Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for September 2024

Total of 586 entries : 1-100 101-200 201-300 301-400 401-500 501-586
Showing up to 100 entries per page: fewer | more | all
[201] arXiv:2409.10031 [pdf, html, other]
Title: Assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?
Francesco Zola, Jon Ander Medina, Raul Orduna
Comments: preprint version of paper presented at 8th International Workshop on Cryptocurrencies and Blockchain Technology - CBT 2024 and published in LNCS Proceedings
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE)
[202] arXiv:2409.10057 [pdf, html, other]
Title: A Response to: A Note on "Privacy Preserving n-Party Scalar Product Protocol"
Florian van Daalen, Lianne Ippel, Andre Dekker, Inigo Bermejo
Subjects: Cryptography and Security (cs.CR)
[203] arXiv:2409.10109 [pdf, html, other]
Title: Analysing Attacks on Blockchain Systems in a Layer-based Approach
Joydip Das, Syed Ashraf Al Tasin, Md. Forhad Rabbi, Md Sadek Ferdous
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[204] arXiv:2409.10192 [pdf, other]
Title: PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites
Echo Meißner, Frank Kargl, Benjamin Erb, Felix Engelmann
Comments: Prototype source code: this https URL Public test deployment: this https URL
Subjects: Cryptography and Security (cs.CR)
[205] arXiv:2409.10336 [pdf, other]
Title: Execution-time opacity control for timed automata
Étienne André, Marie Duflot, Laetitia Laversa, Engel Lefaucheux
Comments: This is the extended version of the manuscript of the same name published in the proceedings of the 22nd International Conference on Software Engineering and Formal Methods (SEFM 2024)
Journal-ref: Springer LNCS volume 15280, pages 347-365, 2024
Subjects: Cryptography and Security (cs.CR)
[206] arXiv:2409.10337 [pdf, html, other]
Title: Security, Trust and Privacy challenges in AI-driven 6G Networks
Helena Rifa-Pous, Victor Garcia-Font, Carlos Nunez-Gomez, Julian Salas
Comments: 19 pages, 6 tables
Journal-ref: CS & IT Conference Proceedings (CSCP 2024) pp.95-113
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[207] arXiv:2409.10411 [pdf, html, other]
Title: Assessing Privacy Compliance of Android Third-Party SDKs
Mark Huasong Meng, Chuan Yan, Qing Zhang, Zeyu Wang, Kailong Wang, Sin Gee Teo, Guangdong Bai, Jin Song Dong
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[208] arXiv:2409.10547 [pdf, html, other]
Title: NoPhish: Efficient Chrome Extension for Phishing Detection Using Machine Learning Techniques
Leand Thaqi, Arbnor Halili, Kamer Vishi, Blerim Rexha
Comments: 21 pages, 13 figures, 5 listings, 1 table
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[209] arXiv:2409.10561 [pdf, html, other]
Title: DrLLM: Prompt-Enhanced Distributed Denial-of-Service Resistance Method with Large Language Models
Zhenyu Yin, Shang Liu, Guangyuan Xu
Comments: Accepted by ICASSP2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[210] arXiv:2409.10563 [pdf, html, other]
Title: Applying Action Masking and Curriculum Learning Techniques to Improve Data Efficiency and Overall Performance in Operational Technology Cyber Security using Reinforcement Learning
Alec Wilson, William Holmes, Ryan Menzies, Kez Smithson Whitehead
Comments: 14 pages, 9 figures, CAMLIS'24: Conference on Applied Machine Learning for Information Security, October 24--25, 2024, Arlington, VA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[211] arXiv:2409.10574 [pdf, html, other]
Title: Detection Made Easy: Potentials of Large Language Models for Solidity Vulnerabilities
Md Tauseef Alam, Raju Halder, Abyayananda Maiti
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
[212] arXiv:2409.10578 [pdf, other]
Title: GLEAN: Generative Learning for Eliminating Adversarial Noise
Justin Lyu Kim, Kyoungwan Woo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[213] arXiv:2409.10643 [pdf, html, other]
Title: CaBaGe: Data-Free Model Extraction using ClAss BAlanced Generator Ensemble
Jonathan Rosenthal, Shanchao Liang, Kevin Zhang, Lin Tan
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[214] arXiv:2409.10667 [pdf, html, other]
Title: Benchmarking Secure Sampling Protocols for Differential Privacy
Yucheng Fu, Tianhao Wang
Comments: This is the full version (18 pages) of the paper Benchmarking Secure Sampling Protocols for Differential Privacy published at CCS'2024
Subjects: Cryptography and Security (cs.CR)
[215] arXiv:2409.10813 [pdf, html, other]
Title: Fast and Post-Quantum Authentication for Real-time Next Generation Networks with Bloom Filter
Kiarash Sedghighadikolaei, Attila A Yavuz
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[216] arXiv:2409.10828 [pdf, html, other]
Title: AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees
Eric Ficke, Raymond M. Bateman, Shouhuai Xu
Journal-ref: Proceedings of 6th International Conference on Science of Cyber Security (SciSec 2024), 270-289
Subjects: Cryptography and Security (cs.CR)
[217] arXiv:2409.10850 [pdf, html, other]
Title: An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse
Zhenyong Zhang, Kedi Yang, Youliang Tian, Jianfeng Ma
Comments: 19 pages, 16 figures
Subjects: Cryptography and Security (cs.CR)
[218] arXiv:2409.10892 [pdf, other]
Title: Technical Upgrades to and Enhancements of a System Vulnerability Analysis Tool Based on the Blackboard Architecture
Matthew Tassava, Cameron Kolodjski, Jeremy Straub
Comments: The U.S. federal sponsor has requested that we not include funding acknowledgement for this publication
Subjects: Cryptography and Security (cs.CR)
[219] arXiv:2409.10893 [pdf, other]
Title: Enhancing Security Testing Software for Systems that Cannot be Subjected to the Risks of Penetration Testing Through the Incorporation of Multi-threading and and Other Capabilities
Matthew Tassava, Cameron Kolodjski, Jordan Milbrath, Jeremy Straub
Comments: The U.S. federal sponsor has requested that we not include funding acknowledgement for this publication
Subjects: Cryptography and Security (cs.CR)
[220] arXiv:2409.10922 [pdf, html, other]
Title: Anti-ESIA: Analyzing and Mitigating Impacts of Electromagnetic Signal Injection Attacks
Denglin Kang, Youqian Zhang, Wai Cheong Tam, Eugene Y. Fu
Comments: 2 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[221] arXiv:2409.10929 [pdf, other]
Title: An Enhanced Online Certificate Status Protocol for Public Key Infrastructure with Smart Grid and Energy Storage System
Hong-Sheng Huang, Cheng-Che Chuang, Jhih-Zen Shih, Hsuan-Tung Chen, Hung-Min Sun
Comments: 12 pages, 13 figures, Cryptology and Information Security Conference 2024
Subjects: Cryptography and Security (cs.CR)
[222] arXiv:2409.11026 [pdf, html, other]
Title: Prompt Obfuscation for Large Language Models
David Pape, Sina Mavali, Thorsten Eisenhofer, Lea Schönherr
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[223] arXiv:2409.11254 [pdf, other]
Title: Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach
Kyle Stein, Andrew A. Mahyari, Guillermo Francia III, Eman El-Sheikh
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[224] arXiv:2409.11258 [pdf, html, other]
Title: Attacking Slicing Network via Side-channel Reinforcement Learning Attack
Wei Shao, Chandra Thapa, Rayne Holland, Sarah Ali Siddiqui, Seyit Camtepe
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[225] arXiv:2409.11276 [pdf, html, other]
Title: Hackphyr: A Local Fine-Tuned LLM Agent for Network Security Environments
Maria Rigaki, Carlos Catania, Sebastian Garcia
Subjects: Cryptography and Security (cs.CR)
[226] arXiv:2409.11295 [pdf, other]
Title: EIA: Environmental Injection Attack on Generalist Web Agents for Privacy Leakage
Zeyi Liao, Lingbo Mo, Chejian Xu, Mintong Kang, Jiawei Zhang, Chaowei Xiao, Yuan Tian, Bo Li, Huan Sun
Comments: Accepted by ICLR 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[227] arXiv:2409.11303 [pdf, html, other]
Title: Decentralized Biometric Authentication based on Fuzzy Commitments and Blockchain
Nibras Abo Alzahab, Giulia Rafaiani, Massimo Battaglioni, Franco Chiaraluce, Marco Baldi
Subjects: Cryptography and Security (cs.CR)
[228] arXiv:2409.11409 [pdf, html, other]
Title: CyberNFTs: Conceptualizing a decentralized and reward-driven intrusion detection system with ML
Synim Selimi, Blerim Rexha, Kamer Vishi
Comments: 9 pages, 6 figures, 1 table, 1 algorithm, 1 listing, journal article
Journal-ref: International Journal of Information and Computer Security (IJICS) 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[229] arXiv:2409.11410 [pdf, other]
Title: Multilevel Verification on a Single Digital Decentralized Distributed (DDD) Ledger
Ayush Thada, Aanchal Kandpal, Dipanwita Sinha Mukharjee
Comments: Submitted to IEEE Transactions on Information Forensics and Security Journal
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[230] arXiv:2409.11413 [pdf, other]
Title: Securing Network-Booting Linux Systems at the Example of bwLehrpool and bwForCluster NEMO
Simon Moser
Subjects: Cryptography and Security (cs.CR)
[231] arXiv:2409.11415 [pdf, html, other]
Title: A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems
Nanda Rani, Bikash Saha, Sandeep Kumar Shukla
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[232] arXiv:2409.11417 [pdf, html, other]
Title: Maritime Cybersecurity: A Comprehensive Review
Meixuan Li, Jianying Zhou, Sudipta Chattopadhyay, Mark Goh
Comments: 23 pages, long survey paper, submitted to IEEE journals because ACM computing survey is not a good fit in terms of their dedicated scope
Subjects: Cryptography and Security (cs.CR)
[233] arXiv:2409.11423 [pdf, html, other]
Title: Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data
Atilla Akkus, Masoud Poorghaffar Aghdam, Mingjie Li, Junjie Chu, Michael Backes, Yang Zhang, Sinem Sav
Comments: Accepted at 34th USENIX Security Symposium, 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[234] arXiv:2409.11428 [pdf, html, other]
Title: A Comprehensive Analysis of Machine Learning Based File Trap Selection Methods to Detect Crypto Ransomware
Mohan Anand Putrevu, Hrushikesh Chunduri, Venkata Sai Charan Putrevu, Sandeep K Shukla
Comments: We have submitted this paper in ACM Digital Threats: Research and Practice (DTRAP) Journal. The paper is currently in the review process
Subjects: Cryptography and Security (cs.CR)
[235] arXiv:2409.11445 [pdf, html, other]
Title: Jailbreaking Large Language Models with Symbolic Mathematics
Emet Bethany, Mazal Bethany, Juan Arturo Nolazco Flores, Sumit Kumar Jha, Peyman Najafirad
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[236] arXiv:2409.11454 [pdf, html, other]
Title: Golden Ratio Search: A Low-Power Adversarial Attack for Deep Learning based Modulation Classification
Deepsayan Sadhukhan, Nitin Priyadarshini Shankar, Sheetal Kalyani
Comments: 5 pages, 1 figure, 3 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[237] arXiv:2409.11592 [pdf, html, other]
Title: CountChain: A Decentralized Oracle Network for Counting Systems
Behkish Nassirzadeh, Stefanos Leonardos, Albert Heinle, Anwar Hasan, Vijay Ganesh
Comments: being published at this https URL
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT)
[238] arXiv:2409.11621 [pdf, html, other]
Title: Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making
Jingyi Sun, Qi Shi, Guodong Jin, Hao Xu, Erwu Liu
Comments: The 2024 7th IEEE Conference on Dependable and Secure Computing
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[239] arXiv:2409.11643 [pdf, html, other]
Title: Combating Phone Scams with LLM-based Detection: Where Do We Stand?
Zitong Shen, Kangzhong Wang, Youqian Zhang, Grace Ngai, Eugene Y. Fu
Comments: 2 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[240] arXiv:2409.11646 [pdf, html, other]
Title: Hard-Label Cryptanalytic Extraction of Neural Network Models
Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang
Comments: Accepted by Asiacrypt 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[241] arXiv:2409.11663 [pdf, html, other]
Title: Training with Differential Privacy: A Gradient-Preserving Noise Reduction Approach with Provable Security
Haodi Wang, Tangyu Jiang, Yu Guo, Chengjun Cai, Cong Wang, Xiaohua Jia
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[242] arXiv:2409.11693 [pdf, html, other]
Title: On the second-order zero differential properties of several classes of power functions over finite fields
Huan Zhou, Xiaoni Du, Xingbin Qiao, Wenping Yuan
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[243] arXiv:2409.11790 [pdf, html, other]
Title: Empowering Visual Artists with Tokenized Digital Assets with NFTs
Ruiqiang Li, Brian Yecies, Qin Wang, Shiping Chen, Jun Shen
Comments: 46 pages,9 figures
Subjects: Cryptography and Security (cs.CR)
[244] arXiv:2409.11803 [pdf, html, other]
Title: Model-Checking the Implementation of Consent
Raúl Pardo, Daniel Le Métayer
Comments: Pre-print of paper to appear in the proceedings of SEFM'24
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[245] arXiv:2409.11868 [pdf, other]
Title: Practical Investigation on the Distinguishability of Longa's Atomic Patterns
Sze Hei Li, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer, Ievgen Kabin
Subjects: Cryptography and Security (cs.CR)
[246] arXiv:2409.11890 [pdf, html, other]
Title: Log2graphs: An Unsupervised Framework for Log Anomaly Detection with Efficient Feature Extraction
Caihong Wang, Du Xu, Zonghang Li
Subjects: Cryptography and Security (cs.CR)
[247] arXiv:2409.12047 [pdf, html, other]
Title: A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals
Sunil Arora, John D. Hastings
Comments: 10 pages, 8 figures, 6 tables
Journal-ref: Proceedings of the 58th Annual Hawaii International Conference on System Sciences (HICSS), 2025 pp. 6161-6160
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[248] arXiv:2409.12055 [pdf, other]
Title: Artemis: Efficient Commit-and-Prove SNARKs for zkML
Hidde Lycklama, Alexander Viand, Nikolay Avramov, Nicolas Küchler, Anwar Hithnawi
Comments: 24 pages
Subjects: Cryptography and Security (cs.CR)
[249] arXiv:2409.12072 [pdf, html, other]
Title: PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning
Yukai Xu, Yujie Gu, Kouichi Sakurai
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[250] arXiv:2409.12171 [pdf, other]
Title: Semantic Interoperability on Blockchain by Generating Smart Contracts Based on Knowledge Graphs
William Van Woensel, Oshani Seneviratne
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[251] arXiv:2409.12314 [pdf, html, other]
Title: Understanding Implosion in Text-to-Image Generative Models
Wenxin Ding, Cathy Y. Li, Shawn Shan, Ben Y. Zhao, Haitao Zheng
Comments: ACM CCS 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[252] arXiv:2409.12331 [pdf, html, other]
Title: FuzzEval: Assessing Fuzzers on Generating Context-Sensitive Inputs
S Mahmudul Hasan, Polina Kozyreva, Endadul Hoque
Subjects: Cryptography and Security (cs.CR)
[253] arXiv:2409.12341 [pdf, html, other]
Title: Provable Privacy Guarantee for Individual Identities and Locations in Large-Scale Contact Tracing
Tyler Nicewarner, Wei Jiang, Aniruddha Gokhale, Dan Lin
Subjects: Cryptography and Security (cs.CR)
[254] arXiv:2409.12472 [pdf, html, other]
Title: TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN
Ziyi Liu, Dengpan Ye, Long Tang, Yunming Zhang, Jiacheng Deng
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[255] arXiv:2409.12553 [pdf, html, other]
Title: Hidden in Plain Sound: Environmental Backdoor Poisoning Attacks on Whisper, and Mitigations
Jonatan Bartolini, Todor Stoyanov, Alberto Giaretta
Comments: 13 pages, 12 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[256] arXiv:2409.12701 [pdf, html, other]
Title: An Empirical Study on the Distance Metric in Guiding Directed Grey-box Fuzzing
Tingke Wen, Yuwei Li, Lu Zhang, Huimin Ma, Zulie Pan
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[257] arXiv:2409.12765 [pdf, html, other]
Title: Towards AI-enabled Cyber Threat Assessment in the Health Sector
Patrizia Heinl, Andrius Patapovas, Michael Pilgermann
Comments: 10 pages (including references), 5 figures, 2 tables, cs.CR
Subjects: Cryptography and Security (cs.CR)
[258] arXiv:2409.12850 [pdf, other]
Title: USBIPS Framework: Protecting Hosts from Malicious USB Peripherals
Chun-Yi Wang, Fu-Hau Hsu
Comments: Accepted 23 June 2025 by Computer Standards & Interfaces/Elsevier B.V
Subjects: Cryptography and Security (cs.CR)
[259] arXiv:2409.12882 [pdf, html, other]
Title: On the Hardness of Decentralized Multi-Agent Policy Evaluation under Byzantine Attacks
Hairi, Minghong Fang, Zifan Zhang, Alvaro Velasquez, Jia Liu
Comments: To appear in Proceedings of the 22nd International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt 2024)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[260] arXiv:2409.12884 [pdf, html, other]
Title: Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage
Pengxu Zhu, Lei Wang
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[261] arXiv:2409.13083 [pdf, html, other]
Title: FedAT: Federated Adversarial Training for Distributed Insider Threat Detection
R G Gayathri, Atul Sajjanhar, Md Palash Uddin, Yong Xiang
Comments: 10 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[262] arXiv:2409.13139 [pdf, html, other]
Title: G-Fuzz: A Directed Fuzzing Framework for gVisor
Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X.Liu, Chunming Wu, Zulie Pan, Peng Lin
Comments: This paper has published in IEEE Transactions on Dependable and Secure Computing (TDSC), this https URL
Journal-ref: IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 1, pp. 168-185, Jan.-Feb. 2024
Subjects: Cryptography and Security (cs.CR)
[263] arXiv:2409.13213 [pdf, html, other]
Title: MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning
Jiliang Li, Yifan Zhang, Yu Huang, Kevin Leach
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[264] arXiv:2409.13310 [pdf, html, other]
Title: MeMoir: A Software-Driven Covert Channel based on Memory Usage
Jeferson Gonzalez-Gomez, Jose Alejandro Ibarra-Campos, Jesus Yamir Sandoval-Morales, Lars Bauer, Jörg Henkel
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[265] arXiv:2409.13478 [pdf, html, other]
Title: Divide and Conquer based Symbolic Vulnerability Detection
Christopher Scherb, Luc Bryan Heitz, Hermann Grieder
Subjects: Cryptography and Security (cs.CR)
[266] arXiv:2409.13524 [pdf, html, other]
Title: Contextualized AI for Cyber Defense: An Automated Survey using LLMs
Christoforus Yoga Haryanto, Anne Maria Elvira, Trung Duc Nguyen, Minh Hieu Vu, Yoshiano Hartanto, Emily Lomempow, Arathi Arakala
Comments: 8 pages, 2 figures, 4 tables, accepted into 17th International Conference on Security of Information and Networks (SINCONF 2024)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[267] arXiv:2409.13563 [pdf, html, other]
Title: Proxion: Uncovering Hidden Proxy Smart Contracts for Finding Collision Vulnerabilities in Ethereum
Cheng-Kang Chen, Wen-Yi Chu, Muoi Tran, Laurent Vanbever, Hsu-Chun Hsiao
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Software Engineering (cs.SE)
[268] arXiv:2409.13570 [pdf, html, other]
Title: Security analysis of the Australian Capital Territory's eVACS 2020/2024 paperless direct recording electronic voting system
Chris Culnane, Andrew Conway, Vanessa Teague, Ty Wilson-Brown
Comments: 10 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[269] arXiv:2409.13723 [pdf, html, other]
Title: Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges
Harikha Manthena, Shaghayegh Shajarian, Jeffrey Kimmell, Mahmoud Abdelsalam, Sajad Khorsandroo, Maanak Gupta
Journal-ref: IEEE Access, vol. 0, 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[270] arXiv:2409.13742 [pdf, html, other]
Title: Distinguishability Investigation on Longa's Atomic Patterns when used as a Basis for Implementing Elliptic Curve Scalar Multiplication Algorithms
Sze Hei Li
Comments: MSc thesis
Subjects: Cryptography and Security (cs.CR)
[271] arXiv:2409.13768 [pdf, html, other]
Title: Magika: AI-Powered Content-Type Detection
Yanick Fratantonio, Luca Invernizzi, Loua Farah, Kurt Thomas, Marina Zhang, Ange Albertini, Francois Galilee, Giancarlo Metitieri, Julien Cretin, Alex Petit-Bianco, David Tao, Elie Bursztein
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[272] arXiv:2409.13774 [pdf, html, other]
Title: Trustworthy Intrusion Detection: Confidence Estimation Using Latent Space
Ioannis Pitsiorlas, George Arvanitakis, Marios Kountouris
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[273] arXiv:2409.13793 [pdf, html, other]
Title: On the Feasibility of Fully AI-automated Vishing Attacks
João Figueiredo, Afonso Carvalho, Daniel Castro, Daniel Gonçalves, Nuno Santos
Comments: To appear in AsiaCCS 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Audio and Speech Processing (eess.AS)
[274] arXiv:2409.13937 [pdf, html, other]
Title: Lightweight and Resilient Signatures for Cloud-Assisted Embedded IoT Systems
Saif E. Nouma, Attila A. Yavuz
Subjects: Cryptography and Security (cs.CR)
[275] arXiv:2409.14008 [pdf, html, other]
Title: Cyber-Physical Authentication Scheme for Secure V2G Transactions
Yunwang Chen, Yanmin Zhao, Siuming Yiu
Subjects: Cryptography and Security (cs.CR)
[276] arXiv:2409.14039 [pdf, other]
Title: Towards Lightweight and Privacy-preserving Data Provision in Digital Forensics for Driverless Taxi
Yanwei Gong, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Junchao Fan, Kaiwen Wang
Subjects: Cryptography and Security (cs.CR)
[277] arXiv:2409.14052 [pdf, html, other]
Title: An average case efficient algorithm for solving two-variable linear Diophantine equations
Mayank Deora, Pinakpani Pal
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Number Theory (math.NT)
[278] arXiv:2409.14058 [pdf, html, other]
Title: Practically implementing an LLM-supported collaborative vulnerability remediation process: a team-based approach
Xiaoqing Wang, Yuanjing Tian, Keman Huang, Bin Liang
Comments: accepted by Computers & Security
Journal-ref: Computers & Security, 104113 (2024)
Subjects: Cryptography and Security (cs.CR)
[279] arXiv:2409.14092 [pdf, other]
Title: Encryption of Audio Signals Using the Elzaki Transformation and the Lorenz Chaotic System Lorenz Chaotic System
Shadman R. Kareem
Subjects: Cryptography and Security (cs.CR)
[280] arXiv:2409.14122 [pdf, html, other]
Title: Efficient and Effective Model Extraction
Hongyu Zhu, Wentao Hu, Sichu Liang, Fangqi Li, Wenwen Wang, Shilin Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[281] arXiv:2409.14177 [pdf, html, other]
Title: PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach
Zhihao Lin, Wei Ma, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Yang Liu, Jun Wang, Li Li
Comments: update the abstract and cite a new related work
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[282] arXiv:2409.14219 [pdf, html, other]
Title: MEGA-PT: A Meta-Game Framework for Agile Penetration Testing
Yunfei Ge, Quanyan Zhu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Science and Game Theory (cs.GT)
[283] arXiv:2409.14260 [pdf, html, other]
Title: Perfect Gradient Inversion in Federated Learning: A New Paradigm from the Hidden Subset Sum Problem
Qiongxiu Li, Lixia Luo, Agnese Gini, Changlong Ji, Zhanhao Hu, Xiao Li, Chengfang Fang, Jie Shi, Xiaolin Hu
Subjects: Cryptography and Security (cs.CR)
[284] arXiv:2409.14261 [pdf, html, other]
Title: Re-Evaluating Privacy in Centralized and Decentralized Learning: An Information-Theoretical and Empirical Study
Changlong Ji, Stephane Maag, Richard Heusdens, Qiongxiu Li
Subjects: Cryptography and Security (cs.CR)
[285] arXiv:2409.14275 [pdf, html, other]
Title: Dynamic Scattering-channel-based Approach for Multiuser Image Encryption
Mohammadrasoul Taghavi, Edwin A. Marengo
Subjects: Cryptography and Security (cs.CR); Optics (physics.optics)
[286] arXiv:2409.14416 [pdf, html, other]
Title: Uncovering EDK2 Firmware Flaws: Insights from Code Audit Tools
Mahsa Farahani, Ghazal Shenavar, Ali Hosseinghorban, Alireza Ejlali
Comments: This paper has been accepted in CPSAT 2024 and will be published in the IEEE Xplore Digital Library
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Software Engineering (cs.SE)
[287] arXiv:2409.14424 [pdf, html, other]
Title: Dormant: Defending against Pose-driven Human Image Animation
Jiachen Zhou, Mingsi Wang, Tianlin Li, Guozhu Meng, Kai Chen
Comments: Accepted by USENIX Security 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[288] arXiv:2409.14439 [pdf, html, other]
Title: A Visualized Malware Detection Framework with CNN and Conditional GAN
Fang Wang (Florence Wong), Hussam Al Hamadi, Ernesto Damiani
Comments: 7 pages, 2022 IEEE International Conference on Big Data (Big Data), 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[289] arXiv:2409.14472 [pdf, other]
Title: Blockchain Based Information Security and Privacy Protection: Challenges and Future Directions using Computational Literature Review
Gauri Shankar, Md Raihan Uddin, Saddam Mukta, Prabhat Kumar, Shareeful Islam, A.K.M. Najmul Islam
Comments: 10 pages, 8 figures and 1 table
Subjects: Cryptography and Security (cs.CR)
[290] arXiv:2409.14488 [pdf, other]
Title: Enhancing LLM-based Autonomous Driving Agents to Mitigate Perception Attacks
Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Antonio Bianchi, Z. Berkay Celik
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[291] arXiv:2409.14518 [pdf, html, other]
Title: RPKI: Not Perfect But Good Enough
Haya Schulmann, Niklas Vogel, Michael Waidner
Subjects: Cryptography and Security (cs.CR)
[292] arXiv:2409.14530 [pdf, html, other]
Title: An Integrated Blockchain and IPFS Solution for Secure and Efficient Source Code Repository Hosting using Middleman Approach
Md. Rafid Haque, Sakibul Islam Munna, Sabbir Ahmed, Md. Tahmid Islam, Md Mehedi Hassan Onik, A.B.M. Ashikur Rahman
Comments: 26 pages, 5 figures, submitted manuscript to PlosOne journal;
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[293] arXiv:2409.14596 [pdf, html, other]
Title: DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram
Sayak Saha Roy, Elham Pourabbas Vafa, Kobra Khanmohammadi, Shirin Nilizadeh
Comments: To appear in USENIX Security 2025
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[294] arXiv:2409.14640 [pdf, html, other]
Title: MECURY: Practical Cross-Chain Exchange via Trusted Hardware
Xiaoqing Wen, Quanbi Feng, Jianyu Niu, Yinqian Zhang, Chen Feng
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[295] arXiv:2409.14645 [pdf, html, other]
Title: Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement
Nicholas D'Silva, Toran Shahi, Øyvind Timian Dokk Husveg, Adith Sanjeeve, Erik Buchholz, Salil S. Kanhere
Comments: Accepted at the 17th International Conference on Security of Information and Networks (SIN'24). DOI will be added once available
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[296] arXiv:2409.14647 [pdf, html, other]
Title: TeeRollup: Efficient Rollup Design Using Heterogeneous TEE
Xiaoqing Wen, Quanbi Feng, Hanzheng Lyu, Jianyu Niu, Yinqian Zhang, Chen Feng
Subjects: Cryptography and Security (cs.CR)
[297] arXiv:2409.14700 [pdf, html, other]
Title: Adaptive and Robust Watermark for Generative Tabular Data
Dung Daniel Ngo, Daniel Scott, Saheed Obitayo, Archan Ray, Akshay Seshadri, Niraj Kumar, Vamsi K. Potluru, Marco Pistoia, Manuela Veloso
Comments: 15 pages of main body, 5 figures, 5 tables
Subjects: Cryptography and Security (cs.CR)
[298] arXiv:2409.14729 [pdf, other]
Title: PROMPTFUZZ: Harnessing Fuzzing Techniques for Robust Testing of Prompt Injection in LLMs
Jiahao Yu, Yangguang Shao, Hanwen Miao, Junzheng Shi
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[299] arXiv:2409.14798 [pdf, html, other]
Title: PrivaMatch: A Privacy-Preserving DNA Matching Scheme for Forensic Investigation
Sankha Das
Comments: This is a preprint. The work is in submission to a journal
Subjects: Cryptography and Security (cs.CR)
[300] arXiv:2409.14830 [pdf, html, other]
Title: Identify As A Human Does: A Pathfinder of Next-Generation Anti-Cheat Framework for First-Person Shooter Games
Jiayi Zhang, Chenxin Sun, Yue Gu, Qingyu Zhang, Jiayi Lin, Xiaojiang Du, Chenxiong Qian
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
Total of 586 entries : 1-100 101-200 201-300 301-400 401-500 501-586
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack