Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2024

Total of 522 entries : 1-25 26-50 51-75 76-100 101-125 ... 501-522
Showing up to 25 entries per page: fewer | more | all
[26] arXiv:2403.01186 [pdf, other]
Title: Evault for legal records
Jeba N, Anas S, Anuragav S, Abhishek R, Sachin K
Comments: Blockchain, evault, legal records
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[27] arXiv:2403.01215 [pdf, html, other]
Title: Efficient Algorithm Level Error Detection for Number-Theoretic Transform used for Kyber Assessed on FPGAs and ARM
Kasra Ahmadi, Saeed Aghapour, Mehran Mozaffari Kermani, Reza Azarderakhsh
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:2403.01271 [pdf, html, other]
Title: Employing LLMs for Incident Response Planning and Review
Sam Hays, Jules White
Comments: 10 pages, 11 figures
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:2403.01290 [pdf, html, other]
Title: Characterizing Ethereum Upgradable Smart Contracts and Their Security Implications
Xiaofan Li, Jin Yang, Jiaqi Chen, Yuzhe Tang, Xing Gao
Comments: 12 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE)
[30] arXiv:2403.01299 [pdf, html, other]
Title: A Photonic Physically Unclonable Function's Resilience to Multiple-Valued Machine Learning Attacks
Jessie M. Henderson, Elena R. Henderson, Clayton A. Harper, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton
Comments: 6 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31] arXiv:2403.01356 [pdf, html, other]
Title: Security and Privacy Enhancing in Blockchain-based IoT Environments via Anonym Auditing
Peyman Khordadpour, Saeed Ahmadi
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:2403.01423 [pdf, html, other]
Title: Collective Certified Robustness against Graph Injection Attacks
Yuni Lai, Bailin Pan, Kaihuang Chen, Yancheng Yuan, Kai Zhou
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[33] arXiv:2403.01451 [pdf, html, other]
Title: Enhancing Data Provenance and Model Transparency in Federated Learning Systems -- A Database Approach
Michael Gu, Ramasoumya Naraparaju, Dongfang Zhao
Comments: 14 pages, 16 figures
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG)
[34] arXiv:2403.01472 [pdf, html, other]
Title: WARDEN: Multi-Directional Backdoor Watermarks for Embedding-as-a-Service Copyright Protection
Anudeex Shetty, Yue Teng, Ke He, Qiongkai Xu
Comments: Accepted to ACL2024 (Main Proceedings)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[35] arXiv:2403.01507 [pdf, html, other]
Title: ISSF: The Intelligent Security Service Framework for Cloud-Native Operation
Yikuan Yan, Keman Huang, Michael Siegel
Comments: 17pages
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:2403.01547 [pdf, html, other]
Title: Constructions of Control Sequence Set for Hierarchical Access in Data Link Network
Niu Xianhua, Ma Jiabei, Zhou Enzhi, Wang Yaoxuan, Zeng Bosen, Li Zhiping
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:2403.01586 [pdf, html, other]
Title: IoT Device Labeling Using Large Language Models
Bar Meyuhas, Anat Bremler-Barr, Tal Shapira
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[38] arXiv:2403.01626 [pdf, html, other]
Title: Using LLMs for Tabletop Exercises within the Security Domain
Sam Hays, Jules White
Comments: 7 pages, 11 figures
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:2403.01648 [pdf, html, other]
Title: "I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild
Rohit Raj, Mridul Newar, Mainack Mondal
Comments: This extended version of our USENIX Security '24 paper on users' VPN-switching behavior includes appendices for interested readers
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[40] arXiv:2403.01788 [pdf, html, other]
Title: K-stars LDP: A Novel Framework for (p, q)-clique Enumeration under Local Differential Privacy
Henan Sun, Zhengyu Wu, Rong-Hua Li, Guoren Wang, Zening Li
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Data Structures and Algorithms (cs.DS)
[41] arXiv:2403.01789 [pdf, html, other]
Title: DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks
Yinghua Hu, Kaixin Yang, Subhajit Dutta Chowdhury, Pierluigi Nuzzo
Comments: 8 pages. Accepted at the International Symposium on Quality Electronic Design (ISQED), 2024
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[42] arXiv:2403.01809 [pdf, html, other]
Title: Deployment Challenges of Industrial Intrusion Detection Systems
Konrad Wolsing, Eric Wagner, Frederik Basels, Patrick Wagner, Klaus Wehrle
Subjects: Cryptography and Security (cs.CR)
[43] arXiv:2403.01860 [pdf, html, other]
Title: MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs
Lilas Alrahis, Hassan Nassar, Jonas Krautter, Dennis Gnad, Lars Bauer, Jorg Henkel, Mehdi Tahoori
Comments: Will appear in the 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:2403.01862 [pdf, html, other]
Title: MTS: Bringing Multi-Tenancy to Virtual Networking
Kashyap Thimmaraju, Saad Hermak, Gábor Rétvári, Stefan Schmid
Journal-ref: USENIX ATC 2019
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[45] arXiv:2403.01871 [pdf, html, other]
Title: Penetration Testing of 5G Core Network Web Technologies
Filippo Giambartolomei, Marc Barceló, Alessandro Brighente, Aitor Urbieta, Mauro Conti
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:2403.01878 [pdf, html, other]
Title: I DPID It My Way! A Covert Timing Channel in Software-Defined Networks
Robert Krösche, Kashyap Thimmaraju, Liron Schiff, Stefan Schmid
Journal-ref: IFIP Networking 2018
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[47] arXiv:2403.02014 [pdf, html, other]
Title: Unveiling Hidden Links Between Unseen Security Entities
Daniel Alfasi, Tal Shapira, Anat Bremler Barr
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[48] arXiv:2403.02172 [pdf, other]
Title: Mirage: Defense against CrossPath Attacks in Software Defined Networks
Shariq Murtuza, Krishna Asawa
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:2403.02225 [pdf, other]
Title: Building Trust in Data for IoT Systems
Davide Margaria, Alberto Carelli, Andrea Vesco
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:2403.02232 [pdf, other]
Title: Comprehensive evaluation of Mal-API-2019 dataset by machine learning in malware detection
Zhenglin Li, Haibei Zhu, Houze Liu, Jintong Song, Qishuo Cheng
Journal-ref: International Journal of Computer Science and Information Technology, 2024, 2(1), 1-9
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
Total of 522 entries : 1-25 26-50 51-75 76-100 101-125 ... 501-522
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack