Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for September 2022

Total of 360 entries : 1-25 26-50 51-75 76-100 ... 351-360
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:2209.00080 [pdf, other]
Title: Wiggle: Physical Challenge-Response Verification of Vehicle Platooning
Connor Dickey, Christopher Smith, Quentin Johnson, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li
Comments: 10 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:2209.00170 [pdf, other]
Title: CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach
Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang
Comments: 22 pages. Submitted to ACM Transactions on Sensor Networks (TOSN)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Machine Learning (stat.ML)
[3] arXiv:2209.00263 [pdf, other]
Title: Attack Tactic Identification by Transfer Learning of Language Model
Ling-Hsuan Lin, Shun-Wen Hsiao
Comments: 13 pages, 7 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:2209.00307 [pdf, other]
Title: Memory Tagging: A Memory Efficient Design
Aditi Partap, Dan Boneh
Comments: 16 Pages, 7 Figures. This version of the paper extends a shorter version submitted to IEEE Euro S&P'23
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2209.00405 [pdf, other]
Title: Towards Assessing Isolation Properties in Partitioning Hypervisors
Carmine Cesarano, Domenico Cotroneo, Luigi De Simone
Journal-ref: Proceedings ISSREW2022
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:2209.00411 [pdf, other]
Title: Efficient ML Models for Practical Secure Inference
Vinod Ganesan, Anwesh Bhattacharya, Pratyush Kumar, Divya Gupta, Rahul Sharma, Nishanth Chandran
Comments: 10 pages include references, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[7] arXiv:2209.00586 [pdf, other]
Title: Authentication, Authorization, and Selective Disclosure for IoT data sharing using Verifiable Credentials and Zero-Knowledge Proofs
Nikos Fotiou, Iakovos Pittaras, Spiros Chadoulos, Vasilios A. Siris, George C. Polyzos, Nikolaos Ipiotis, Stratos Keranidis
Comments: to appear in ESORICS Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:2209.00685 [pdf, other]
Title: SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface
Ali Fakhrzadehgan, Prakash Ramrakhyani, Moinuddin K. Qureshi, Mattan Erez
Journal-ref: 2023 53rd IEEE/IFIP DSN, Porto, Portugal, 2023, pp. 14-27
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[9] arXiv:2209.00721 [pdf, other]
Title: Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach
Gustavo de Carvalho Bertoli, Lourenço Alves Pereira Junior, Aldri Luiz dos Santos, Osamu Saotome
Comments: Preprint (Under revision), 35 pages. Added repository link, see this https URL
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:2209.00741 [pdf, other]
Title: A Low-Cost Multi-Agent System for Physical Security in Smart Buildings
Tiago Fonseca, Tiago Dias, João Vitorino, Luís Lino Ferreira, Isabel Praça
Comments: 10 pages, 2 tables, 3 figures, ICCCN 2022 conference
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Systems and Control (eess.SY)
[11] arXiv:2209.00750 [pdf, html, other]
Title: Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency
Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[12] arXiv:2209.00757 [pdf, other]
Title: Universal Fourier Attack for Time Series
Elizabeth Coda, Brad Clymer, Chance DeSmet, Yijing Watkins, Michael Girard
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[13] arXiv:2209.00778 [pdf, other]
Title: Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach
Yang Li, Xinhao Wei, Yuanzheng Li, Zhaoyang Dong, Mohammad Shahidehpour
Comments: Accepted by IEEE Transactions on Smart Grid
Journal-ref: IEEE Transactions on Smart Grid 13 (2022) 4862-4872
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[14] arXiv:2209.00782 [pdf, other]
Title: BinImg2Vec: Augmenting Malware Binary Image Classification with Data2Vec
Joon Sern Lee, Kai Keng Tay, Zong Fu Chua
Journal-ref: 1st International Conference on AI in Cybersecurity (ICAIC), 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[15] arXiv:2209.00783 [pdf, other]
Title: TypoSwype: An Imaging Approach to Detect Typo-Squatting
Joon Sern Lee, Yam Gui Peng David
Journal-ref: 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[16] arXiv:2209.00786 [pdf, other]
Title: Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication
Jared Gaskin, Bechir Hamdaoui, Weng-Keen Wong
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:2209.00812 [pdf, other]
Title: Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?
Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu
Comments: Accepted by the 33rd IEEE International Symposium on Software Reliability Engineering (ISSRE 2022)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[18] arXiv:2209.00813 [pdf, other]
Title: CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems
Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik
Comments: 10 pages, 9 figures, To appear at ICCAD 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[19] arXiv:2209.00862 [pdf, other]
Title: Spatio-Temporal Attack Course-of-Action (COA) Search Learning for Scalable and Time-Varying Networks
Haemin Lee, Seok Bin Son, Won Joon Yun, Joongheon Kim, Soyi Jung, Dong Hwa Kim
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[20] arXiv:2209.00943 [pdf, other]
Title: Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
Gonçalo Xavier, Carlos Novo, Ricardo Morla
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[21] arXiv:2209.01105 [pdf, other]
Title: Data Encryption based on 7D Complex Chaotic System with Cubic Memristor for Smart Grid
Lei Kou, Zhe Huang, Cuimei Jiang, Fangfang Zhang, Wende Ke, Junhe Wan, Hailin Liu, Hui Li
Comments: Accepted by Frontiers in Energy Research
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[22] arXiv:2209.01129 [pdf, other]
Title: Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure
Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk
Comments: Technical report, corresponding paper accepted to Transactions on Privacy and Security 2022 (TOPS), 54 pages. arXiv admin note: substantial text overlap with arXiv:1912.08788
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:2209.01179 [pdf, other]
Title: Automatic Detection of Speculative Execution Combinations
Xaver Fabian, Marco Guarnieri, Marco Patrignani
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[24] arXiv:2209.01285 [pdf, other]
Title: Security Best Practices: A Critical Analysis Using IoT as a Case Study
David Barrera, Christopher Bellman, Paul C. van Oorschot
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:2209.01290 [pdf, other]
Title: Accelerating Polynomial Multiplication for Homomorphic Encryption on GPUs
Kaustubh Shivdikar, Gilbert Jonatan, Evelio Mora, Neal Livesay, Rashmi Agrawal, Ajay Joshi, Jose Abellan, John Kim, David Kaeli
Comments: Accepted, to be pusblished at SEED 2022 conference (IEEE International Symposium on Secure and Private Execution Environment Design)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
Total of 360 entries : 1-25 26-50 51-75 76-100 ... 351-360
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack