close this message
arXiv smileybones

Happy Open Access Week from arXiv!

YOU make open access possible! Tell us why you support #openaccess and give to arXiv this week to help keep science open for all.

Donate!
Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for February 2025

Total of 622 entries : 1-50 51-100 101-150 151-200 201-250 251-300 301-350 ... 601-622
Showing up to 50 entries per page: fewer | more | all
[151] arXiv:2502.07116 [pdf, html, other]
Title: Threat Me Right: A Human HARMS Threat Model for Technical Systems
Kieron Ivy Turk, Anna Talas, Alice Hutchings
Subjects: Cryptography and Security (cs.CR)
[152] arXiv:2502.07119 [pdf, html, other]
Title: SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection
Elvin Li, Zhengli Shang, Onat Gungor, Tajana Rosing
Comments: Accepted by the AAAI-25 Workshop on Artificial Intelligence for Cyber Security (AICS)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[153] arXiv:2502.07159 [pdf, other]
Title: Pseudorandomness Properties of Random Reversible Circuits
William Gay, William He, Nicholas Kocurek, Ryan O'Donnell
Comments: Merge of arXiv:2404.14648 and arXiv:2409.14614. Results in arXiv:2404.14648 on candidate constructions of computationally pseudorandom permutations from one-way functions have been withdrawn due to an error
Subjects: Cryptography and Security (cs.CR); Probability (math.PR)
[154] arXiv:2502.07207 [pdf, html, other]
Title: A Study on the Importance of Features in Detecting Advanced Persistent Threats Using Machine Learning
Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif
Comments: Accepted for publication in the 2024 International Conference on Computational Science and Computational Intelligence (CSCI'24)
Journal-ref: Proceedings of the 11th International Conference on Computational Science and Computational Intelligence (CSCI 2024). Cham: Springer Nature Switzerland, 2025, pp. 91-103
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[155] arXiv:2502.07231 [pdf, html, other]
Title: Revisiting the Auxiliary Data in Backdoor Purification
Shaokui Wei, Shanchao Yang, Jiayin Liu, Hongyuan Zha
Comments: Preprint. Code and data are being finalized and will be released incrementally
Subjects: Cryptography and Security (cs.CR)
[156] arXiv:2502.07284 [pdf, html, other]
Title: VLWE: Variety-based Learning with Errors for Vector Encryption through Algebraic Geometry
Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Computational Geometry (cs.CG)
[157] arXiv:2502.07330 [pdf, html, other]
Title: EMERALD: Evidence Management for Continuous Certification as a Service in the Cloud
Christian Banse, Björn Fanta, Juncal Alonso, Cristina Martinez
Comments: Accepted for publication at CLOSER 2025
Subjects: Cryptography and Security (cs.CR)
[158] arXiv:2502.07410 [pdf, html, other]
Title: Mining Power Destruction Attacks in the Presence of Petty-Compliant Mining Pools
Roozbeh Sarenche, Svetla Nikova, Bart Preneel
Subjects: Cryptography and Security (cs.CR)
[159] arXiv:2502.07492 [pdf, html, other]
Title: RoMA: Robust Malware Attribution via Byte-level Adversarial Training with Global Perturbations and Adversarial Consistency Regularization
Yuxia Sun, Huihong Chen, Jingcai Guo, Aoxiang Sun, Zhetao Li, Haolin Liu
Comments: 11 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[160] arXiv:2502.07498 [pdf, other]
Title: Decentralized Entropy-Driven Ransomware Detection Using Autonomous Neural Graph Embeddings
Ekaterina Starchenko, Hugo Bellinghamshire, David Pickering, Tristan Weatherspoon, Nathaniel Berkhamstead, Elizabeth Green, Magnus Rothschild
Comments: arXiv admin note: This paper has been withdrawn by arXiv due to disputed and unverifiable authorship
Subjects: Cryptography and Security (cs.CR)
[161] arXiv:2502.07557 [pdf, html, other]
Title: JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation
Shenyi Zhang, Yuchen Zhai, Keyan Guo, Hongxin Hu, Shengnan Guo, Zheng Fang, Lingchen Zhao, Chao Shen, Cong Wang, Qian Wang
Comments: To Appear in the 34rd USENIX Security Symposium, August 13-15, 2025
Subjects: Cryptography and Security (cs.CR)
[162] arXiv:2502.07760 [pdf, html, other]
Title: Scalable Fingerprinting of Large Language Models
Anshul Nasery, Jonathan Hayase, Creston Brooks, Peiyao Sheng, Himanshu Tyagi, Pramod Viswanath, Sewoong Oh
Comments: Spotlight at NeurIPS 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[163] arXiv:2502.07807 [pdf, html, other]
Title: CP-Guard+: A New Paradigm for Malicious Agent Detection and Defense in Collaborative Perception
Senkang Hu, Yihang Tao, Zihan Fang, Guowen Xu, Yiqin Deng, Sam Kwong, Yuguang Fang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[164] arXiv:2502.07813 [pdf, html, other]
Title: CryptoX : Compositional Reasoning Evaluation of Large Language Models
Jiajun Shi, Chaoren Wei, Liqun Yang, Zekun Moore Wang, Chenghao Yang, Ge Zhang, Stephen Huang, Tao Peng, Jian Yang, Zhoufutu Wen
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[165] arXiv:2502.07815 [pdf, html, other]
Title: Decoding Complexity: Intelligent Pattern Exploration with CHPDA (Context Aware Hybrid Pattern Detection Algorithm)
Lokesh Koli, Shubham Kalra, Karanpreet Singh
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[166] arXiv:2502.07925 [pdf, html, other]
Title: PIXHELL: When Pixels Learn to Scream
Mordechai Guri
Comments: Version of this paper accepted to 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)
Subjects: Cryptography and Security (cs.CR)
[167] arXiv:2502.08001 [pdf, html, other]
Title: Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation
Haonan Shi, Tu Ouyang, An Wang
Comments: To appear in Proceedings of Privacy Enhancing Technologies 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[168] arXiv:2502.08013 [pdf, other]
Title: Hierarchical Manifold Projection for Ransomware Detection: A Novel Geometric Approach to Identifying Malicious Encryption Patterns
Frederick Pembroke, Eleanor Featherstonehaugh, Sebastian Wetherington, Harriet Fitzgerald, Maximilian Featherington, Peter Idliman
Comments: arXiv admin note: This paper has been withdrawn by arXiv due to disputed and unverifiable authorship
Subjects: Cryptography and Security (cs.CR)
[169] arXiv:2502.08055 [pdf, html, other]
Title: SLVR: Securely Leveraging Client Validation for Robust Federated Learning
Jihye Choi, Sai Rahul Rachuri, Ke Wang, Somesh Jha, Yizhen Wang
Comments: 29 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[170] arXiv:2502.08123 [pdf, html, other]
Title: Provably Robust Federated Reinforcement Learning
Minghong Fang, Xilong Wang, Neil Zhenqiang Gong
Comments: To appear in The Web Conference 2025
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[171] arXiv:2502.08151 [pdf, html, other]
Title: Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
Zhichao You, Xuewen Dong, Shujun Li, Ximeng Liu, Siqi Ma, Yulong Shen
Journal-ref: IEEE Transactions on Information Forensics and Security, 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[172] arXiv:2502.08193 [pdf, html, other]
Title: Typographic Attacks in a Multi-Image Setting
Xiaomeng Wang, Zhengyu Zhao, Martha Larson
Comments: Accepted by NAACL2025. Our code is available at this https URL
Subjects: Cryptography and Security (cs.CR)
[173] arXiv:2502.08217 [pdf, html, other]
Title: Investigating Vulnerabilities of GPS Trip Data to Trajectory-User Linking Attacks
Benedikt Ströbl, Alexandra Kapp
Comments: 32 pages, 15 figures
Subjects: Cryptography and Security (cs.CR)
[174] arXiv:2502.08240 [pdf, html, other]
Title: Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the Wild
Stefan Czybik, Micha Horlboge, Konrad Rieck
Subjects: Cryptography and Security (cs.CR)
[175] arXiv:2502.08332 [pdf, html, other]
Title: Modification and Generated-Text Detection: Achieving Dual Detection Capabilities for the Outputs of LLM by Watermark
Yuhang Cai, Yaofei Wang, Donghui Hu, Chen Gu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[176] arXiv:2502.08401 [pdf, html, other]
Title: Presentations of Racks
Selçuk Kayacan
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[177] arXiv:2502.08447 [pdf, other]
Title: Deserialization Gadget Chains are not a Pathological Problem in Android:an In-Depth Study of Java Gadget Chains in AOSP
Bruno Kreyssig, Timothée Riom, Sabine Houy, Alexandre Bartel, Patrick McDaniel
Subjects: Cryptography and Security (cs.CR)
[178] arXiv:2502.08467 [pdf, other]
Title: Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting
Robin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns
Comments: USENIX Security 2024
Journal-ref: Proceedings of the 33rd USENIX Conference on Security Symposium Article No.: 376, Pages 6723 - 6740, ISBN 978-1-939133-44-1
Subjects: Cryptography and Security (cs.CR)
[179] arXiv:2502.08610 [pdf, html, other]
Title: Quantifying Security Vulnerabilities: A Metric-Driven Security Analysis of Gaps in Current AI Standards
Keerthana Madhavan, Abbas Yazdinejad, Fattane Zarrinkalam, Ali Dehghantanha
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[180] arXiv:2502.08830 [pdf, html, other]
Title: Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures
Almuthanna Alageel, Sergio Maffeis, Imperial College London
Comments: 27 pages, 14 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Operating Systems (cs.OS)
[181] arXiv:2502.08843 [pdf, other]
Title: Hierarchical Entropy Disruption for Ransomware Detection: A Computationally-Driven Framework
Hayden Srynn, Gilbert Pomeroy, Florence Lytton, Godfrey Ashcombe, Valentine Harcourt, Duncan Pettigrew
Comments: arXiv admin note: This paper has been withdrawn by arXiv due to disputed and unverifiable authorship
Subjects: Cryptography and Security (cs.CR)
[182] arXiv:2502.08865 [pdf, html, other]
Title: Siren Song: Manipulating Pose Estimation in XR Headsets Using Acoustic Attacks
Zijian Huang, Yicheng Zhang, Sophie Chen, Nael Abu-Ghazaleh, Jiasi Chen
Subjects: Cryptography and Security (cs.CR)
[183] arXiv:2502.08886 [pdf, html, other]
Title: Generative AI for Internet of Things Security: Challenges and Opportunities
Yan Lin Aung, Ivan Christian, Ye Dong, Xiaodong Ye, Sudipta Chattopadhyay, Jianying Zhou
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[184] arXiv:2502.08921 [pdf, other]
Title: Detecting Malicious Concepts Without Image Generation in AIGC
Kun Xu, Yushu Zhang, Shuren Qi, Tao Wang, Wenying Wen, Yuming Fang
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[185] arXiv:2502.08966 [pdf, html, other]
Title: RTBAS: Defending LLM Agents Against Prompt Injection and Privacy Leakage
Peter Yong Zhong, Siyuan Chen, Ruiqi Wang, McKenna McCall, Ben L. Titzer, Heather Miller, Phillip B. Gibbons
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[186] arXiv:2502.08970 [pdf, html, other]
Title: A Decade of Metric Differential Privacy: Advancements and Applications
Xinpeng Xie, Chenyang Yu, Yan Huang, Yang Cao, Chenxi Qiu
Subjects: Cryptography and Security (cs.CR)
[187] arXiv:2502.08989 [pdf, html, other]
Title: Setup Once, Secure Always: A Single-Setup Secure Federated Learning Aggregation Protocol with Forward and Backward Secrecy for Dynamic Users
Nazatul Haque Sultan, Yan Bo, Yansong Gao, Seyit Camtepe, Arash Mahboubi, Hang Thanh Bui, Aufeef Chauhan, Hamed Aboutorab, Michael Bewong, Dineshkumar Singh, Praveen Gauravaram, Rafiqul Islam, Sharif Abuadbba
Comments: 17 pages, 12 Figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[188] arXiv:2502.09084 [pdf, html, other]
Title: Application of Tabular Transformer Architectures for Operating System Fingerprinting
Rubén Pérez-Jove, Cristian R. Munteanu, Alejandro Pazos, Jose Vázquez-Naya
Comments: Submitted as a preprint (not peer reviewed). 22 pages, 9 figures. Code and datasets available at: this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[189] arXiv:2502.09117 [pdf, html, other]
Title: In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks
Simon Schneider, Komal Kashish, Katja Tuma, Riccardo Scandariato
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[190] arXiv:2502.09139 [pdf, html, other]
Title: Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving
Anna Pätschke, Jan Wichelmann, Thomas Eisenbarth
Journal-ref: 2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
Subjects: Cryptography and Security (cs.CR)
[191] arXiv:2502.09175 [pdf, html, other]
Title: FLAME: Flexible LLM-Assisted Moderation Engine
Ivan Bakulin (1 and 2), Ilia Kopanichuk (1 and 2), Iaroslav Bespalov (1), Nikita Radchenko (3), Vladimir Shaposhnikov (1 and 4), Dmitry Dylov (1 and 4), Ivan Oseledets (1 and 4) ((1) AIRI, (2) Moscow Institute of Physics and Technology, (3) SberHealth, (4) Skolkovo Institute of Science and Technology)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[192] arXiv:2502.09201 [pdf, html, other]
Title: Commitment Schemes from OWFs with Applications to Quantum Oblivious Transfer
Thomas Lorünser, Sebastian Ramacher, Federico Valbusa
Subjects: Cryptography and Security (cs.CR)
[193] arXiv:2502.09251 [pdf, html, other]
Title: Recipe: Hardware-Accelerated Replication Protocols
Dimitra Giantsidi, Emmanouil Giortamis, Julian Pritzi, Maurice Bailleu, Manos Kapritsos, Pramod Bhatotia
Subjects: Cryptography and Security (cs.CR)
[194] arXiv:2502.09385 [pdf, html, other]
Title: APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models
Sidahmed Benabderrahmane, Petko Valtchev, James Cheney, Talal Rahwan
Subjects: Cryptography and Security (cs.CR)
[195] arXiv:2502.09484 [pdf, html, other]
Title: PenTest++: Elevating Ethical Hacking with AI and Automation
Haitham S. Al-Sinani, Chris J. Mitchell
Comments: 27 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[196] arXiv:2502.09535 [pdf, html, other]
Title: Entropy Collapse in Mobile Sensors: The Hidden Risks of Sensor-Based Security
Carlton Shepherd, Elliot Hurley
Subjects: Cryptography and Security (cs.CR)
[197] arXiv:2502.09549 [pdf, html, other]
Title: Registration, Detection, and Deregistration: Analyzing DNS Abuse for Phishing Attacks
Kyungchan Lim, Raffaele Sommese, Mattis Jonker, Ricky Mok, kc claffy, Doowon Kim
Subjects: Cryptography and Security (cs.CR)
[198] arXiv:2502.09553 [pdf, html, other]
Title: SyntheticPop: Attacking Speaker Verification Systems With Synthetic VoicePops
Eshaq Jamdar, Amith Kamath Belman
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[199] arXiv:2502.09723 [pdf, html, other]
Title: QueryAttack: Jailbreaking Aligned Large Language Models Using Structured Non-natural Query Language
Qingsong Zou, Jingyu Xiao, Qing Li, Zhi Yan, Yuhang Wang, Li Xu, Wenxuan Wang, Kuofeng Gao, Ruoyu Li, Yong Jiang
Comments: To appear in ACL 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[200] arXiv:2502.09726 [pdf, html, other]
Title: Analysis of Robust and Secure DNS Protocols for IoT Devices
Abdullah Aydeger, Sanzida Hoque, Engin Zeydan, Kapal Dev
Comments: 6 pages, 2 tables, 2 figures. This paper has been accepted in the 2025 IEEE International Conference on Communications (ICC): SAC Cloud Computing, Networking, and Storage Track. The final version will be published in the IEEE Xplore
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
Total of 622 entries : 1-50 51-100 101-150 151-200 201-250 251-300 301-350 ... 601-622
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status