Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for April 2024

Total of 556 entries : 1-50 51-100 101-150 151-200 201-250 ... 551-556
Showing up to 50 entries per page: fewer | more | all
[51] arXiv:2404.02928 [pdf, html, other]
Title: Jailbreaking Prompt Attack: A Controllable Adversarial Attack against Diffusion Models
Jiachen Ma, Yijiang Li, Zhiqing Xiao, Anda Cao, Jie Zhang, Chao Ye, Junbo Zhao
Journal-ref: NAACL2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[52] arXiv:2404.02930 [pdf, html, other]
Title: What Blocks My Blockchain's Throughput? Developing a Generalizable Approach for Identifying Bottlenecks in Permissioned Blockchains
Orestis Papageorgiou, Lasse Börtzler, Egor Ermolaev, Jyoti Kumari, Johannes Sedlmeir
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[53] arXiv:2404.03027 [pdf, html, other]
Title: JailBreakV: A Benchmark for Assessing the Robustness of MultiModal Large Language Models against Jailbreak Attacks
Weidi Luo, Siyuan Ma, Xiaogeng Liu, Xiaoyu Guo, Chaowei Xiao
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[54] arXiv:2404.03162 [pdf, html, other]
Title: LTRDetector: Exploring Long-Term Relationship for Advanced Persistent Threats Detection
Xiaoxiao Liu, Fan Xu, Nan Wang, Qinxin Zhao, Dalin Zhang, Xibin Zhao, Jiqiang Liu
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:2404.03216 [pdf, html, other]
Title: Accurate Low-Degree Polynomial Approximation of Non-polynomial Operators for Fast Private Inference in Homomorphic Encryption
Jianming Tong, Jingtian Dang, Anupam Golder, Callie Hao, Arijit Raychowdhury, Tushar Krishna
Comments: Proceedings of the 5th MLSys Conference, Santa Clara, CA, USA, 2024. Copyright 2024 by the author(s)
Subjects: Cryptography and Security (cs.CR)
[56] arXiv:2404.03233 [pdf, html, other]
Title: Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning
Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue
Comments: To Appear in the 45th IEEE Symposium on Security and Privacy, May 20-23, 2024
Subjects: Cryptography and Security (cs.CR)
[57] arXiv:2404.03276 [pdf, html, other]
Title: A Deep Reinforcement Learning Approach for Security-Aware Service Acquisition in IoT
Marco Arazzi, Serena Nicolazzo, Antonino Nocera
Journal-ref: Journal of Information Security and Applications 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[58] arXiv:2404.03387 [pdf, html, other]
Title: Heckler: Breaking Confidential VMs with Malicious Interrupts
Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde
Comments: Extended version of the Usenix Security 2024 paper
Subjects: Cryptography and Security (cs.CR)
[59] arXiv:2404.03442 [pdf, html, other]
Title: Privacy Engineering From Principles to Practice: A Roadmap
Frank Pallas, Katharina Koerner, Isabel Barberá, Jaap-Henk Hoepman, Meiko Jensen, Nandita Rao Narla, Nikita Samarin, Max-R. Ulbricht, Isabel Wagner, Kim Wuyts, Christian Zimmermann
Journal-ref: IEEE Security & Privacy, volume 22, issue 2, March-April 2024
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Software Engineering (cs.SE)
[60] arXiv:2404.03509 [pdf, html, other]
Title: Privacy-Enhancing Technologies for Artificial Intelligence-Enabled Systems
Liv d'Aliberti, Evan Gronberg, Joseph Kovba
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:2404.03526 [pdf, html, other]
Title: WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde
Comments: Extended version of the IEEE S&P 2024 paper
Subjects: Cryptography and Security (cs.CR)
[62] arXiv:2404.03771 [pdf, other]
Title: R5Detect: Detecting Control-Flow Attacks from Standard RISC-V Enclaves
Davide Bove, Lukas Panzer
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:2404.03823 [pdf, html, other]
Title: An Investigation into Misuse of Java Security APIs by Large Language Models
Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar
Comments: This paper has been accepted by ACM ASIACCS 2024
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Computers and Society (cs.CY)
[64] arXiv:2404.03845 [pdf, other]
Title: Buck You: Designing Easy-to-Onboard Blockchain Applications with Zero-Knowledge Login and Sponsored Transactions on Sui
Eason Chen, Zimo Xiao, Justa Liang, Damien Chen, Pierce Hung, Kostas Kryptos Chalkias
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[65] arXiv:2404.03873 [pdf, html, other]
Title: PrivShape: Extracting Shapes in Time Series under User-Level Local Differential Privacy
Yulian Mao, Qingqing Ye, Haibo Hu, Qi Wang, Kai Huang
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:2404.03874 [pdf, html, other]
Title: VELLET: Verifiable Embedded Wallet for Securing Authenticity and Integrity
Hiroki Watanabe, Kohei Ichihara, Takumi Aita
Comments: A shortened version is to be published at the IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2024
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[67] arXiv:2404.03877 [pdf, html, other]
Title: Beyond the Bridge: Contention-Based Covert and Side Channel Attacks on Multi-GPU Interconnect
Yicheng Zhang, Ravan Nazaraliyev, Sankha Baran Dutta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker
Comments: Accepted to SEED 2024
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:2404.03948 [pdf, html, other]
Title: Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks
Ana-Maria Cretu, Miruna Rusu, Yves-Alexandre de Montjoye
Comments: Extended version, including the Appendix, of a paper with the same title which will appear in the Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy (CODASPY '24). The first two authors contributed equally
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[69] arXiv:2404.04006 [pdf, html, other]
Title: From Theory to Comprehension: A Comparative Study of Differential Privacy and $k$-Anonymity
Saskia Nuñez von Voigt, Luise Mehner, Florian Tschorsch
Comments: Accepted to ACM CODASPY'24, 19-21 June 2024, Porto, Portugal
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[70] arXiv:2404.04098 [pdf, html, other]
Title: You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
Qiushi Li, Yan Zhang, Ju Ren, Qi Li, Yaoxue Zhang
Comments: 18 pages, 11 figures
Subjects: Cryptography and Security (cs.CR)
[71] arXiv:2404.04127 [pdf, html, other]
Title: On the Feasibility of CubeSats Application Sandboxing for Space Missions
Gabriele Marra (1), Ulysse Planta (1), Philipp Wüstenberg (2), Ali Abbasi (1) ((1) CISPA Helmholtz Center for Information Security, (2) Chair of Space Technology Technische Universität Berlin)
Comments: 8 pages, 5 figures, accepted to SpaceSec Workshop 2024 and to be published as post-conference proceedings with NDSS 2024
Subjects: Cryptography and Security (cs.CR)
[72] arXiv:2404.04129 [pdf, other]
Title: Smart Contract Languages: a comparative analysis
Massimo Bartoletti, Lorenzo Benetollo, Michele Bugliesi, Silvia Crafa, Giacomo Dal Sasso, Roberto Pettinau, Andrea Pinna, Mattia Piras, Sabina Rossi, Stefano Salis, Alvise Spanò, Viacheslav Tkachenko, Roberto Tonelli, Roberto Zunino
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[73] arXiv:2404.04139 [pdf, other]
Title: Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning
K Naveen Kumar, C Krishna Mohan, Aravind Machiry
Comments: 14 pages, 11 figures, 5 tables, Accepted in ACM CODASPY 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[74] arXiv:2404.04188 [pdf, other]
Title: Reliable Feature Selection for Adversarially Robust Cyber-Attack Detection
João Vitorino, Miguel Silva, Eva Maia, Isabel Praça
Comments: 24 pages, 17 tables, Annals of Telecommunications journal. arXiv admin note: substantial text overlap with arXiv:2402.16912
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[75] arXiv:2404.04245 [pdf, other]
Title: Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism
Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen
Comments: This report pertains to the Capstone Project done by Group 1 of the Fall batch of 2023 students at Praxis Tech School, Kolkata, India. The reports consists of 35 pages and it includes 15 figures and 10 tables. This is the preprint which will be submitted to to an IEEE international conference for review
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[76] arXiv:2404.04254 [pdf, html, other]
Title: Watermark-based Attribution of AI-Generated Content
Zhengyuan Jiang, Moyang Guo, Yuepeng Hu, Neil Zhenqiang Gong
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[77] arXiv:2404.04262 [pdf, html, other]
Title: The Future of MEV
Jonah Burian
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[78] arXiv:2404.04297 [pdf, html, other]
Title: ProLoc: Robust Location Proofs in Hindsight
Roberta De Viti, Pierfrancesco Ingo, Isaac Sheff, Peter Druschel, Deepak Garg
Comments: 14 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:2404.04306 [pdf, html, other]
Title: AuditGPT: Auditing Smart Contracts with ChatGPT
Shihao Xia, Shuai Shao, Mengting He, Tingting Yu, Linhai Song, Yiying Zhang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computers and Society (cs.CY)
[80] arXiv:2404.04385 [pdf, html, other]
Title: Reconfigurable and Scalable Honeynet for Cyber-Physical Systems
Luís Sousa, José Cecílio, Pedro Ferreira, Alan Oliveira
Subjects: Cryptography and Security (cs.CR)
[81] arXiv:2404.04392 [pdf, html, other]
Title: Fine-Tuning, Quantization, and LLMs: Navigating Unintended Outcomes
Divyanshu Kumar, Anurakt Kumar, Sahil Agarwal, Prashanth Harshangi
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[82] arXiv:2404.04466 [pdf, other]
Title: Cybersecurity for Modern Smart Grid against Emerging Threats
Daisuke Mashima, Yao Chen, Muhammad M. Roomi, Subhash Lakshminarayana, Deming Chen
Comments: 98 pages
Journal-ref: Foundations and Trends in Privacy and Security 5.4 (2023)
Subjects: Cryptography and Security (cs.CR)
[83] arXiv:2404.04500 [pdf, html, other]
Title: Trustless Audits without Revealing Data or Models
Suppakit Waiwitlikhit, Ion Stoica, Yi Sun, Tatsunori Hashimoto, Daniel Kang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[84] arXiv:2404.04567 [pdf, html, other]
Title: Optimization of Lightweight Malware Detection Models For AIoT Devices
Felicia Lo, Shin-Ming Cheng, Rafael Kaliski
Comments: Accepted by WF-IOT 2023, 7 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[85] arXiv:2404.04601 [pdf, html, other]
Title: Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks
Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu
Comments: Accepted by Network and Distributed System Security (NDSS) Symposium 2024
Subjects: Cryptography and Security (cs.CR)
[86] arXiv:2404.04648 [pdf, html, other]
Title: CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems
Francesco Marchiori, Mauro Conti
Comments: Accepted at WiseML 2024
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:2404.04706 [pdf, html, other]
Title: Advances in Differential Privacy and Differentially Private Machine Learning
Saswat Das, Subhankar Mishra
Journal-ref: Information Technology Security, 2024, pp 147 to 188, Springer Tracts in Electrical and Electronics Engineering, Springer, Singapore
Subjects: Cryptography and Security (cs.CR)
[88] arXiv:2404.04725 [pdf, html, other]
Title: We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers
Simon Vrhovec, Blaž Markelj
Subjects: Cryptography and Security (cs.CR)
[89] arXiv:2404.04729 [pdf, html, other]
Title: Towards a low carbon proof-of-work blockchain
Agron Gemajli, Shivam Patel, Phillip G. Bradford
Subjects: Cryptography and Security (cs.CR)
[90] arXiv:2404.04769 [pdf, other]
Title: Safeguarding Voice Privacy: Harnessing Near-Ultrasonic Interference To Protect Against Unauthorized Audio Recording
Forrest McKee, David Noever
Subjects: Cryptography and Security (cs.CR)
[91] arXiv:2404.04841 [pdf, html, other]
Title: Unveiling Decentralization: A Comprehensive Review of Technologies, Comparison, Challenges in Bitcoin, Ethereum, and Solana Blockchain
Han Song, Yihao Wei, Zhongche Qu, Weihan Wang
Subjects: Cryptography and Security (cs.CR)
[92] arXiv:2404.04849 [pdf, html, other]
Title: Hidden You Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Logic Chain Injection
Zhilong Wang, Yebo Cao, Peng Liu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[93] arXiv:2404.04861 [pdf, html, other]
Title: Privacy-Preserving Traceable Functional Encryption for Inner Product
Muyao Qiu, Jinguang Han
Subjects: Cryptography and Security (cs.CR)
[94] arXiv:2404.04886 [pdf, html, other]
Title: PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer
Xingyu Su, Xiaojie Zhu, Yang Li, Yong Li, Chi Chen, Paulo Esteves-Veríssimo
Comments: Be accepted by DSN 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[95] arXiv:2404.04937 [pdf, html, other]
Title: Optimizing Information Propagation for Blockchain-empowered Mobile AIGC: A Graph Attention Network Approach
Jiana Liao, Jinbo Wen, Jiawen Kang, Yang Zhang, Jianbo Du, Qihao Li, Weiting Zhang, Dong Yang
Comments: arXiv admin note: substantial text overlap with arXiv:2403.13237
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[96] arXiv:2404.04948 [pdf, other]
Title: Iniva: Inclusive and Incentive-compatible Vote Aggregation
Arian Baloochestani, Hanish Gogada, Leander Jehl, Hein Meling
Comments: Committee-based blockchains, Vote omission attack, Vote inclusion, Signature aggregation, Incentive-compatible
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[97] arXiv:2404.04991 [pdf, html, other]
Title: An Analysis of Malicious Packages in Open-Source Software in the Wild
Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li
Journal-ref: the 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks(DSN), 2025
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[98] arXiv:2404.05106 [pdf, html, other]
Title: Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files
Aleksandr Dolgavin, Mark Yampolskiy, Moti Yung
Comments: CODASPY'24
Subjects: Cryptography and Security (cs.CR)
[99] arXiv:2404.05130 [pdf, html, other]
Title: Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning
Yu Bi, Yekai Li, Xuan Feng, Xianghang Mi
Subjects: Cryptography and Security (cs.CR)
[100] arXiv:2404.05188 [pdf, other]
Title: Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging
Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang
Comments: Accepted by ACM CCS-LAMPS 2024 (Best Paper Award)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
Total of 556 entries : 1-50 51-100 101-150 151-200 201-250 ... 551-556
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack