Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for April 2023

Total of 385 entries : 51-150 101-200 201-300 301-385
Showing up to 100 entries per page: fewer | more | all
[51] arXiv:2304.03579 [pdf, other]
Title: A lightweight Encryption Method For Privacy-Preserving in Process Mining
Mohsen Kazemian, Markus Helfert
Journal-ref: 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing (DASC),14-17 Nov. 2023, Abu Dhabi, United Arab Emirates, pp. 0228-0233
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[52] arXiv:2304.03616 [pdf, other]
Title: Qubo model for the Closest Vector Problem
Eduardo Canale, Claudio Qureshi, Alfredo Viola
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[53] arXiv:2304.03640 [pdf, other]
Title: FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination
Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[54] arXiv:2304.03657 [pdf, other]
Title: SCART: Simulation of Cyber Attacks for Real-Time
Kfir Girstein, Eliron Rahimi, Avi Mendelson
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:2304.03691 [pdf, other]
Title: Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Zihao Wang, Vrizlynn L. L. Thing
Comments: Computers & Security, Volume 128, No. 103143, 2023
Journal-ref: Computers & Security, Volume 128, No. 103143, 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[56] arXiv:2304.03698 [pdf, other]
Title: Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Vrizlynn L. L. Thing
Comments: IEEE Cyber Security and Resilience Conference 2023
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[57] arXiv:2304.03807 [pdf, other]
Title: Privacy-Preserving CNN Training with Transfer Learning: Multiclass Logistic Regression
John Chiang
Comments: In this work, we initiated to implement privacy-persevering CNN training based on mere HE techniques by presenting a faster HE-friendly algorithm
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[58] arXiv:2304.03841 [pdf, other]
Title: Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning
Rouzbeh Behnia, Arman Riasi, Reza Ebrahimi, Sherman S. M. Chow, Balaji Padmanabhan, Thang Hoang
Comments: Accepted in ACSAC 2024
Subjects: Cryptography and Security (cs.CR)
[59] arXiv:2304.03957 [pdf, other]
Title: A Continued Fraction-Hyperbola based Attack on RSA cryptosystem
Gilda Rech Bansimba, Regis Freguin Babindamana, Basile Guy R. Bossoto
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[60] arXiv:2304.04233 [pdf, other]
Title: ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing
Sicong Cao, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su, Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei
Comments: To appear in the Main Track of IEEE S&P 2023
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:2304.04254 [pdf, other]
Title: Secure Routing Protocol To Mitigate Attacks By Using Blockchain Technology In Manet
Nitesh Ghodichor, Raj Thaneeghavl. V, Dinesh Sahu, Gautam Borkar, Ankush Sawarkar
Comments: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[62] arXiv:2304.04381 [pdf, other]
Title: A Deep Analysis of Hybrid-Multikey-PUF
Md Ishtyaq Mahmud, Ahmed Abdelgawad, Venkata P. Yanambaka
Comments: 6,8th IEEE World Forum on Internet of Things (IEEE WFIoT2022)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[63] arXiv:2304.04398 [pdf, other]
Title: Ransomware Detection and Classification Strategies
Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli
Comments: 9 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:2304.04410 [pdf, other]
Title: Differentially Private Numerical Vector Analyses in the Local and Shuffle Model
Shaowei Wang, Jin Li, Yuntong Li, Jin Li, Wei Yang, Hongyang Yan
Comments: Full version of "Hiding Numerical Vectors in Local Private and Shuffled Messages" (IJCAI 2021)
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:2304.04411 [pdf, other]
Title: Quantum Cyber-Attack on Blockchain-based VANET
Kazi Hassan Shakib, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Comments: This paper consists of 16 pages with 10 figures. It has been accepted to IEEE Transactions of Intelligent Transportation Systems
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:2304.04480 [pdf, other]
Title: On the existence of highly organized communities in networks of locally interacting agents
V. Liagkou, P.E. Nastou, P. Spirakis, Y.C. Stamatiou
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM)
[67] arXiv:2304.04619 [pdf, other]
Title: Fast polynomial arithmetic in homomorphic encryption with cyclo-multiquadratic fields
Iván Blanco-Chacón, Alberto Pedrouzo-Ulloa, Rahinatou Yuh Njah Nchiwo, Beatriz Barbero-Lucas
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:2304.04835 [pdf, other]
Title: Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country
Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin
Comments: To appear in Proceedings of The 2023 ACM Web Conference (WWW 2023)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[69] arXiv:2304.04846 [pdf, other]
Title: Helix++: A platform for efficiently securing software
Jack W. Davidson, Jason D. Hiser, Anh Nguyen-Tuong
Comments: 4 pages, 1 figure, white paper
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[70] arXiv:2304.04987 [pdf, other]
Title: Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic Monitoring of MUD Activity
Ayyoob Hamza, Hassan Habibi Gharakheili, Theophilus A. Benson, Gustavo Batista, Vijay Sivaraman
Comments: 18 pages, 13 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[71] arXiv:2304.04998 [pdf, other]
Title: EESMR: Energy Efficient BFT-SMR for the masses
Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, Michael K. Reiter
Comments: Appearing in Middleware 2023
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72] arXiv:2304.05007 [pdf, html, other]
Title: Privacy Amplification via Shuffling: Unified, Simplified, and Tightened
Shaowei Wang, Yun Peng, Jin Li, Zikai Wen, Zhipeng Li, Shiyu Yu, Di Wang, Wei Yang
Comments: To appear in VLDB 2024. Code available at this https URL
Subjects: Cryptography and Security (cs.CR)
[73] arXiv:2304.05123 [pdf, other]
Title: Algorithms for Reconstructing DDoS Attack Graphs using Probabilistic Packet Marking
Dina Barak-Pelleg, Daniel Berend, Thomas J. Robinson, Itamar Zimmerman
Comments: 30 pages, 4 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Probability (math.PR)
[74] arXiv:2304.05127 [pdf, other]
Title: Balancing Privacy and Performance for Private Federated Learning Algorithms
Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[75] arXiv:2304.05200 [pdf, other]
Title: Journey to the Center of Software Supply Chain Attacks
Piergiorgio Ladisa, Serena Elisa Ponta, Antonino Sabetta, Matias Martinez, Olivier Barais
Comments: arXiv admin note: substantial text overlap with arXiv:2204.04008
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[76] arXiv:2304.05237 [pdf, other]
Title: TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation
David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram
Comments: 6 pages, 5 figures and 2 tables
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[77] arXiv:2304.05306 [pdf, other]
Title: Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique
Miloš Grujić, Ingrid Verbauwhede
Comments: Final version after the review process. Accepted for publication in IEEE Transactions on Information Forensics and Security. Corrected typos
Journal-ref: M. Gruji\'c and I. Verbauwhede, "Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 586-600, 2024
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:2304.05445 [pdf, other]
Title: Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs
Kaki Ryan, Cynthia Sturton
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:2304.05513 [pdf, other]
Title: End-to-End O-RAN Security Architecture, Threat Surface, Coverage, and the Case of the Open Fronthaul
Aly Sabri Abdalla, Vuk Marojevic
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[80] arXiv:2304.05516 [pdf, other]
Title: Echo of Neighbors: Privacy Amplification for Personalized Private Federated Learning with Shuffle Model
Yixuan Liu, Suyun Zhao, Li Xiong, Yuhan Liu, Hong Chen
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[81] arXiv:2304.05520 [pdf, other]
Title: Analyzing the Impact of Elusive Faults on Blockchain Reliability
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[82] arXiv:2304.05590 [pdf, other]
Title: Zero-Knowledge Proof-based Practical Federated Learning on Blockchain
Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar
Subjects: Cryptography and Security (cs.CR)
[83] arXiv:2304.05644 [pdf, other]
Title: Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things
Mohamed Amine Ferrag, Djallel Hamouda, Merouane Debbah, Leandros Maglaras, Abderrahmane Lakas
Comments: The paper is accepted and will be published in the IEEE DCOSS-IoT 2023 Conference Proceedings
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:2304.05682 [pdf, other]
Title: Automated Information Flow Analysis for Integrated Computing-in-Memory Modules
Lennart M. Reimann, Felix Staudigl, Rainer Leupers
Comments: 5 pages, accepted at 21st IEEE Interregional NEWCAS Conference, Edinburgh, Scotland
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[85] arXiv:2304.05776 [pdf, other]
Title: A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments
Igor Ivkić, Dominik Thiede, Nicholas Race, Matthew Broadbent, Antonios Gouglidis
Comments: In Proceedings of the 13th International Conference on Cloud Computing and Services Science (CLOSER 2023). Prague, Czech Republic
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[86] arXiv:2304.05778 [pdf, other]
Title: Automated and Secure Onboarding for System of Systems
Silia Maksuti, Ani Bicaku, Mario Zsilak, Igor Ivkić, Bálint Péceli, Gábor Singler, Kristóf Kovács, Markus Tauber, Jerger Delsing
Comments: IEEE Access
Journal-ref: IEEE Access, 9, 111095-111113. 2021
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:2304.05812 [pdf, other]
Title: Cost-damage analysis of attack trees
Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga
Subjects: Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[88] arXiv:2304.06017 [pdf, other]
Title: Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators
Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak
Comments: Accepted in GLSVLSI 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Hardware Architecture (cs.AR)
[89] arXiv:2304.06167 [pdf, other]
Title: CoVE: Towards Confidential Computing on RISC-V Platforms
Ravi Sahita, Atish Patra, Vedvyas Shanbhogue, Samuel Ortiz, Andrew Bresticker, Dylan Reid, Atul Khare, Rajnesh Kanwal
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[90] arXiv:2304.06179 [pdf, other]
Title: SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market
Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph, Rafael Dowsley
Subjects: Cryptography and Security (cs.CR)
[91] arXiv:2304.06222 [pdf, other]
Title: A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard
Jasmin Kaur, Alvaro Cintas Canto, Mehran Mozaffari Kermani, Reza Azarderakhsh
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Computers and Society (cs.CY)
[92] arXiv:2304.06313 [pdf, html, other]
Title: Majority is not Needed: A Counterstrategy to Selfish Mining
Jonathan Gal, Maytal B Szabo, Ori Rottenstreich
Subjects: Cryptography and Security (cs.CR)
[93] arXiv:2304.06341 [pdf, other]
Title: EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation
Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi
Comments: To be published at Euro S&P 2023
Subjects: Cryptography and Security (cs.CR)
[94] arXiv:2304.06369 [pdf, other]
Title: An attack resilient policy on the tip pool for DAG-based distributed ledgers
Lianna Zhao, Andrew Cullen, Sebastian Müller, Olivia Saa, Robert Shorten
Subjects: Cryptography and Security (cs.CR)
[95] arXiv:2304.06582 [pdf, other]
Title: Cryptanalysis of Random Affine Transformations for Encrypted Control
Nils Schlüter, Philipp Binfet, Moritz Schulze Darup
Comments: 8 pages, 2 figures, to be published in the proceedings of the 22nd World Congress of the International Federation of Automatic Control (2023)
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[96] arXiv:2304.06607 [pdf, html, other]
Title: False Claims against Model Ownership Resolution
Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan
Comments: 13pages,3 figures. To appear in the 33rd USENIX Security Symposium (USENIX Security '24)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[97] arXiv:2304.06723 [pdf, other]
Title: Introduction to Presentation Attack Detection in Fingerprint Biometrics
Javier Galbally, Julian Fierrez, Raffaele Cappelli, Gian Luca Marcialis
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[98] arXiv:2304.06724 [pdf, other]
Title: GradMDM: Adversarial Attack on Dynamic Networks
Jianhong Pan, Lin Geng Foo, Qichen Zheng, Zhipeng Fan, Hossein Rahmani, Qiuhong Ke, Jun Liu
Comments: Accepted to IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[99] arXiv:2304.06725 [pdf, other]
Title: Advanced Security Threat Modelling for Blockchain-Based FinTech Applications
Serhan W. Bahar
Subjects: Cryptography and Security (cs.CR)
[100] arXiv:2304.06727 [pdf, html, other]
Title: Contingency Analyses with Warm Starter using Probabilistic Graphical Model
Shimiao Li, Amritanshu Pandey, Larry Pileggi
Comments: arXiv admin note: substantial text overlap with arXiv:2205.03673
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[101] arXiv:2304.06728 [pdf, other]
Title: Late Breaking Results: Scalable and Efficient Hyperdimensional Computing for Network Intrusion Detection
Junyao Wang, Hanning Chen, Mariam Issa, Sitao Huang, Mohsen Imani
Journal-ref: The 60th Annual Design Automation Conference (DAC), 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[102] arXiv:2304.06929 [pdf, other]
Title: Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment
Rachel Cummings, Damien Desfontaines, David Evans, Roxana Geambasu, Yangsibo Huang, Matthew Jagielski, Peter Kairouz, Gautam Kamath, Sewoong Oh, Olga Ohrimenko, Nicolas Papernot, Ryan Rogers, Milan Shen, Shuang Song, Weijie Su, Andreas Terzis, Abhradeep Thakurta, Sergei Vassilvitskii, Yu-Xiang Wang, Li Xiong, Sergey Yekhanin, Da Yu, Huanyu Zhang, Wanrong Zhang
Subjects: Cryptography and Security (cs.CR)
[103] arXiv:2304.06963 [pdf, other]
Title: Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network
Haoran Zhu, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić
Comments: arXiv admin note: text overlap with arXiv:2302.00210
Subjects: Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[104] arXiv:2304.07037 [pdf, html, other]
Title: No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment
Anh V. Vu, Alice Hutchings, Ross Anderson
Journal-ref: Proceedings of the IEEE Symposium on Security and Privacy (S&P) 2024
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[105] arXiv:2304.07062 [pdf, other]
Title: Publicly Verifiable Deletion from Minimal Assumptions
Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[106] arXiv:2304.07092 [pdf, other]
Title: Obfuscation of Discrete Data
Saswata Naha, Sayantan Roy, Arkaprava Sanki, Diptanil Santra
Comments: 16 pages, 32 figures
Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
[107] arXiv:2304.07134 [pdf, other]
Title: Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice
Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye
Comments: Published at USENIX Security 2022. This is the full version, please cite the USENIX version (see journal reference field)
Journal-ref: USENIX Security 22 (2022)
Subjects: Cryptography and Security (cs.CR)
[108] arXiv:2304.07165 [pdf, other]
Title: Hybrid DLT as a data layer for real-time, data-intensive applications
Andrea Canciani, Claudio Felicioli, Andrea Lisi, Fabio Severino
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[109] arXiv:2304.07166 [pdf, other]
Title: Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study
Edward Lo, Ningyu He, Yuejie Shi, Jiajia Xu, Chiachih Wu, Ding Li, Yao Guo
Comments: Accepted by 17th IEEE Workshop on Offensive Technologies
Subjects: Cryptography and Security (cs.CR)
[110] arXiv:2304.07210 [pdf, other]
Title: Measuring Re-identification Risk
CJ Carey, Travis Dick, Alessandro Epasto, Adel Javanmard, Josh Karlin, Shankar Kumar, Andres Munoz Medina, Vahab Mirrokni, Gabriel Henrique Nunes, Sergei Vassilvitskii, Peilin Zhong
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[111] arXiv:2304.07226 [pdf, other]
Title: BS-GAT Behavior Similarity Based Graph Attention Network for Network Intrusion Detection
Yalu Wang, Zhijie Han, Jie Li, Xin He
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[112] arXiv:2304.07232 [pdf, other]
Title: Evaluation of ChatGPT Model for Vulnerability Detection
Anton Cheshkov, Pavel Zadorozhny, Rodion Levichev
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[113] arXiv:2304.07234 [pdf, other]
Title: Can sparsity improve the privacy of neural networks?
Antoine Gonon, Léon Zheng, Clément Lalanne, Quoc-Tung Le, Guillaume Lauga, Can Pouliquen
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[114] arXiv:2304.07239 [pdf, other]
Title: Separating Key Agreement and Computational Differential Privacy
Vipul Arora, Eldon Chung, Zeyong Li, Thomas Tan
Comments: A key step in relating the probability that can be computed by the PSPACE algorithm to the statistical distinguishing probability is missing and not yet shown. Our arguments in this work so far have not yet been able to show this step. Thus the final conclusion that key agreement is black-box insufficient for CDP is not yet proven
Subjects: Cryptography and Security (cs.CR)
[115] arXiv:2304.07360 [pdf, other]
Title: Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
Matouš Kozák, Martin Jureček
Comments: 9 pages, 5 figures, 2 tables. Under review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116] arXiv:2304.07411 [pdf, other]
Title: SoK: The MITRE ATT&CK Framework in Research and Practice
Shanto Roy, Emmanouil Panaousis, Cameron Noakes, Aron Laszka, Sakshyam Panda, George Loukas
Subjects: Cryptography and Security (cs.CR)
[117] arXiv:2304.07470 [pdf, other]
Title: Few-shot Weakly-supervised Cybersecurity Anomaly Detection
Rahul Kale, Vrizlynn L. L. Thing
Comments: Computer and Security (Elsevier)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[118] arXiv:2304.07594 [pdf, other]
Title: Preventing Malicious Use of Keyloggers Using Anti-Keyloggers
Jami Gayatri Manjeera, Alisha Malla, Masani Venkata Lakshmi Pravallika
Comments: 5 Pages,4 Figures, Literature Survey, Methodology
Subjects: Cryptography and Security (cs.CR)
[119] arXiv:2304.07598 [pdf, other]
Title: Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators
Trishie Sharma (1), Rachit Agarwal (2), Sandeep Kumar Shukla (1) ((1) Indian Institute of Technology Kanpur, India, (2) Merkle Science, India)
Subjects: Cryptography and Security (cs.CR)
[120] arXiv:2304.07648 [pdf, other]
Title: Certifying Zero-Knowledge Circuits with Refinement Types
Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Işıl Dillig, Yu Feng
Comments: This paper was incorrectly submitted, and should be submitted to Cryptology ePrint Archive instead
Subjects: Cryptography and Security (cs.CR)
[121] arXiv:2304.07668 [pdf, other]
Title: FedBlockHealth: A Synergistic Approach to Privacy and Security in IoT-Enabled Healthcare through Federated Learning and Blockchain
Nazar Waheed, Ateeq Ur Rehman, Anushka Nehra, Mahnoor Farooq, Nargis Tariq, Mian Ahmad Jan, Fazlullah Khan, Abeer Z. Alalmaie, Priyadarsi Nanda
Comments: Submitted to: Globecom 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[122] arXiv:2304.07676 [pdf, other]
Title: Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data
Nazar Waheed, Fazlullah Khan, Spyridon Mastorakis, Mian Ahmad Jan, Abeer Z. Alalmaie, Priyadarsi Nanda
Comments: Submitted to IEEE COINS
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:2304.07704 [pdf, other]
Title: A Survey of Access Control Misconfiguration Detection Techniques
Bingyu Shen
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[124] arXiv:2304.07735 [pdf, html, other]
Title: Permutation Equivariance of Transformers and Its Applications
Hengyuan Xu, Liyao Xiang, Hangyu Ye, Dixi Yao, Pengzhi Chu, Baochun Li
Comments: Accepted by CVPR 2024
Subjects: Cryptography and Security (cs.CR)
[125] arXiv:2304.07909 [pdf, other]
Title: SECAdvisor: a Tool for Cybersecurity Planning using Economic Models
Muriel Figueredo Franco, Christian Omlin, Oliver Kamer, Eder John Scheid, Burkhard Stiller
Comments: 12 pages, 7 figures, 2 tables, 9 equations
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[126] arXiv:2304.07927 [pdf, other]
Title: A Randomized Approach for Tight Privacy Accounting
Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal
Comments: NeurIPS 2023
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[127] arXiv:2304.07937 [pdf, other]
Title: Decentralized Threshold Signatures with Dynamically Private Accountability
Meng Li, Mingwei Zhang, Qing Wang, Hanni Ding, Weizhi Meng, Liehuang Zhu, Zijian Zhang, Xiaodong Lin
Subjects: Cryptography and Security (cs.CR)
[128] arXiv:2304.07940 [pdf, other]
Title: AVX Timing Side-Channel Attacks against Address Space Layout Randomization
Hyunwoo Choi, Suryeon Kim, Seungwon Shin
Comments: Accepted to Design Automation Conference (DAC) 2023
Journal-ref: The 60th Annual Design Automation Conference (DAC), 2023
Subjects: Cryptography and Security (cs.CR)
[129] arXiv:2304.07943 [pdf, other]
Title: Detecting Domain-Generation Algorithm (DGA) Based Fully-Qualified Domain Names (FQDNs) with Shannon Entropy
Adam Dorian Wong
Subjects: Cryptography and Security (cs.CR)
[130] arXiv:2304.07989 [pdf, other]
Title: IMCDCF: An Incremental Malware Detection Approach Using Hidden Markov Models
Ran Liu, Charles Nicholas
Comments: Malware Technical Exchange Meeting 2021 (MTEM'21)
Subjects: Cryptography and Security (cs.CR)
[131] arXiv:2304.08224 [pdf, other]
Title: Uncharted Territory: Energy Attacks in the Battery-less Internet of Things
Luca Mottola, Arslan Hameed, Thiemo Voigt
Subjects: Cryptography and Security (cs.CR)
[132] arXiv:2304.08263 [pdf, other]
Title: Information Flow Coverage Metrics for Hardware Security Verification
Andres Meza, Ryan Kastner
Comments: 6 pages, 3 Figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[133] arXiv:2304.08283 [pdf, other]
Title: Exploring Blockchain Technology through a Modular Lens: A Survey
Minghui Xu, Yihao Guo, Chunchi Liu, Qin Hu, Dongxiao Yu, Zehui Xiong, Dusit Niyato, Xiuzhen Cheng
Comments: 40 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[134] arXiv:2304.08411 [pdf, other]
Title: Evil from Within: Machine Learning Backdoors through Hardware Trojans
Alexander Warnecke, Julian Speith, Jan-Niklas Möller, Konrad Rieck, Christof Paar
Comments: Annual Computer Security Applications Conference 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[135] arXiv:2304.08429 [pdf, other]
Title: Security and Privacy Issues for Urban Smart Traffic Infrastructure
Anubhab Baksi, Ahmed Ibrahim Samir Khalil, Anupam Chattopadhyay
Comments: The study is partly outdated
Subjects: Cryptography and Security (cs.CR)
[136] arXiv:2304.08557 [pdf, other]
Title: A Decentralized Authorization and Security Framework for Distributed Research Workflows
Richard Cardone, Smruti Padhy, Steven Black, Sean Cleveland, Joe Stubbs
Comments: 10 pages. Short version of this paper to be published on COMPSAC 2023 proceedings
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[137] arXiv:2304.08595 [pdf, other]
Title: Prophet: Conflict-Free Sharding Blockchain via Byzantine-Tolerant Deterministic Ordering
Zicong Hong, Song Guo, Enyuan Zhou, Jianting Zhang, Wuhui Chen, Jinwen Liang, Jie Zhang, Albert Zomaya
Subjects: Cryptography and Security (cs.CR)
[138] arXiv:2304.08655 [pdf, other]
Title: An Ethereum-compatible blockchain that explicates and ensures design-level safety properties for smart contracts
Nikolaj Bjørner, Shuo Chen, Yang Chen, Zhongxin Guo, Peng Liu, Nanqing Luo
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[139] arXiv:2304.08713 [pdf, other]
Title: FlexiChain 2.0: NodeChain Assisting Integrated Decentralized Vault for Effective Data Authentication and Device Integrity in Complex Cyber-Physical Systems
Ahmad J. Alkhodair, Saraju P. Mohanty, Elias Kougianos
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[140] arXiv:2304.08717 [pdf, other]
Title: InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion
Zhuojia Shen, John Criswell
Comments: 18 pages, 9 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[141] arXiv:2304.08718 [pdf, html, other]
Title: Generalized Implicit Factorization Problem
Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
Subjects: Cryptography and Security (cs.CR)
[142] arXiv:2304.08767 [pdf, other]
Title: Masked Language Model Based Textual Adversarial Example Detection
Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang
Comments: 13 pages,3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[143] arXiv:2304.08811 [pdf, other]
Title: Towards the Transferable Audio Adversarial Attack via Ensemble Methods
Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju
Comments: Submitted to Cybersecurity journal 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[144] arXiv:2304.08979 [pdf, other]
Title: In ChatGPT We Trust? Measuring and Characterizing the Reliability of ChatGPT
Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[145] arXiv:2304.09259 [pdf, other]
Title: An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems
Jonathan M Spring
Subjects: Cryptography and Security (cs.CR)
[146] arXiv:2304.09456 [pdf, other]
Title: A Protocol for Cast-as-Intended Verifiability with a Second Device
Johannes Müller, Tomasz Truderung
Subjects: Cryptography and Security (cs.CR)
[147] arXiv:2304.09468 [pdf, other]
Title: Secure Mobile Payment Architecture Enabling Multi-factor Authentication
Hosam Alamleh, Ali Abdullah S. AlQahtani, Baker Al Smadi
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[148] arXiv:2304.09486 [pdf, other]
Title: Security and Privacy Problems in Voice Assistant Applications: A Survey
Jingjin Li, Chao chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang
Comments: 5 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[149] arXiv:2304.09490 [pdf, other]
Title: Neural Network Quantisation for Faster Homomorphic Encryption
Wouter Legiest, Jan-Pieter D'Anvers, Furkan Turan, Michiel Van Beirendonck, Ingrid Verbauwhede
Comments: 5 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[150] arXiv:2304.09510 [pdf, other]
Title: Maybenot: A Framework for Traffic Analysis Defenses
Tobias Pulls, Ethan Witwer
Comments: Version 2 of the Maybenot framework
Subjects: Cryptography and Security (cs.CR)
Total of 385 entries : 51-150 101-200 201-300 301-385
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack