Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2021

Total of 285 entries : 1-50 51-100 101-150 151-200 201-250 251-285
Showing up to 50 entries per page: fewer | more | all
[101] arXiv:2108.08273 [pdf, other]
Title: User configurable 3D object regeneration for spatial privacy
Arpit Nama, Amaya Dharmasiri, Kanchana Thilakarathna, Albert Zomaya, Jaybie Agullo de Guzman
Subjects: Cryptography and Security (cs.CR)
[102] arXiv:2108.08275 [pdf, other]
Title: TB-ICT: A Trustworthy Blockchain-Enabled System for Indoor COVID-19 Contact Tracing
Mohammad Salimibeni, Zohreh Hajiakhondi-Meybodi, Arash Mohammadi, Yingxu Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[103] arXiv:2108.08282 [pdf, other]
Title: OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations
Pengcheng Jiang, Kenji Tei
Comments: 9 pages, 15 figures, 3 tables. This paper has been accepted for presentation at the 2021 IEEE Symposium Series on Computational Intelligence (SSCI) (SSCI 2021) and for publication in the conference proceedings published by IEEE
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Machine Learning (cs.LG)
[104] arXiv:2108.08288 [pdf, other]
Title: On computations with Double Schubert Automaton and stable maps of Multivariate Cryptography
Vasyl Ustimenko
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Group Theory (math.GR); Rings and Algebras (math.RA)
[105] arXiv:2108.08338 [pdf, other]
Title: Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy
Frederico Schardong, Ricardo Custódio
Subjects: Cryptography and Security (cs.CR); Digital Libraries (cs.DL)
[106] arXiv:2108.08394 [pdf, other]
Title: Learning to Detect: A Data-driven Approach for Network Intrusion Detection
Zachary Tauscher, Yushan Jiang, Kai Zhang, Jian Wang, Houbing Song
Comments: Accepted paper in the IEEE 40th International Performance Computing and Communications Conference - IPCCC 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[107] arXiv:2108.08455 [pdf, other]
Title: BackREST: A Model-Based Feedback-Driven Greybox Fuzzer for Web Applications
François Gauthier (1), Behnaz Hassanshahi (1), Benjamin Selwyn-Smith (1), Trong Nhan Mai (1), Max Schlüter (1), Micah Williams (2) ((1) Oracle Labs, (2) Oracle)
Subjects: Cryptography and Security (cs.CR)
[108] arXiv:2108.08471 [pdf, other]
Title: Decentralized Policy Information Points for Multi-Domain Environments
M Ridwanur Rahman, Ahmad Salehi Shahraki, Carsten Rudolph
Subjects: Cryptography and Security (cs.CR)
[109] arXiv:2108.08476 [pdf, other]
Title: Proceedings of the 1st International Workshop on Adaptive Cyber Defense
Damian Marriott, Kimberly Ferguson-Walter, Sunny Fugate, Marco Carvalho
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[110] arXiv:2108.08546 [pdf, other]
Title: Secure Decision Forest Evaluation
Slim Bettaieb, Loic Bidoux, Olivier Blazy (XLIM), Baptiste Cottier (DI-ENS, CASCADE, ENS Paris), David Pointcheval (DI-ENS, CASCADE, ENS Paris)
Journal-ref: ARES 2021 - 16th International Conference on Availability, Reliability and Security, Aug 2021, Vienna, Austria. pp.1-12
Subjects: Cryptography and Security (cs.CR)
[111] arXiv:2108.08581 [pdf, other]
Title: F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure
Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig
Comments: Network and Distributed System Security Symposium (NDSS) 2022
Subjects: Cryptography and Security (cs.CR)
[112] arXiv:2108.08624 [pdf, other]
Title: 2PPS -- Publish/Subscribe with Provable Privacy
Sarah Abdelwahab Gaballah, Christoph Coijanovic, Thorsten Strufe, Max Mühlhäuser
Comments: --
Subjects: Cryptography and Security (cs.CR)
[113] arXiv:2108.08683 [pdf, other]
Title: MESH: A Memory-Efficient Safe Heap for C/C++
Emanuel Q. Vintila, Philipp Zieris, Julian Horsch
Comments: Original publication in The 16th International Conference on Availability, Reliability and Security (ARES 2021)
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[114] arXiv:2108.08881 [pdf, other]
Title: Signal Injection Attacks against CCD Image Sensors
Sebastian Köhler, Richard Baker, Ivan Martinovic
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[115] arXiv:2108.08924 [pdf, other]
Title: Network Security Modeling using NetFlow Data: Detecting Botnet attacks in IP Traffic
Ganesh Subramaniam, Huan Chen, Ravi Varadhan, Robert Archibald
Subjects: Cryptography and Security (cs.CR)
[116] arXiv:2108.08977 [pdf, other]
Title: CloudShield: Real-time Anomaly Detection in the Cloud
Zecheng He, Ruby B. Lee
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[117] arXiv:2108.09019 [pdf, other]
Title: Privacy-Preserving Batch-based Task Assignment in Spatial Crowdsourcing with Untrusted Server
Maocheng Li, Jiachuan Wang, Libin Zheng, Han Wu, Peng Cheng, Lei Chen, Xuemin Lin
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118] arXiv:2108.09033 [pdf, other]
Title: UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
Comments: Proceedings of the 21st Workshop on Privacy in the Electronic Society (WPES '22), November 7, 2022, Los Angeles, CA, USA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119] arXiv:2108.09052 [pdf, other]
Title: SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
Comments: Proceedings of the 21st Workshop on Privacy in the Electronic Society (WPES '22), November 7, 2022, Los Angeles, CA, USA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[120] arXiv:2108.09062 [pdf, other]
Title: Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks
Yuwei Sun, Hideya Ochiai, Hiroshi Esaki
Comments: 5 pages, 7 figures, submitted to 2022 IEEE Consumer Communications & Networking Conference
Subjects: Cryptography and Security (cs.CR)
[121] arXiv:2108.09065 [pdf, other]
Title: Regulating Ownership Verification for Deep Neural Networks: Scenarios, Protocols, and Prospects
Fang-Qi Li, Shi-Lin Wang, Alan Wee-Chung Liew
Comments: IJCAI 2021 Workshop on Toward IPR on Deep Learning as Services
Subjects: Cryptography and Security (cs.CR)
[122] arXiv:2108.09118 [pdf, other]
Title: CybORG: A Gym for the Development of Autonomous Cyber Agents
Maxwell Standen, Martin Lucas, David Bowman, Toby J. Richer, Junae Kim, Damian Marriott
Comments: Presented at IJCAI-21 1st International Workshop on Adaptive Cyber Defense
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:2108.09187 [pdf, other]
Title: Quantization Backdoors to Deep Learning Commercial Frameworks
Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Zhang Jiliang, Said Al-Sarawi, Derek Abbott
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[124] arXiv:2108.09199 [pdf, other]
Title: An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks
Mahdi Soltani, Behzad Ousat, Mahdi Jafari Siavoshani, Amir Hossein Jahangir
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[125] arXiv:2108.09249 [pdf, other]
Title: Mining Secure Behavior of Hardware Designs
Calvin Deutschbein
Comments: Final accepted version of Ph.D. Thesis. 121 Pages, 18 figures, 24 tables. Chapter 5 based on work in arXiv:2106.07449. Advised by Cynthia Sturton, approved by Fabian Monrose, Peng Huang, Donald Porter, Michael Reiter. Based on work with Cynthia Sturton, Andres Meza, Francesco Restuccia, Ryan Kastner. Completed at UNC-CH, author currently at Willamette University
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[126] arXiv:2108.09293 [pdf, other]
Title: Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions
Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri
Comments: Accepted for publication in IEEE Symposium on Security and Privacy 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[127] arXiv:2108.09358 [pdf, other]
Title: Crown Jewels Analysis using Reinforcement Learning with Attack Graphs
Rohit Gangupantulu, Tyler Cody, Abdul Rahman, Christopher Redino, Ryan Clark, Paul Park
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[128] arXiv:2108.09369 [pdf, other]
Title: OSRM-CCTV: Open-source CCTV-aware routing and navigation system for privacy, anonymity and safety (Preprint)
Lauri Sintonen, Hannu Turtiainen, Andrei Costin, Timo Hamalainen, Tuomo Lahtinen
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[129] arXiv:2108.09370 [pdf, other]
Title: Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon, Laszlo B. Kish
Comments: 11 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[130] arXiv:2108.09454 [pdf, other]
Title: "Adversarial Examples" for Proof-of-Learning
Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wu, Qingbiao Wang, Kui Ren
Comments: To appear in the 43rd IEEE Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[131] arXiv:2108.09508 [pdf, other]
Title: Data Security and Privacy in Cloud Computing: Concepts and Emerging Trends
Rishabh Gupta, Deepika Saxena, Ashutosh Kumar Singh
Comments: 9 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[132] arXiv:2108.09528 [pdf, other]
Title: Statistical Quantification of Differential Privacy: A Local Approach
Önder Askin, Tim Kutta, Holger Dette
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST); Methodology (stat.ME)
[133] arXiv:2108.09539 [pdf, other]
Title: SAI-BA-IoMT: Secure AI-Based Blockchain-Assisted Internet of Medical Things Tool to Moderate the Outbreak of COVID-19 Crisis
Mahender Kumar, Ruby Rani
Subjects: Cryptography and Security (cs.CR)
[134] arXiv:2108.09576 [pdf, other]
Title: A Survey on Common Threats in npm and PyPi Registries
Berkay Kaplan, Jingyu Qian
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[135] arXiv:2108.09879 [pdf, other]
Title: AMPPERE: A Universal Abstract Machine for Privacy-Preserving Entity Resolution Evaluation
Yixiang Yao, Tanmay Ghai, Srivatsan Ravi, Pedro Szekely
Comments: 10 pages, 6 figures, Published in CIKM '21; corrected title & fixed abstract formatting
Subjects: Cryptography and Security (cs.CR)
[136] arXiv:2108.09931 [pdf, other]
Title: Towards a Formal Modelling, Analysis, and Verification of a Clone Node Attack Detection Scheme in the Internet of Things
Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang
Subjects: Cryptography and Security (cs.CR)
[137] arXiv:2108.10071 [pdf, other]
Title: Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts
Christof Ferreira Torres, Hugo Jonker, Radu State
Subjects: Cryptography and Security (cs.CR)
[138] arXiv:2108.10251 [pdf, other]
Title: Kryptonite: An Adversarial Attack Using Regional Focus
Yogesh Kulkarni, Krisha Bhambani
Comments: Paper Accepted at ACNS'21 (Workshops)
Journal-ref: LNCS, volume 12809, 2021
Subjects: Cryptography and Security (cs.CR)
[139] arXiv:2108.10319 [pdf, other]
Title: Enhancing Security in VANETs with Efficient Sybil Attack Detection using Fog Computing
Anirudh Paranjothi, Mohammed Atiquzzaman
Comments: arXiv admin note: substantial text overlap with arXiv:2102.00839, arXiv:2108.10267
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[140] arXiv:2108.10344 [pdf, other]
Title: Issuing Green Bonds on the Algorand Blockchain
Gidon Katten
Subjects: Cryptography and Security (cs.CR)
[141] arXiv:2108.10381 [pdf, other]
Title: On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps
Jordan Samhi, Alexandre Bartel
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[142] arXiv:2108.10422 [pdf, other]
Title: An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors
George Karantzas, Constantinos Patsakis
Comments: This is the revised (and final) version of this https URL with more EDRs and proper classification of products into EDRs and EPPs
Subjects: Cryptography and Security (cs.CR)
[143] arXiv:2108.10534 [pdf, other]
Title: Authentication and Access Control in 5G Device-to-Device Communication
Jithu Geevargheese Panicker, Ahmad Salehi S., Carsten Rudolph
Subjects: Cryptography and Security (cs.CR)
[144] arXiv:2108.10567 [pdf, other]
Title: Image-based Insider Threat Detection via Geometric Transformation
Dongyang Li, Lin Yang, Hongguang Zhang, Xiaolei Wang, Linru Ma, Junchao Xiao
Comments: 15 pages, 8 figures,6 tables
Subjects: Cryptography and Security (cs.CR)
[145] arXiv:2108.10770 [pdf, other]
Title: On the linear complexity of feedforward clock-controlled sequence
Yangpan Zhang, Maozhi Xu
Comments: 18 pages, 1 figures. This paper was accepted by inscrypt2021(The 17th International Conference on Information Security and Cryptology)
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[146] arXiv:2108.10771 [pdf, other]
Title: Transient Execution of Non-Canonical Accesses
Saidgani Musaev, Christof Fetzer
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[147] arXiv:2108.10799 [pdf, other]
Title: Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts
Lu Liu, Lili Wei, Wuqi Zhang, Ming Wen, Yepang Liu, Shing-Chi Cheung
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[148] arXiv:2108.10908 [pdf, other]
Title: GGNB: Graph-Based Gaussian Naive Bayes Intrusion Detection System for CAN Bus
Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[149] arXiv:2108.10990 [pdf, other]
Title: Online Dictionary Learning Based Fault and Cyber Attack Detection for Power Systems
Gabriel Intriago, Yu Zhang
Comments: Accepted to the 2021 IEEE Power and Energy Society (PES) General Meeting
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[150] arXiv:2108.11023 [pdf, other]
Title: EncoderMI: Membership Inference against Pre-trained Encoders in Contrastive Learning
Hongbin Liu, Jinyuan Jia, Wenjie Qu, Neil Zhenqiang Gong
Comments: To appear in ACM Conference on Computer and Communications Security (CCS), 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
Total of 285 entries : 1-50 51-100 101-150 151-200 201-250 251-285
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack