Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for September 2024

Total of 586 entries : 1-50 51-100 101-150 126-175 151-200 201-250 251-300 ... 551-586
Showing up to 50 entries per page: fewer | more | all
[126] arXiv:2409.06561 [pdf, html, other]
Title: ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools
Ehsan Firouzi, Mohammad Ghafari, Mike Ebrahimi
Comments: ESEM 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[127] arXiv:2409.06564 [pdf, html, other]
Title: Advancing Android Privacy Assessments with Automation
Mugdha Khedkar, Michael Schlichtig, Eric Bodden
Comments: Accepted at the 7th International Workshop on Advances in Mobile App Analysis held in conjunction with ASE 2024
Subjects: Cryptography and Security (cs.CR)
[128] arXiv:2409.06793 [pdf, html, other]
Title: Adversarial Attacks to Multi-Modal Models
Zhihao Dou, Xin Hu, Haibo Yang, Zhuqing Liu, Minghong Fang
Comments: To appear in the ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis 2024 (LAMPS '24)
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG)
[129] arXiv:2409.06816 [pdf, html, other]
Title: LLM-Enhanced Software Patch Localization
Jinhong Yu, Yi Chen, Di Tang, Xiaozhong Liu, XiaoFeng Wang, Chen Wu, Haixu Tang
Subjects: Cryptography and Security (cs.CR)
[130] arXiv:2409.07138 [pdf, other]
Title: Contiguous Zero-Copy for Encrypted Transport Protocols
Florentin Rochet
Subjects: Cryptography and Security (cs.CR)
[131] arXiv:2409.07149 [pdf, html, other]
Title: Ciphertext Policy Attribute Based Encryption with Intel SGX
Vivek Suryawanshi (Indian Institute of Technology Kharagpur), Shamik Sural (Indian Institute of Technology Kharagpur)
Subjects: Cryptography and Security (cs.CR)
[132] arXiv:2409.07150 [pdf, html, other]
Title: ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes
Puja Mondal, Supriya Adhikary, Suparna Kundu, Angshuman Karmakar
Comments: 35 pages including appendix and bibliography
Subjects: Cryptography and Security (cs.CR)
[133] arXiv:2409.07167 [pdf, other]
Title: H$_2$O$_2$RAM: A High-Performance Hierarchical Doubly Oblivious RAM
Leqian Zheng, Zheng Zhang, Wentao Dong, Yao Zhang, Ye Wu, Cong Wang
Subjects: Cryptography and Security (cs.CR)
[134] arXiv:2409.07194 [pdf, html, other]
Title: Cyber Deception: State of the art, Trends and Open challenges
Pedro Beltrán López, Manuel Gil Pérez, Pantaleone Nespoli
Comments: 38 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Science and Game Theory (cs.GT)
[135] arXiv:2409.07368 [pdf, html, other]
Title: Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code
Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[136] arXiv:2409.07390 [pdf, html, other]
Title: D-CAPTCHA++: A Study of Resilience of Deepfake CAPTCHA under Transferable Imperceptible Adversarial Attack
Hong-Hanh Nguyen-Le, Van-Tuan Tran, Dinh-Thuc Nguyen, Nhien-An Le-Khac
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[137] arXiv:2409.07397 [pdf, html, other]
Title: Revisiting Static Feature-Based Android Malware Detection
Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[138] arXiv:2409.07407 [pdf, html, other]
Title: CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification
Zeqing Qin, Yiwei Wu, Lansheng Han
Comments: 8 pages, 2 figures, conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[139] arXiv:2409.07415 [pdf, html, other]
Title: SoK: Security and Privacy Risks of Healthcare AI
Yuanhaur Chang, Han Liu, Chenyang Lu, Ning Zhang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[140] arXiv:2409.07420 [pdf, html, other]
Title: XDC Staking and Tokenomics -- Improvement Proposal: Enhancing Sustainability and Decentralization on the Eve of XDC 2.0
Van Khanh Nguyen
Subjects: Cryptography and Security (cs.CR)
[141] arXiv:2409.07448 [pdf, html, other]
Title: A Novel Perturb-ability Score to Mitigate Evasion Adversarial Attacks on Flow-Based ML-NIDS
Mohamed elShehaby, Ashraf Matrawy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[142] arXiv:2409.07460 [pdf, html, other]
Title: A proof of contribution in blockchain using game theoretical deep learning model
Jin Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[143] arXiv:2409.07489 [pdf, html, other]
Title: RAGent: Retrieval-based Access Control Policy Generation
Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello
Comments: Submitted to Usenix 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[144] arXiv:2409.07490 [pdf, html, other]
Title: Polynomial Methods for Ensuring Data Integrity in Financial Systems
Ignacio Brasca
Comments: 6 pages, 1 code container
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Numerical Analysis (math.NA)
[145] arXiv:2409.07494 [pdf, html, other]
Title: Ethereum Fraud Detection via Joint Transaction Language Model and Graph Representation Learning
Jianguo Sun, Yifan Jia, Yanbin Wang, Yiwei Liu, Zhang Sheng, Ye Tian
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); General Finance (q-fin.GN)
[146] arXiv:2409.07500 [pdf, other]
Title: DV-FSR: A Dual-View Target Attack Framework for Federated Sequential Recommendation
Qitao Qin, Yucong Luo, Mingyue Cheng, Qingyang Mao, Chenyi Lei
Comments: I am requesting the withdrawal of my paper due to identified errors that require significant revision
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[147] arXiv:2409.07501 [pdf, html, other]
Title: A compact QUBO encoding of computational logic formulae demonstrated on cryptography constructions
Gregory Morse, Tamás Kozsik, Oskar Mencer, Peter Rakyta
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Mathematical Physics (math-ph); Quantum Physics (quant-ph)
[148] arXiv:2409.07503 [pdf, html, other]
Title: AdaPPA: Adaptive Position Pre-Fill Jailbreak Attack Approach Targeting LLMs
Lijia Lv, Weigang Zhang, Xuehai Tang, Jie Wen, Feng Liu, Jizhong Han, Songlin Hu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[149] arXiv:2409.07508 [pdf, html, other]
Title: SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions
Soo Yee Lim, Tanya Prasad, Xueyuan Han, Thomas Pasquier
Comments: 15 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[150] arXiv:2409.07567 [pdf, html, other]
Title: Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study
Mohammed Mahyoub, Ashraf Matrawy, Kamal Isleem, Olakunle Ibitoye
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[151] arXiv:2409.07576 [pdf, html, other]
Title: fence.t.s: Closing Timing Channels in High-Performance Out-of-Order Cores through ISA-Supported Temporal Partitioning
Nils Wistoff, Gernot Heiser, Luca Benini
Comments: 8 pages, 3 figures, 1 algorithm, 1 listing. Accepted at the 2024 International Conference on Applications in Electronics Pervading Industry, Environment and Society (APPLEPIES 2024)
Subjects: Cryptography and Security (cs.CR)
[152] arXiv:2409.07580 [pdf, html, other]
Title: New constructions of pseudorandom codes
Surendra Ghentiyala, Venkatesan Guruswami
Comments: 39 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[153] arXiv:2409.07586 [pdf, html, other]
Title: Analyzing the Impact of Copying-and-Pasting Vulnerable Solidity Code Snippets from Question-and-Answer Websites
Konrad Weiss, Christof Ferreira Torres, Florian Wendland
Subjects: Cryptography and Security (cs.CR)
[154] arXiv:2409.07587 [pdf, html, other]
Title: Exploring LLMs for Malware Detection: Review, Framework Design, and Countermeasure Approaches
Jamal Al-Karaki, Muhammad Al-Zafar Khan, Marwan Omar
Comments: 26 pages, 7 figures, 4 tables
Subjects: Cryptography and Security (cs.CR)
[155] arXiv:2409.07608 [pdf, html, other]
Title: Advancing Malicious Website Identification: A Machine Learning Approach Using Granular Feature Analysis
Kinh Tran, Dusan Sovilj
Subjects: Cryptography and Security (cs.CR)
[156] arXiv:2409.07609 [pdf, html, other]
Title: A Cost-Aware Approach to Adversarial Robustness in Neural Networks
Charles Meyers, Mohammad Reza Saleh Sedghpour, Tommy Löfstedt, Erik Elmroth
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Applications (stat.AP)
[157] arXiv:2409.07616 [pdf, html, other]
Title: Public-key encryption from a trapdoor one-way embedding of $SL_2(\mathbb{N}$)
Robert Hines
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[158] arXiv:2409.07631 [pdf, html, other]
Title: HERL: Tiered Federated Learning with Adaptive Homomorphic Encryption using Reinforcement Learning
Jiaxang Tang, Zeshan Fayyaz, Mohammad A. Salahuddin, Raouf Boutaba, Zhi-Li Zhang, Ali Anwar
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[159] arXiv:2409.07709 [pdf, html, other]
Title: Harnessing TI Feeds for Exploitation Detection
Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins
Comments: This paper appears at IEEE International Conference on Cyber Security and Resilience (IEEE CSR 2024)
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[160] arXiv:2409.07743 [pdf, html, other]
Title: LOCKEY: A Novel Approach to Model Authentication and Deepfake Tracking
Mayank Kumar Singh, Naoya Takahashi, Wei-Hsiang Liao, Yuki Mitsufuji
Comments: Authenticating deep generative models, 5 pages, 5 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[161] arXiv:2409.07852 [pdf, html, other]
Title: A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun
Comments: 12 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[162] arXiv:2409.07906 [pdf, html, other]
Title: Building a Cybersecurity Risk Metamodel for Improved Method and Tool Integration
Christophe Ponsard
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[163] arXiv:2409.07926 [pdf, html, other]
Title: Mobile App Security Trends and Topics: An Examination of Questions From Stack Overflow
Timothy Huo, Ana Catarina Araújo, Jake Imanaka, Anthony Peruma, Rick Kazman
Comments: This paper was accepted for publication at the 58th Hawaii International Conference on System Sciences (HICSS) - Software Technology Track
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[164] arXiv:2409.08045 [pdf, html, other]
Title: Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking
Stav Cohen, Ron Bitton, Ben Nassi
Comments: for Github, see this https URL . arXiv admin note: substantial text overlap with arXiv:2403.02817
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[165] arXiv:2409.08087 [pdf, html, other]
Title: Securing Large Language Models: Addressing Bias, Misinformation, and Prompt Attacks
Benji Peng, Keyu Chen, Ming Li, Pohsun Feng, Ziqian Bi, Junyu Liu, Qian Niu
Comments: 17 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[166] arXiv:2409.08190 [pdf, html, other]
Title: A Secure Standard for NFT Fractionalization
Wejdene Haouari, Marios Fokaefs
Subjects: Cryptography and Security (cs.CR)
[167] arXiv:2409.08221 [pdf, html, other]
Title: Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding
Jian Cui, Hanna Kim, Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung, Seungwon Shin, Xiaojing Liao
Subjects: Cryptography and Security (cs.CR)
[168] arXiv:2409.08234 [pdf, html, other]
Title: LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems
Hakan T. Otal, M. Abdullah Canbaz
Comments: 6 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[169] arXiv:2409.08301 [pdf, html, other]
Title: Gaussian Differentially Private Human Faces Under a Face Radial Curve Representation
Carlos Soto, Matthew Reimherr, Aleksandra Slavkovic, Mark Shriver
Comments: 19 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Functional Analysis (math.FA); Statistics Theory (math.ST)
[170] arXiv:2409.08390 [pdf, other]
Title: Automated Cybersecurity Compliance and Threat Response Using AI, Blockchain & Smart Contracts
Lampis Alevizos, Vinh Thong Ta
Subjects: Cryptography and Security (cs.CR)
[171] arXiv:2409.08476 [pdf, other]
Title: Research on Data Right Confirmation Mechanism of Federated Learning based on Blockchain
Xiaogang Cheng, Ren Guo
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR)
[172] arXiv:2409.08529 [pdf, other]
Title: 1D-CNN-IDS: 1D CNN-based Intrusion Detection System for IIoT
Muhammad Arslan, Muhammad Mubeen, Muhammad Bilal, Saadullah Farooq Abbasi
Comments: 4 pages, 5 figures, 1 table, 29th International Conference on Automation and Computing
Subjects: Cryptography and Security (cs.CR)
[173] arXiv:2409.08774 [pdf, html, other]
Title: An Attack on $p$-adic Lattice Public-key Cryptosystems and Signature Schemes
Chi Zhang
Comments: 26 pages
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[174] arXiv:2409.08784 [pdf, html, other]
Title: Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field
Wen Huang, Zhishuo Zhang, Weixin Zhao, Jian Peng, Yongjian Liao, Yuyu Wang
Subjects: Cryptography and Security (cs.CR)
[175] arXiv:2409.08846 [pdf, html, other]
Title: Fingerprint Vector: Enabling Scalable and Efficient Model Fingerprint Transfer via Vector Addition
Zhenhua Xu, Qichen Liu, Zhebo Wang, Wenpeng Xing, Dezhang Kong, Mohan Li, Meng Han
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
Total of 586 entries : 1-50 51-100 101-150 126-175 151-200 201-250 251-300 ... 551-586
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack