Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2024

Total of 522 entries : 1-50 101-150 151-200 201-250 251-300 301-350 351-400 401-450 ... 501-522
Showing up to 50 entries per page: fewer | more | all
[251] arXiv:2403.14719 [pdf, html, other]
Title: Bypassing LLM Watermarks with Color-Aware Substitutions
Qilong Wu, Varun Chandrasekaran
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[252] arXiv:2403.14720 [pdf, html, other]
Title: Defending Against Indirect Prompt Injection Attacks With Spotlighting
Keegan Hines, Gary Lopez, Matthew Hall, Federico Zarfati, Yonatan Zunger, Emre Kiciman
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[253] arXiv:2403.14724 [pdf, html, other]
Title: Six Levels of Privacy: A Framework for Financial Synthetic Data
Tucker Balch, Vamsi K. Potluru, Deepak Paramanand, Manuela Veloso
Comments: Six privacy levels framework; excerpted from "Synthetic Data Applications in Finance'' (arXiv:2401.00081) article
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistical Finance (q-fin.ST)
[254] arXiv:2403.14725 [pdf, html, other]
Title: Testing the Limits of Jailbreaking Defenses with the Purple Problem
Taeyoun Kim, Suhas Kotha, Aditi Raghunathan
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[255] arXiv:2403.14731 [pdf, html, other]
Title: Reversible Jump Attack to Textual Classifiers with Modification Reduction
Mingze Ni, Zhensu Sun, Wei Liu
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[256] arXiv:2403.14739 [pdf, other]
Title: Improving Galileo OSNMA Time To First Authenticated Fix
Aleix Galan (1), Ignacio Fernandez-Hernandez (1 and 2), Wim De Wilde (3), Sofie Pollin (1), Gonzalo Seco-Granados (4) ((1) KU Leuven, (2) European Commission, (3) Septentrio NV, (4) Universitat Autonoma de Barcelona)
Comments: This work has been submitted to the IEEE for possible publication. 15 pages, 17 figures. Updated version with major changes. New sections II-B, IV-A, IV-C. Updated sections IV-B, VI-D. Acronym changes and fixed typos
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[257] arXiv:2403.14872 [pdf, html, other]
Title: Structuring the Chaos: Enabling Small Business Cyber-Security Risks & Assets Modelling with a UML Class Model
Tracy Tam, Asha Rao, Joanne Hall
Subjects: Cryptography and Security (cs.CR)
[258] arXiv:2403.14916 [pdf, html, other]
Title: Snail: Secure Single Iteration Localization
James Choncholas, Pujith Kachana, André Mateus, Gregoire Phillips, Ada Gavrilovska
Subjects: Cryptography and Security (cs.CR)
[259] arXiv:2403.14963 [pdf, html, other]
Title: Enabling Physical Localization of Uncooperative Cellular Devices
Taekkyung Oh, Sangwook Bae, Junho Ahn, Yonghwa Lee, Tuan Dinh Hoang, Min Suk Kang, Nils Ole Tippenhauer, Yongdae Kim
Subjects: Cryptography and Security (cs.CR)
[260] arXiv:2403.14985 [pdf, html, other]
Title: FileDES: A Secure Scalable and Succinct Decentralized Encrypted Storage Network
Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng, Dongxiao Yu, Qin Hu, Yijun Li, Yipu Wu
Comments: 10 pages, 8 figures, 1 table. Accepted by 2024 IEEE INFOCOM
Subjects: Cryptography and Security (cs.CR)
[261] arXiv:2403.15030 [pdf, html, other]
Title: Tie-Breaking Rule Based on Partial Proof of Work in a Blockchain
Akira Sakurai, Kazuyuki Shudo
Journal-ref: IEEE Access, vol. 12, pp. 197999-198014, 2024
Subjects: Cryptography and Security (cs.CR)
[262] arXiv:2403.15052 [pdf, html, other]
Title: The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang
Comments: This is a full version paper that includes the security proof. The paper with the same name has been published by NDSS 2023
Journal-ref: NDSS 2023
Subjects: Cryptography and Security (cs.CR)
[263] arXiv:2403.15078 [pdf, html, other]
Title: Real-time Threat Detection Strategies for Resource-constrained Devices
Mounia Hamidouche, Biniam Fisseha Demissie, Bilel Cherif
Subjects: Cryptography and Security (cs.CR)
[264] arXiv:2403.15080 [pdf, html, other]
Title: Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts
Andre Büttner, Nils Gruschka
Comments: 10 pages, published and presented at ICISSP 2024
Journal-ref: Proceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP; 2024; ISBN 978-989-758-683-5, ISSN 2184-4356, SciTePress, pages 691-700
Subjects: Cryptography and Security (cs.CR)
[265] arXiv:2403.15191 [pdf, html, other]
Title: VORTEX: Real-Time Off-Chain Payments and Cross-Chain Swaps for Cryptocurrencies
Di Wu, Jian Liu, Zhengwei Hou, Wu Wen, Kui Ren
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[266] arXiv:2403.15197 [pdf, html, other]
Title: Cryptic Bytes: WebAssembly Obfuscation for Evading Cryptojacking Detection
Håkon Harnes, Donn Morrison
Subjects: Cryptography and Security (cs.CR)
[267] arXiv:2403.15208 [pdf, html, other]
Title: VPAS: Publicly Verifiable and Privacy-Preserving Aggregate Statistics on Distributed Datasets
Mohammed Alghazwi, Dewi Davies-Batista, Dimka Karastoyanova, Fatih Turkmen
Subjects: Cryptography and Security (cs.CR)
[268] arXiv:2403.15224 [pdf, html, other]
Title: Differentially Private Ad Conversion Measurement
John Delaney, Badih Ghazi, Charlie Harrison, Christina Ilvento, Ravi Kumar, Pasin Manurangsi, Martin Pal, Karthik Prabhakar, Mariana Raykova
Comments: To appear in PoPETS 2024
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[269] arXiv:2403.15233 [pdf, html, other]
Title: Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU
Olivia Gruza (1,2), Elias Heftrig (1,2), Oliver Jacobsen (1,2), Haya Schulmann (1,2), Niklas Vogel (1,2), Michael Waidner (2, 3, 4) ((1) Goethe-Universität Frankfurt, (2) National Research Center for Applied Cybersecurity ATHENE, (3) Fraunhofer Institute for Secure Information Technology SIT, (4) Technische Universität Darmstadt)
Comments: 13 pages, 7 figures for the associated zonefile generator implementation, see this https URL submitted to USENIX WOOT '24
Subjects: Cryptography and Security (cs.CR)
[270] arXiv:2403.15271 [pdf, html, other]
Title: From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li
Subjects: Cryptography and Security (cs.CR)
[271] arXiv:2403.15365 [pdf, html, other]
Title: A Transfer Attack to Image Watermarks
Yuepeng Hu, Zhengyuan Jiang, Moyang Guo, Neil Zhenqiang Gong
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[272] arXiv:2403.15509 [pdf, html, other]
Title: Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection
Phai Vu Dinh, Quang Uy Nguyen, Thai Hoang Dinh, Diep N. Nguyen, Bao Son Pham, Eryk Dutkiewicz
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[273] arXiv:2403.15510 [pdf, html, other]
Title: Privacy-Preserving End-to-End Spoken Language Understanding
Yinggui Wang, Wei Huang, Le Yang
Comments: Accepted by IJCAI
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[274] arXiv:2403.15522 [pdf, html, other]
Title: Medical Image Data Provenance for Medical Cyber-Physical System
Vijay Kumar, Kolin Paul
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[275] arXiv:2403.15607 [pdf, html, other]
Title: Assessing Web Fingerprinting Risk
Enrico Bacis, Igor Bilogrevic, Robert Busa-Fekete, Asanka Herath, Antonio Sartori, Umar Syed
Comments: A version of this report to appear in the proceedings of The Web Conference (WWW) 2024. This version contains additional material in the appendix
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[276] arXiv:2403.15638 [pdf, html, other]
Title: Differentially Private Next-Token Prediction of Large Language Models
James Flemings, Meisam Razaviyayn, Murali Annavaram
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[277] arXiv:2403.15723 [pdf, html, other]
Title: A hybrid LLM workflow can help identify user privilege related variables in programs of any size
Haizhou Wang, Zhilong Wang, Peng Liu
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[278] arXiv:2403.15884 [pdf, html, other]
Title: UPSS: a User-centric Private Storage System with its applications
Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[279] arXiv:2403.16060 [pdf, other]
Title: Port Forwarding Services Are Forwarding Security Risks
Haoyuan Wang, Yue Xue, Xuan Feng, Chao Zhou, Xianghang Mi
Subjects: Cryptography and Security (cs.CR)
[280] arXiv:2403.16083 [pdf, html, other]
Title: Quantifying Arbitrage in Automated Market Makers: An Empirical Study of Ethereum ZK Rollups
Krzysztof Gogol, Johnnatan Messias, Deborah Miori, Claudio Tessone, Benjamin Livshits
Comments: In proceedings of Marble 2024
Subjects: Cryptography and Security (cs.CR)
[281] arXiv:2403.16149 [pdf, other]
Title: Analyzing Consumer IoT Traffic from Security and Privacy Perspectives: a Comprehensive Survey
Yan Jia, Yuxin Song, Zihou Liu, Qingyin Tan, Yang Song, Yu Zhang, Zheli Liu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[282] arXiv:2403.16196 [pdf, html, other]
Title: Behind the (Digital Crime) Scenes: An MSC Model
Mario Raciti, Giampaolo Bella
Comments: Accepted in 12th International Symposium on Digital Forensics and Security (ISDFS 2024). 979-8-3503-3036-6/24/$31.00 copyright 2024 IEEE
Subjects: Cryptography and Security (cs.CR)
[283] arXiv:2403.16304 [pdf, other]
Title: SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned
Omar Alrawi, Miuyin Yong Wong, Athanasios Avgetidis, Kevin Valakuzhy, Boladji Vinny Adjibi, Konstantinos Karakatsanis, Mustaque Ahamad, Doug Blough, Fabian Monrose, Manos Antonakakis
Subjects: Cryptography and Security (cs.CR)
[284] arXiv:2403.16473 [pdf, html, other]
Title: Plaintext-Free Deep Learning for Privacy-Preserving Medical Image Analysis via Frequency Information Embedding
Mengyu Sun, Ziyuan Yang, Maosong Ran, Zhiwen Wang, Hui Yu, Yi Zhang
Subjects: Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[285] arXiv:2403.16757 [pdf, other]
Title: Bi-objective Optimization in Role Mining
Jason Crampton, Eduard Eiben, Gregory Gutin, Daniel Karapetyan, Diptapriyo Majumdar
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computational Complexity (cs.CC)
[286] arXiv:2403.16860 [pdf, html, other]
Title: CipherFormer: Efficient Transformer Private Inference with Low Round Complexity
Weize Wang, Yi Kuang
Comments: Accepted by CSCWD 2024 (27th International Conference on Computer Supported Cooperative Work in Design)
Subjects: Cryptography and Security (cs.CR)
[287] arXiv:2403.16903 [pdf, html, other]
Title: Towards Secure and Trusted-by-Design Smart Contracts
Zaynah Dargaye, Önder Gürcan, Florent Kirchner, Sara Tucci-Piergiovanni
Comments: 17 pages, 1 algorithm, The 29th Francophone Days of Application Languages - JFLA 2018
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[288] arXiv:2403.17068 [pdf, html, other]
Title: Semantic Ranking for Automated Adversarial Technique Annotation in Security Text
Udesh Kumarasinghe, Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala, Preslav Nakov
Subjects: Cryptography and Security (cs.CR)
[289] arXiv:2403.17081 [pdf, html, other]
Title: Machine Learning on Blockchain Data: A Systematic Mapping Study
Georgios Palaiokrassas, Sarah Bouraga, Leandros Tassiulas
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[290] arXiv:2403.17160 [pdf, html, other]
Title: CYGENT: A cybersecurity conversational agent with log summarization powered by GPT-3
Prasasthy Balasubramanian, Justin Seby, Panos Kostakos
Comments: 7 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[291] arXiv:2403.17296 [pdf, html, other]
Title: Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure Lookup Table Computation
Hamza Saleem, Amir Ziashahabi, Muhammad Naveed, Salman Avestimehr
Comments: Accepted at Privacy Enhancing Technologies Symposium (PETS) 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[292] arXiv:2403.17303 [pdf, html, other]
Title: Two Birds with One Stone: Differential Privacy by Low-power SRAM Memory
Jianqing Liu, Na Gong, Hritom Das
Comments: 15 pages, with 2 pages of Appendix
Journal-ref: IEEE Transactions on Dependable and Secure Computing, 2024
Subjects: Cryptography and Security (cs.CR)
[293] arXiv:2403.17336 [pdf, html, other]
Title: Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models
Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang
Comments: Accepted by USENIX Security 2024
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[294] arXiv:2403.17414 [pdf, html, other]
Title: The Privacy Policy Permission Model: A Unified View of Privacy Policies
Maryam Majedi, Ken Barker
Comments: 23 pages + 2 pages references + 11 Pages Appendix, 19 figures,Published in teh Trasactions on Data Privacy in April 2021
Journal-ref: Transactions on Data Privacy, volume 14, number 1, pages 1-36, year 2021
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[295] arXiv:2403.17458 [pdf, html, other]
Title: Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice
Jake Hesford, Daniel Cheng, Alan Wan, Larry Huynh, Seungho Kim, Hyoungshick Kim, Jin B. Hong
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[296] arXiv:2403.17494 [pdf, html, other]
Title: FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids
Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti
Journal-ref: Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2024, Lecture Notes in Computer Science, 14828, 503--524
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[297] arXiv:2403.17524 [pdf, html, other]
Title: Provably Secure Disambiguating Neural Linguistic Steganography
Yuang Qi, Kejiang Chen, Kai Zeng, Weiming Zhang, Nenghai Yu
Comments: 12 pages. Accepted by IEEE Transactions on Dependable and Secure Computing (TDSC)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[298] arXiv:2403.17571 [pdf, html, other]
Title: Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems
Salko Korac, Leandros Maglaras, Naghmeh Moradpoor, Bill Buchanan, Berk Canberk
Subjects: Cryptography and Security (cs.CR)
[299] arXiv:2403.17648 [pdf, html, other]
Title: Healthcare Data Governance, Privacy, and Security -- A Conceptual Framework
Amen Faridoon, M. Tahar Kechadi
Subjects: Cryptography and Security (cs.CR)
[300] arXiv:2403.17674 [pdf, html, other]
Title: Depending on yourself when you should: Mentoring LLM with RL agents to become the master in cybersecurity games
Yikuan Yan, Yaolun Zhang, Keman Huang
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
Total of 522 entries : 1-50 101-150 151-200 201-250 251-300 301-350 351-400 401-450 ... 501-522
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack