Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2022

Total of 435 entries : 1-50 51-100 76-125 101-150 151-200 201-250 ... 401-435
Showing up to 50 entries per page: fewer | more | all
[76] arXiv:2210.05217 [pdf, other]
Title: Abstract interpretation of Michelson smart-contracts
Guillaume Bau, Antoine Miné, Vincent Botbol, Mehdi Bouaziz
Journal-ref: SOAP '22: 11th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, Jun 2022, San Diego, CA, United States. pp.36-43
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[77] arXiv:2210.05226 [pdf, other]
Title: Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning
Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:2210.05343 [pdf, other]
Title: Printing variability of copy detection patterns
Roman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak, Slava Voloshynovskiy
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[79] arXiv:2210.05433 [pdf, other]
Title: On the Feasibility of Profiling Electric Vehicles through Charging Data
Ankit Gangwal, Aakash Jain, Mauro Conti
Comments: This is an extended version of our paper in VehicleSec 2023 (co-located with NDSS Symposium 2023), San Diego, CA
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:2210.05476 [pdf, other]
Title: Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
Comments: This paper will appear at IACR Transactions on Cryptographic Hardware and Embedded Systems 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[81] arXiv:2210.05560 [pdf, other]
Title: Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption
Junsoo Kim, Dongwoo Kim, Yongsoo Song, Hyungbo Shim, Henrik Sandberg, Karl H. Johansson
Comments: 33 pages, 12 figures, submitted to Annual Reviews in Control
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[82] arXiv:2210.05623 [pdf, other]
Title: A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices
A. Bhanpurawala, K. El-Fakih, I. Zualkernan
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[83] arXiv:2210.06139 [pdf, other]
Title: Zero-Knowledge Optimal Monetary Policy under Stochastic Dominance
David Cerezo Sánchez
Comments: Implementation available at: this https URL
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE); General Economics (econ.GN)
[84] arXiv:2210.06163 [pdf, other]
Title: Privacy of federated QR decomposition using additive secure multiparty computation
Anne Hartebrodt, Richard Röttger
Comments: 10 pages, 2 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[85] arXiv:2210.06186 [pdf, html, other]
Title: GOTCHA: Real-Time Video Deepfake Detection via Challenge-Response
Govind Mittal, Chinmay Hegde, Nasir Memon
Comments: Accepted to IEEE Euro S&P 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[86] arXiv:2210.06428 [pdf, other]
Title: Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork
Haotao Wang, Junyuan Hong, Aston Zhang, Jiayu Zhou, Zhangyang Wang
Comments: Accepted by NeurIPS 2022. Code is available at this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[87] arXiv:2210.06509 [pdf, other]
Title: Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Di Tang, Rui Zhu, XiaoFeng Wang, Haixu Tang, Yi Chen
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[88] arXiv:2210.06516 [pdf, other]
Title: How to Sift Out a Clean Data Subset in the Presence of Data Poisoning?
Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia
Comments: 13 pages of the main text
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[89] arXiv:2210.06540 [pdf, other]
Title: Blockchain for Unmanned Underwater Drones: Research Issues, Challenges, Trends and Future Directions
Neelu Jyoti Ahuja, Adarsh Kumar, Monika Thapliyal, Sarthika Dutt, Tanesh Kumar, Diego Augusto De Jesus Pacheco, Charalambos Konstantinou, Kim-Kwang Raymond Choo
Subjects: Cryptography and Security (cs.CR)
[90] arXiv:2210.06587 [pdf, other]
Title: BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces
Adam Dorian Wong
Comments: 29 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91] arXiv:2210.06654 [pdf, other]
Title: The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain
Yash Vekaria (1), Rishab Nithyanand (2), Zubair Shafiq (1) ((1) University of California, Davis, (2) University of Iowa)
Comments: To appear at IEEE Symposium on Security & Privacy (Oakland) 2024
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[92] arXiv:2210.06676 [pdf, other]
Title: A Tagging Solution to Discover IoT Devices in Apartments
Berkay Kaplan, Jingyu Qian, Israel J Lopez-Toledo, Carl A. Gunter
Subjects: Cryptography and Security (cs.CR)
[93] arXiv:2210.06738 [pdf, other]
Title: PUPoW: A framework for designing blockchains with practically-useful-proof-of-work & vanitycoin
Yash Chaurasia, Visvesh Subramanian, Sujit Gujar
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[94] arXiv:2210.06746 [pdf, other]
Title: PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs (Journal Version)
Hao Cui, Rahmadi Trimananda, Scott Jordan, Athina Markopoulou
Comments: 46 pages, 15 figures (including subfigures). This is the 2025 updated journal version. For the conference version published at USENIX Security '23, see arXiv:2210.06746v2
Subjects: Cryptography and Security (cs.CR)
[95] arXiv:2210.06792 [pdf, other]
Title: SoK: How Not to Architect Your Next-Generation TEE Malware?
Kubilay Ahmet Küçük, Steve Moyle, Andrew Martin, Alexandru Mereacre, Nicholas Allott
Comments: Kubilay Ahmet Küçük, Steve Moyle, Andrew Martin, Alexandru Mereacre, and Nicholas Allott. 2022. SoK: How Not to Architect Your Next-Generation TEE Malware?. In Hardware and Architectural Support for Security and Privacy (HASP 22), October 1, 2022, Chicago, IL, USA. ACM, New York, NY, USA, 10 pages. this https URL
Subjects: Cryptography and Security (cs.CR)
[96] arXiv:2210.06840 [pdf, other]
Title: Forensic-Ready Risk Management Concepts
Lukas Daubner, Martin Macak, Raimundas Matulevičius, Barbora Buhnova, Sofija Maksović, Tomas Pitner
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[97] arXiv:2210.06856 [pdf, other]
Title: Federated Learning for Tabular Data: Exploring Potential Risk to Privacy
Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel
Comments: In the proceedings of The 33rd IEEE International Symposium on Software Reliability Engineering (ISSRE), November 2022
Subjects: Cryptography and Security (cs.CR)
[98] arXiv:2210.06889 [pdf, other]
Title: Multi-recipient and threshold encryption based on hidden multipliers
Vitaly Roman'kov
Comments: 12 pages. Published in journal of Groups, Complexity, Cryptology. arXiv admin note: substantial text overlap with arXiv:2108.06967
Journal-ref: journal of Groups, complexity, cryptology, Volume 14, Issue 2 (March 21, 2023) gcc:10150
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[99] arXiv:2210.06998 [pdf, other]
Title: DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[100] arXiv:2210.07110 [pdf, other]
Title: POSE: Practical Off-chain Smart Contract Execution
Tommaso Frassetto, Patrick Jauernig, David Koisser, David Kretzler, Benjamin Schlosser, Sebastian Faust, Ahmad-Reza Sadeghi
Journal-ref: Annual Network and Distributed System Security Symposium, NDSS, 2023
Subjects: Cryptography and Security (cs.CR)
[101] arXiv:2210.07332 [pdf, other]
Title: Secure Multiparty Computation for Synthetic Data Generation from Distributed Data
Mayana Pereira, Sikha Pentyala, Anderson Nascimento, Rafael T. de Sousa Jr., Martine De Cock
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[102] arXiv:2210.07346 [pdf, other]
Title: An Embarrassingly Simple Backdoor Attack on Self-supervised Learning
Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang
Comments: The 2023 International Conference on Computer Vision (ICCV '23)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[103] arXiv:2210.07376 [pdf, html, other]
Title: ScionFL: Efficient and Robust Secure Quantized Aggregation
Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai
Comments: Published in 2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[104] arXiv:2210.07385 [pdf, other]
Title: Synthesis of Proactive Sensor Placement In Probabilistic Attack Graphs
Lening Li, Haoxiang Ma, Shuo Han, Jie Fu
Comments: 8 pages, 4 figures, submitted to 2023 American Control Conference
Subjects: Cryptography and Security (cs.CR)
[105] arXiv:2210.07412 [pdf, other]
Title: A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange
Aikata Aikata, Ahmet Can Mert, David Jacquemin, Amitabh Das, Donald Matthews, Santosh Ghosh, Sujoy Sinha Roy
Comments: This paper will be published at IEEE Transactions on Computers
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[106] arXiv:2210.07465 [pdf, other]
Title: Learning Algorithms in Static Analysis of Web Applications
Akash Nagaraj, Bishesh Sinha, Mukund Sood, Yash Mathur, Sanchika Gupta, Dinkar Sitaram
Comments: This paper was originally written in 2019
Subjects: Cryptography and Security (cs.CR)
[107] arXiv:2210.07482 [pdf, other]
Title: Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study
Peiyang Jia (School of Cyber Engineering, Xidian University, China, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China), Chengwei Liu (Nanyang Technological University), Hongyu Sun (School of Cyber Engineering, Xidian University, China, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China), Chengyi Sun (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China), Mianxue Gu (Hainan University, China, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China), Yang Liu (Nanyang Technological University), Yuqing Zhang (National Computer Network Intrusion Protection Center, Xidian University, Hainan University, University of Chinese Academy of Sciences)
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[108] arXiv:2210.07531 [pdf, other]
Title: Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices
Matthew Chan, Nathaniel Snyder, Marcus Lucas, Luis Garcia, Oleg Sokolsky, James Weimer, Insup Lee, Paulo Tabuada, Saman Zonouz, Mani Srivastava
Subjects: Cryptography and Security (cs.CR)
[109] arXiv:2210.07666 [pdf, other]
Title: A Location-Based Global Authorization Method for Underwater Security
Bálint Z. Téglásy, Sokratis Katsikas
Comments: 14 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[110] arXiv:2210.07714 [pdf, other]
Title: CrowdGuard: Federated Backdoor Detection in Federated Learning
Phillip Rieger (1), Torsten Krauß (2), Markus Miettinen (1), Alexandra Dmitrienko (2), Ahmad-Reza Sadeghi (1) ((1) Technical University Darmstadt, (2) University of Würzburg)
Comments: To appear in the Network and Distributed System Security (NDSS) Symposium 2024. Phillip Rieger and Torsten Krauß contributed equally to this contribution. 19 pages, 8 figures, 5 tables, 4 algorithms, 5 equations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[111] arXiv:2210.07719 [pdf, other]
Title: A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices
Jan von der Assen, Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jordan Cedeño, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112] arXiv:2210.07809 [pdf, other]
Title: Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang, Jixing Ren, Boheng Li, Tianyi She, Chenhao Lin, Liming Fang, Jing Chen, Chao Shen, Lina Wang
Subjects: Cryptography and Security (cs.CR)
[113] arXiv:2210.07834 [pdf, other]
Title: An atom's worth of anonymity
Jouko Väänänen
Subjects: Cryptography and Security (cs.CR); Logic (math.LO)
[114] arXiv:2210.07876 [pdf, other]
Title: Control, Confidentiality, and the Right to be Forgotten
Aloni Cohen, Adam Smith, Marika Swanberg, Prashant Nalini Vasudevan
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[115] arXiv:2210.07884 [pdf, other]
Title: SealClub: Computer-aided Paper Document Authentication
Martín Ochoa, Jorge Toro-Pozo, David Basin
Subjects: Cryptography and Security (cs.CR)
[116] arXiv:2210.08127 [pdf, other]
Title: Reflections on trusting distributed trust
Emma Dauterman, Vivian Fang, Natacha Crooks, Raluca Ada Popa
Comments: 8 pages, 3 figures
Journal-ref: HotNets 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[117] arXiv:2210.08136 [pdf, other]
Title: A Utility-Preserving Obfuscation Approach for YouTube Recommendations
Jiang Zhang, Hadi Askari, Konstantinos Psounis, Zubair Shafiq
Subjects: Cryptography and Security (cs.CR)
[118] arXiv:2210.08252 [pdf, other]
Title: DI-NIDS: Domain Invariant Network Intrusion Detection System
Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[119] arXiv:2210.08270 [pdf, other]
Title: Assessing the Solid Protocol in Relation to Security & Privacy Obligations
Christian Esposito, Olaf Hartig, Ross Horne, Chang Sun
Comments: under submission
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[120] arXiv:2210.08273 [pdf, other]
Title: Classification of Web Phishing Kits for early detection by platform providers
Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[121] arXiv:2210.08281 [pdf, other]
Title: Man-in-the-OBD: A modular, protocol agnostic firewall for automotive dongles to enhance privacy and security
Felix Klement, Henrich C. Pöhls, Stefan Katzenbeisser
Comments: 22 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[122] arXiv:2210.08374 [pdf, other]
Title: Beyond the Surface: Investigating Malicious CVE Proof of Concept Exploits on GitHub
Soufian El Yadmani, Robin The, Olga Gadyatskaya
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:2210.08418 [pdf, other]
Title: VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder
Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li
Subjects: Cryptography and Security (cs.CR)
[124] arXiv:2210.08421 [pdf, other]
Title: New Secure Sparse Inner Product with Applications to Machine Learning
Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu
Subjects: Cryptography and Security (cs.CR)
[125] arXiv:2210.08674 [pdf, other]
Title: Scaling up Trustless DNN Inference with Zero-Knowledge Proofs
Daniel Kang, Tatsunori Hashimoto, Ion Stoica, Yi Sun
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Total of 435 entries : 1-50 51-100 76-125 101-150 151-200 201-250 ... 401-435
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack