Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2024

Total of 522 entries : 1-25 26-50 51-75 76-100 101-125 126-150 ... 501-522
Showing up to 25 entries per page: fewer | more | all
[51] arXiv:2403.02253 [pdf, html, other]
Title: KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection
Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Hoon Wei Lim, Bryan Hooi
Comments: Accepted by USENIX Security 2024
Journal-ref: 33rd USENIX Security Symposium (USENIX Security 2024), 793--810
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[52] arXiv:2403.02445 [pdf, html, other]
Title: Free Proxies Unmasked: A Vulnerability and Longitudinal Analysis of Free Proxy Services
Naif Mehanna (1, 2 and 3), Walter Rudametkin (4, 5 and 6), Pierre Laperdrix (2, 1 and 3), Antoine Vastel (7) ((1) University of Lille, (2) CNRS, (3) Inria Lille, (4) University of Rennes, (5) IRISA, (6) IUF, (7) Datadome)
Comments: Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb'24)
Subjects: Cryptography and Security (cs.CR)
[53] arXiv:2403.02459 [pdf, html, other]
Title: Cybersecurity competence of older adult users of mobile devices
Simon Vrhovec, Igor Bernik, Damjan Fujs, Damjan Vavpotič
Subjects: Cryptography and Security (cs.CR)
[54] arXiv:2403.02546 [pdf, html, other]
Title: Catch'em all: Classification of Rare, Prominent, and Novel Malware Families
Maksim E. Eren, Ryan Barron, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Rasmussen, Boian S. Alexandrov, Charles Nicholas
Comments: Accepted at IEEE 12th International Symposium on Digital Forensics and Security (ISDFS), 2024. arXiv admin note: text overlap with arXiv:2309.01350
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:2403.02680 [pdf, html, other]
Title: A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage
Ziyuan Yang, Ming Kang, Andrew Beng Jin Teoh, Chengrui Gao, Wen Chen, Bob Zhang, Yi Zhang
Journal-ref: IEEE T-IFS 2024
Subjects: Cryptography and Security (cs.CR)
[56] arXiv:2403.02744 [pdf, html, other]
Title: Self-adaptive Traffic Anomaly Detection System for IoT Smart Home Environments
Naoto Watanabe (1), Taku Yamazaki (1), Takumi Miyoshi (1), Ryo Yamamoto (2), Masataka Nakahara (3), Norihiro Okui (3), Ayumu Kubota (3) ((1) Shibaura Institute of Technology, (2) The University of Electro-Communications, (3) KDDI Research, Inc.)
Comments: 12 pages, 43 figures
Subjects: Cryptography and Security (cs.CR)
[57] arXiv:2403.02817 [pdf, html, other]
Title: Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications
Stav Cohen, Ron Bitton, Ben Nassi
Comments: Website: this https URL
Subjects: Cryptography and Security (cs.CR)
[58] arXiv:2403.02955 [pdf, html, other]
Title: XAI-Based Detection of Adversarial Attacks on Deepfake Detectors
Ben Pinhasov, Raz Lapid, Rony Ohayon, Moshe Sipper, Yehudit Aperstein
Comments: Accepted at TMLR 2024
Journal-ref: Transactions on Machine Learning Research, 2024
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[59] arXiv:2403.02983 [pdf, html, other]
Title: Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[60] arXiv:2403.02995 [pdf, html, other]
Title: Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[61] arXiv:2403.03149 [pdf, html, other]
Title: Robust Federated Learning Mitigates Client-side Training Data Distribution Inference Attacks
Yichang Xu, Ming Yin, Minghong Fang, Neil Zhenqiang Gong
Comments: To appear in The Web Conference 2024 (WWW '24)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[62] arXiv:2403.03265 [pdf, other]
Title: Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline
Lampis Alevizos, Martijn Dekker
Journal-ref: https://www.mdpi.com/2079-9292/13/11/2021
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:2403.03267 [pdf, html, other]
Title: TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla
Comments: Under Review
Journal-ref: Digital Threats: Research and Practice (2024)
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:2403.03360 [pdf, other]
Title: Bridge the Future: High-Performance Networks in Confidential VMs without Trusted I/O devices
Mengyuan Li, Shashvat Srivastava, Mengjia Yan
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:2403.03486 [pdf, other]
Title: PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices
Hongming Fei, Owen Millwood, Gope Prosanta, Jack Miskelly, Biplab Sikdar
Comments: 11 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:2403.03590 [pdf, html, other]
Title: DeepEclipse: How to Break White-Box DNN-Watermarking Schemes
Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi
Comments: To appear in the 33rd USENIX Security Symposium, August 2024, Philadelphia, PA, USA. 18 pages, 7 figures, 4 tables, 5 algorithms, 13 equations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[67] arXiv:2403.03592 [pdf, other]
Title: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training
Tanveer Khan, Mindaugas Budzys, Khoa Nguyen, Antonis Michalas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[68] arXiv:2403.03593 [pdf, html, other]
Title: Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem
Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Perez-Cruz
Comments: Paper accepted at IEEE Transactions on Dependable and Secure Computing, 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[69] arXiv:2403.03654 [pdf, html, other]
Title: Integrity-protecting block cipher modes -- Untangling a tangled web
Chris J Mitchell
Comments: Minor typos fixed
Subjects: Cryptography and Security (cs.CR)
[70] arXiv:2403.03655 [pdf, other]
Title: Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead
Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, Mauro Conti
Comments: The algorithms in Section 4 contain defects and inaccurate descriptions that require correction
Subjects: Cryptography and Security (cs.CR)
[71] arXiv:2403.03701 [pdf, html, other]
Title: Security Testing of RESTful APIs With Test Case Mutation
Sebastien Salva, Jarod Sue
Comments: 13 pages, 9 figures, 1 table
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[72] arXiv:2403.03792 [pdf, html, other]
Title: Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks
Dario Pasquini, Martin Strohmeier, Carmela Troncoso
Comments: v0.2
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[73] arXiv:2403.03858 [pdf, html, other]
Title: Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, Selcuk Uluagac
Comments: Accepted at IEEE International Conference on Communications (ICC) 2024
Subjects: Cryptography and Security (cs.CR)
[74] arXiv:2403.03998 [pdf, html, other]
Title: OpenVPN is Open to VPN Fingerprinting
Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
Comments: In: USENIX Security Symposium 2022 (USENIX Security '22)
Journal-ref: 31st USENIX Security Symposium (USENIX Security 22). 2022
Subjects: Cryptography and Security (cs.CR)
[75] arXiv:2403.04113 [pdf, html, other]
Title: ZTRAN: Prototyping Zero Trust Security xApps for Open Radio Access Network Deployments
Aly S. Abdalla, Joshua Moore, Nisha Adhikari, Vuk Marojevic
Comments: This article has been accepted for publication in the IEEE Wireless Communications Magazine
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Systems and Control (eess.SY)
Total of 522 entries : 1-25 26-50 51-75 76-100 101-125 126-150 ... 501-522
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack