Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for April 2023

Total of 385 entries : 1-50 51-100 101-150 151-200 201-250 ... 351-385
Showing up to 50 entries per page: fewer | more | all
[51] arXiv:2304.03579 [pdf, other]
Title: A lightweight Encryption Method For Privacy-Preserving in Process Mining
Mohsen Kazemian, Markus Helfert
Journal-ref: 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing (DASC),14-17 Nov. 2023, Abu Dhabi, United Arab Emirates, pp. 0228-0233
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[52] arXiv:2304.03616 [pdf, other]
Title: Qubo model for the Closest Vector Problem
Eduardo Canale, Claudio Qureshi, Alfredo Viola
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[53] arXiv:2304.03640 [pdf, other]
Title: FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination
Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[54] arXiv:2304.03657 [pdf, other]
Title: SCART: Simulation of Cyber Attacks for Real-Time
Kfir Girstein, Eliron Rahimi, Avi Mendelson
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:2304.03691 [pdf, other]
Title: Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Zihao Wang, Vrizlynn L. L. Thing
Comments: Computers & Security, Volume 128, No. 103143, 2023
Journal-ref: Computers & Security, Volume 128, No. 103143, 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[56] arXiv:2304.03698 [pdf, other]
Title: Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Vrizlynn L. L. Thing
Comments: IEEE Cyber Security and Resilience Conference 2023
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[57] arXiv:2304.03807 [pdf, other]
Title: Privacy-Preserving CNN Training with Transfer Learning: Multiclass Logistic Regression
John Chiang
Comments: In this work, we initiated to implement privacy-persevering CNN training based on mere HE techniques by presenting a faster HE-friendly algorithm
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[58] arXiv:2304.03841 [pdf, other]
Title: Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning
Rouzbeh Behnia, Arman Riasi, Reza Ebrahimi, Sherman S. M. Chow, Balaji Padmanabhan, Thang Hoang
Comments: Accepted in ACSAC 2024
Subjects: Cryptography and Security (cs.CR)
[59] arXiv:2304.03957 [pdf, other]
Title: A Continued Fraction-Hyperbola based Attack on RSA cryptosystem
Gilda Rech Bansimba, Regis Freguin Babindamana, Basile Guy R. Bossoto
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[60] arXiv:2304.04233 [pdf, other]
Title: ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing
Sicong Cao, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su, Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei
Comments: To appear in the Main Track of IEEE S&P 2023
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:2304.04254 [pdf, other]
Title: Secure Routing Protocol To Mitigate Attacks By Using Blockchain Technology In Manet
Nitesh Ghodichor, Raj Thaneeghavl. V, Dinesh Sahu, Gautam Borkar, Ankush Sawarkar
Comments: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[62] arXiv:2304.04381 [pdf, other]
Title: A Deep Analysis of Hybrid-Multikey-PUF
Md Ishtyaq Mahmud, Ahmed Abdelgawad, Venkata P. Yanambaka
Comments: 6,8th IEEE World Forum on Internet of Things (IEEE WFIoT2022)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[63] arXiv:2304.04398 [pdf, other]
Title: Ransomware Detection and Classification Strategies
Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli
Comments: 9 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:2304.04410 [pdf, other]
Title: Differentially Private Numerical Vector Analyses in the Local and Shuffle Model
Shaowei Wang, Jin Li, Yuntong Li, Jin Li, Wei Yang, Hongyang Yan
Comments: Full version of "Hiding Numerical Vectors in Local Private and Shuffled Messages" (IJCAI 2021)
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:2304.04411 [pdf, other]
Title: Quantum Cyber-Attack on Blockchain-based VANET
Kazi Hassan Shakib, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Comments: This paper consists of 16 pages with 10 figures. It has been accepted to IEEE Transactions of Intelligent Transportation Systems
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:2304.04480 [pdf, other]
Title: On the existence of highly organized communities in networks of locally interacting agents
V. Liagkou, P.E. Nastou, P. Spirakis, Y.C. Stamatiou
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM)
[67] arXiv:2304.04619 [pdf, other]
Title: Fast polynomial arithmetic in homomorphic encryption with cyclo-multiquadratic fields
Iván Blanco-Chacón, Alberto Pedrouzo-Ulloa, Rahinatou Yuh Njah Nchiwo, Beatriz Barbero-Lucas
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:2304.04835 [pdf, other]
Title: Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country
Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin
Comments: To appear in Proceedings of The 2023 ACM Web Conference (WWW 2023)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[69] arXiv:2304.04846 [pdf, other]
Title: Helix++: A platform for efficiently securing software
Jack W. Davidson, Jason D. Hiser, Anh Nguyen-Tuong
Comments: 4 pages, 1 figure, white paper
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[70] arXiv:2304.04987 [pdf, other]
Title: Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic Monitoring of MUD Activity
Ayyoob Hamza, Hassan Habibi Gharakheili, Theophilus A. Benson, Gustavo Batista, Vijay Sivaraman
Comments: 18 pages, 13 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[71] arXiv:2304.04998 [pdf, other]
Title: EESMR: Energy Efficient BFT-SMR for the masses
Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, Michael K. Reiter
Comments: Appearing in Middleware 2023
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72] arXiv:2304.05007 [pdf, html, other]
Title: Privacy Amplification via Shuffling: Unified, Simplified, and Tightened
Shaowei Wang, Yun Peng, Jin Li, Zikai Wen, Zhipeng Li, Shiyu Yu, Di Wang, Wei Yang
Comments: To appear in VLDB 2024. Code available at this https URL
Subjects: Cryptography and Security (cs.CR)
[73] arXiv:2304.05123 [pdf, other]
Title: Algorithms for Reconstructing DDoS Attack Graphs using Probabilistic Packet Marking
Dina Barak-Pelleg, Daniel Berend, Thomas J. Robinson, Itamar Zimmerman
Comments: 30 pages, 4 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Probability (math.PR)
[74] arXiv:2304.05127 [pdf, other]
Title: Balancing Privacy and Performance for Private Federated Learning Algorithms
Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[75] arXiv:2304.05200 [pdf, other]
Title: Journey to the Center of Software Supply Chain Attacks
Piergiorgio Ladisa, Serena Elisa Ponta, Antonino Sabetta, Matias Martinez, Olivier Barais
Comments: arXiv admin note: substantial text overlap with arXiv:2204.04008
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[76] arXiv:2304.05237 [pdf, other]
Title: TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation
David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram
Comments: 6 pages, 5 figures and 2 tables
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[77] arXiv:2304.05306 [pdf, other]
Title: Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique
Miloš Grujić, Ingrid Verbauwhede
Comments: Final version after the review process. Accepted for publication in IEEE Transactions on Information Forensics and Security. Corrected typos
Journal-ref: M. Gruji\'c and I. Verbauwhede, "Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 586-600, 2024
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:2304.05445 [pdf, other]
Title: Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs
Kaki Ryan, Cynthia Sturton
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:2304.05513 [pdf, other]
Title: End-to-End O-RAN Security Architecture, Threat Surface, Coverage, and the Case of the Open Fronthaul
Aly Sabri Abdalla, Vuk Marojevic
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[80] arXiv:2304.05516 [pdf, other]
Title: Echo of Neighbors: Privacy Amplification for Personalized Private Federated Learning with Shuffle Model
Yixuan Liu, Suyun Zhao, Li Xiong, Yuhan Liu, Hong Chen
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[81] arXiv:2304.05520 [pdf, other]
Title: Analyzing the Impact of Elusive Faults on Blockchain Reliability
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[82] arXiv:2304.05590 [pdf, other]
Title: Zero-Knowledge Proof-based Practical Federated Learning on Blockchain
Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar
Subjects: Cryptography and Security (cs.CR)
[83] arXiv:2304.05644 [pdf, other]
Title: Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things
Mohamed Amine Ferrag, Djallel Hamouda, Merouane Debbah, Leandros Maglaras, Abderrahmane Lakas
Comments: The paper is accepted and will be published in the IEEE DCOSS-IoT 2023 Conference Proceedings
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:2304.05682 [pdf, other]
Title: Automated Information Flow Analysis for Integrated Computing-in-Memory Modules
Lennart M. Reimann, Felix Staudigl, Rainer Leupers
Comments: 5 pages, accepted at 21st IEEE Interregional NEWCAS Conference, Edinburgh, Scotland
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[85] arXiv:2304.05776 [pdf, other]
Title: A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments
Igor Ivkić, Dominik Thiede, Nicholas Race, Matthew Broadbent, Antonios Gouglidis
Comments: In Proceedings of the 13th International Conference on Cloud Computing and Services Science (CLOSER 2023). Prague, Czech Republic
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[86] arXiv:2304.05778 [pdf, other]
Title: Automated and Secure Onboarding for System of Systems
Silia Maksuti, Ani Bicaku, Mario Zsilak, Igor Ivkić, Bálint Péceli, Gábor Singler, Kristóf Kovács, Markus Tauber, Jerger Delsing
Comments: IEEE Access
Journal-ref: IEEE Access, 9, 111095-111113. 2021
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:2304.05812 [pdf, other]
Title: Cost-damage analysis of attack trees
Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga
Subjects: Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[88] arXiv:2304.06017 [pdf, other]
Title: Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators
Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak
Comments: Accepted in GLSVLSI 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Hardware Architecture (cs.AR)
[89] arXiv:2304.06167 [pdf, other]
Title: CoVE: Towards Confidential Computing on RISC-V Platforms
Ravi Sahita, Atish Patra, Vedvyas Shanbhogue, Samuel Ortiz, Andrew Bresticker, Dylan Reid, Atul Khare, Rajnesh Kanwal
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[90] arXiv:2304.06179 [pdf, other]
Title: SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market
Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph, Rafael Dowsley
Subjects: Cryptography and Security (cs.CR)
[91] arXiv:2304.06222 [pdf, other]
Title: A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard
Jasmin Kaur, Alvaro Cintas Canto, Mehran Mozaffari Kermani, Reza Azarderakhsh
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Computers and Society (cs.CY)
[92] arXiv:2304.06313 [pdf, html, other]
Title: Majority is not Needed: A Counterstrategy to Selfish Mining
Jonathan Gal, Maytal B Szabo, Ori Rottenstreich
Subjects: Cryptography and Security (cs.CR)
[93] arXiv:2304.06341 [pdf, other]
Title: EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation
Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi
Comments: To be published at Euro S&P 2023
Subjects: Cryptography and Security (cs.CR)
[94] arXiv:2304.06369 [pdf, other]
Title: An attack resilient policy on the tip pool for DAG-based distributed ledgers
Lianna Zhao, Andrew Cullen, Sebastian Müller, Olivia Saa, Robert Shorten
Subjects: Cryptography and Security (cs.CR)
[95] arXiv:2304.06582 [pdf, other]
Title: Cryptanalysis of Random Affine Transformations for Encrypted Control
Nils Schlüter, Philipp Binfet, Moritz Schulze Darup
Comments: 8 pages, 2 figures, to be published in the proceedings of the 22nd World Congress of the International Federation of Automatic Control (2023)
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[96] arXiv:2304.06607 [pdf, html, other]
Title: False Claims against Model Ownership Resolution
Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan
Comments: 13pages,3 figures. To appear in the 33rd USENIX Security Symposium (USENIX Security '24)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[97] arXiv:2304.06723 [pdf, other]
Title: Introduction to Presentation Attack Detection in Fingerprint Biometrics
Javier Galbally, Julian Fierrez, Raffaele Cappelli, Gian Luca Marcialis
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[98] arXiv:2304.06724 [pdf, other]
Title: GradMDM: Adversarial Attack on Dynamic Networks
Jianhong Pan, Lin Geng Foo, Qichen Zheng, Zhipeng Fan, Hossein Rahmani, Qiuhong Ke, Jun Liu
Comments: Accepted to IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[99] arXiv:2304.06725 [pdf, other]
Title: Advanced Security Threat Modelling for Blockchain-Based FinTech Applications
Serhan W. Bahar
Subjects: Cryptography and Security (cs.CR)
[100] arXiv:2304.06727 [pdf, html, other]
Title: Contingency Analyses with Warm Starter using Probabilistic Graphical Model
Shimiao Li, Amritanshu Pandey, Larry Pileggi
Comments: arXiv admin note: substantial text overlap with arXiv:2205.03673
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
Total of 385 entries : 1-50 51-100 101-150 151-200 201-250 ... 351-385
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack