Yang
Comments: Accepted as a conference paper of IJCAI-21 (the 30th International Joint Conference on Artificial Intelligence)
Journal-ref: Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence (IJCAI-21), pages 3162-3168, 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[187] arXiv:2108.13873 [pdf, other]
Title: Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs
Qiongkai Xu, Xuanli He, Lingjuan Lyu, Lizhen Qu, Gholamreza Haffari
Comments: COLING 2022 (oral)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[188] arXiv:2108.13888 [pdf, other]
Title: Backdoor Attacks on Pre-trained Models by Layerwise Weight Poisoning
Linyang Li, Demin Song, Xiaonan Li, Jiehang Zeng, Ruotian Ma, Xipeng Qiu
Comments: Accepted by EMNLP2021 main conference
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[189] arXiv:2108.13922 [pdf, other]
Title: Stockade: Hardware Hardening for Distributed Trusted Sandboxes
Joongun Park, Seunghyo Kang, Sanghyeon Lee, Taehoon Kim, Jongse Park, Youngjin Kwon, Jaehyuk Huh
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[190] arXiv:2108.13930 [pdf, other]
Title: EG-Booster: Explanation-Guided Booster of ML Evasion Attacks
Abderrahmen Amich, Birhanu Eshete
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[191] arXiv:2108.13980 [pdf, other]
Title: Incorporating Deception into CyberBattleSim for Autonomous Defense
Erich Walter, Kimberly Ferguson-Walter, Ahmad Ridley
Comments: Presented at 1st International Workshop on Adaptive Cyber Defense, 2021 (arXiv:2108.08476)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[192] arXiv:2108.13989 [pdf, other]
Title: DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning
Mohammad Mamun, Kevin Shi
Comments: Conference: IEEE Trustcom 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[193] arXiv:2108.14004 [pdf, other]
Title: EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion
Nikolay Ivanov, Qiben Yan
Comments: IEEE Conference on Communications and Network Security (CNS 2021)
Subjects: Cryptography and Security (cs.CR)
[194] arXiv:2108.00331 (cross-list from cs.LG) [pdf, other]
Title: Faster Rates of Private Stochastic Convex Optimization
Jinyan Su, Lijie Hu, Di Wang
Comments: To appear in The 33rd International Conference on Algorithmic Learning Theory. In this version, we fixed some typos and correct the prove of lower bound
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[195] arXiv:2108.00365 (cross-list from cs.LG) [pdf, other]
Title: A Decentralized Federated Learning Framework via Committee Mechanism with Convergence Guarantee
Chunjiang Che, Xiaoli Li, Chuan Chen, Xiaoyu He, Zibin Zheng
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[196] arXiv:2108.00401 (cross-list from cs.CV) [pdf, other]
Title: Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah
Comments: 35 pages, 450+ references
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[197] arXiv:2108.00468 (cross-list from quant-ph) [pdf, other]
Title: Remote quantum-safe authentication of entities with physical unclonable functions
Georgios M. Nikolopoulos
Comments: close to the version published in Photonics
Journal-ref: Photonics 8(7), 289 (2021)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[198] arXiv:2108.00491 (cross-list from cs.LG) [pdf, other]
Title: Certified Defense via Latent Space Randomized Smoothing with Orthogonal Encoders
Huimin Zeng, Jiahao Su, Furong Huang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[199] arXiv:2108.00551 (cross-list from cs.AI) [pdf, other]
Title: Cybonto: Towards Human Cognitive Digital Twins for Cybersecurity
Tam N. Nguyen
Comments: 6 pages, 3 figures, 1 table
Journal-ref: JMIRx Med 2022;3(2):e33502
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[200] arXiv:2108.00701 (cross-list from cs.LG) [pdf, other]
Title: Information Stealing in Federated Learning Systems Based on Generative Adversarial Networks
Yuwei Sun, Ng Chong, Hideya Ochiai
Comments: 7 pages, 11 figures, to be published in proceedings of IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
Total of 285 entries : 1-100 101-200 201-285
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack