Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for February 2025

Total of 622 entries : 1-50 51-100 101-150 151-200 201-250 251-300 301-350 351-400 ... 601-622
Showing up to 50 entries per page: fewer | more | all
[201] arXiv:2502.09755 [pdf, html, other]
Title: Jailbreak Attack Initializations as Extractors of Compliance Directions
Amit Levi, Rom Himelstein, Yaniv Nemcovsky, Avi Mendelson, Chaim Baskin
Comments: Accepted to Findings of the Association for Computational Linguistics 2025 (EMNLP 2025)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[202] arXiv:2502.09763 [pdf, html, other]
Title: SoK: Come Together -- Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework
Ali Teymourian, Andrew M. Webb, Taha Gharaibeh, Arushi Ghildiyal, Ibrahim Baggili
Comments: Accepted to USENIX Security '25
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[203] arXiv:2502.09788 [pdf, html, other]
Title: MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure
Fatih Deniz, Mohamed Nabeel, Ting Yu, Issa Khalil
Subjects: Cryptography and Security (cs.CR)
[204] arXiv:2502.09808 [pdf, html, other]
Title: VIRGOS: Secure Graph Convolutional Network on Vertically Split Data from Sparse Matrix Decomposition
Yu Zheng, Qizhi Zhang, Lichun Li, Kai Zhou, Shan Yin
Subjects: Cryptography and Security (cs.CR)
[205] arXiv:2502.09809 [pdf, html, other]
Title: AgentGuard: Repurposing Agentic Orchestrator for Safety Evaluation of Tool Orchestration
Jizhou Chen, Samuel Lee Cong
Comments: Project report of AgentGuard in LLM Agent MOOC Hackathon hosted by UC Berkeley in 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[206] arXiv:2502.09833 [pdf, other]
Title: Decentralized Entropy-Based Ransomware Detection Using Autonomous Feature Resonance
Barnaby Quince, Levi Gareth, Sophie Larkspur, Thaddeus Wobblethorn, Thomas Quibble
Comments: arXiv admin note: This paper has been withdrawn by arXiv due to disputed and unverifiable authorship
Subjects: Cryptography and Security (cs.CR)
[207] arXiv:2502.09837 [pdf, html, other]
Title: SoK: State of the time: On Trustworthiness of Digital Clocks
Adeel Nasrullah, Fatima M. Anwar
Subjects: Cryptography and Security (cs.CR)
[208] arXiv:2502.09864 [pdf, html, other]
Title: U Can Touch This! Microarchitectural Timing Attacks via Machine Clears
Billy Bob Brumley
Comments: ACM SAC SEC 2025
Subjects: Cryptography and Security (cs.CR)
[209] arXiv:2502.09896 [pdf, html, other]
Title: ChatIoT: Large Language Model-based Security Assistant for Internet of Things with Retrieval-Augmented Generation
Ye Dong, Yan Lin Aung, Sudipta Chattopadhyay, Jianying Zhou
Comments: preprint, under revision, 19 pages, 13 figures, 8 tables
Subjects: Cryptography and Security (cs.CR)
[210] arXiv:2502.09990 [pdf, html, other]
Title: X-Boundary: Establishing Exact Safety Boundary to Shield LLMs from Multi-Turn Jailbreaks without Compromising Usability
Xiaoya Lu, Dongrui Liu, Yi Yu, Luxin Xu, Jing Shao
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[211] arXiv:2502.10110 [pdf, html, other]
Title: ScamFerret: Detecting Scam Websites Autonomously with Large Language Models
Hiroki Nakano, Takashi Koide, Daiki Chiba
Comments: Accepted for publication at DIMVA 2025
Subjects: Cryptography and Security (cs.CR)
[212] arXiv:2502.10166 [pdf, html, other]
Title: "It's Like Not Being Able to Read and Write": Narrowing the Digital Divide for Older Adults and Leveraging the Role of Digital Educators in Ireland
Melanie Gruben, Ashley Sheil, Sanchari Das, Michelle O Keeffe, Jacob Camilleri, Moya Cronin, Hazel Murray
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[213] arXiv:2502.10194 [pdf, other]
Title: Translating Common Security Assertions Across Processor Designs: A RISC-V Case Study
Sharjeel Imtiaz, Uljana Reinsalu, Tara Ghasempouri
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[214] arXiv:2502.10281 [pdf, html, other]
Title: TrustZero -- open, verifiable and scalable zero-trust
Adrian-Tudor Dumitrescu, Johan Pouwelse
Comments: 13 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[215] arXiv:2502.10283 [pdf, html, other]
Title: Anomaly Detection with LWE Encrypted Control
Rijad Alisic, Junsoo Kim, Henrik Sandberg
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[216] arXiv:2502.10293 [pdf, other]
Title: A Roadmap to Address Burnout in the Cybersecurity Profession: Outcomes from a Multifaceted Workshop
Ann Rangarajan, Calvin Nobles, Josiah Dykstra, Margaret Cunningham, Nikki Robinson, Tammie Hollis, Celeste Lyn Paul, Charles Gulotta
Comments: Accepted to HCI International 2025. 19 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[217] arXiv:2502.10321 [pdf, html, other]
Title: Dynamic Fraud Proof
Gabriele Picco, Andrea Fortugno
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[218] arXiv:2502.10404 [pdf, other]
Title: Data Protection through Governance Frameworks
Sivananda Reddy Julakanti, Naga Satya KiranmayeeSattiraju, Rajeswari Julakanti
Comments: 5 Pages
Journal-ref: Journal of Computational Analysis and Applications, 2023, Volume 31, Issue 1, Page 158-162
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[219] arXiv:2502.10438 [pdf, html, other]
Title: Injecting Universal Jailbreak Backdoors into LLMs in Minutes
Zhuowei Chen, Qiannan Zhang, Shichao Pei
Comments: Accepted to ICLR 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[220] arXiv:2502.10439 [pdf, other]
Title: Crypto Miner Attack: GPU Remote Code Execution Attacks
Ariel Szabo, Uzy Hadad
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[221] arXiv:2502.10440 [pdf, html, other]
Title: Towards Copyright Protection for Knowledge Bases of Retrieval-augmented Language Models via Reasoning
Junfeng Guo, Yiming Li, Ruibo Chen, Yihan Wu, Chenxi Liu, Yanshuo Chen, Heng Huang
Comments: The first two authors contributed equally to this work. 25 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Information Retrieval (cs.IR); Machine Learning (cs.LG)
[222] arXiv:2502.10448 [pdf, other]
Title: Supply Chain Network Security Investment Strategies Based on Nonlinear Budget Constraints: The Moderating Roles of Market Share and Attack Risk
Jiajie Cheng (1), Jiaxin Wang (2), Caijiao Li (3), Luxiang Zhang (4), Yusheng Fan (3), Yujie Bao (1), Wen Zhou (1) ((1) Nanjing University of Finance & Economics, China, (2) Tianjin University of Science & Technology, China, (3) Fudan University, China, (4) University of California Santa Barbara, USA, (5) Tianjin University, China)
Comments: Under Consideration at Operations Management Research
Subjects: Cryptography and Security (cs.CR)
[223] arXiv:2502.10450 [pdf, html, other]
Title: Trustworthy AI: Safety, Bias, and Privacy -- A Survey
Xingli Fang, Jianwei Li, Varun Mulchandani, Jung-Eun Kim
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[224] arXiv:2502.10453 [pdf, html, other]
Title: Linking Cryptoasset Attribution Tags to Knowledge Graph Entities: An LLM-based Approach
Régnier Avice, Bernhard Haslhofer, Zhidong Li, Jianlong Zhou
Comments: Accepted at Financial Cryptography and Data Security 2025 Conference (FC2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Databases (cs.DB); Machine Learning (cs.LG)
[225] arXiv:2502.10475 [pdf, html, other]
Title: X-SG$^2$S: Safe and Generalizable Gaussian Splatting with X-dimensional Watermarks
Zihang Cheng, Huiping Zhuang, Chun Li, Xin Meng, Ming Li, Fei Richard Yu, Liqiang Nie
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[226] arXiv:2502.10486 [pdf, html, other]
Title: VLM-Guard: Safeguarding Vision-Language Models via Fulfilling Safety Alignment Gap
Qin Liu, Fei Wang, Chaowei Xiao, Muhao Chen
Comments: Work in progress
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[227] arXiv:2502.10487 [pdf, html, other]
Title: Fast Proxies for LLM Robustness Evaluation
Tim Beyer, Jan Schuchardt, Leo Schwinn, Stephan Günnemann
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[228] arXiv:2502.10490 [pdf, other]
Title: A Robust Attack: Displacement Backdoor Attack
Yong Li, Han Gao
Comments: 6 pages, 3 figures. arXiv admin note: text overlap with arXiv:2405.16488
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[229] arXiv:2502.10495 [pdf, html, other]
Title: SWA-LDM: Toward Stealthy Watermarks for Latent Diffusion Models
Zhonghao Yang, Linye Lyu, Xuanhang Chang, Daojing He, YU LI
Comments: 13 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[230] arXiv:2502.10525 [pdf, other]
Title: Towards Watermarking of Open-Source LLMs
Thibaud Gloaguen, Nikola Jovanović, Robin Staab, Martin Vechev
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[231] arXiv:2502.10556 [pdf, html, other]
Title: Recent Advances in Malware Detection: Graph Learning and Explainability
Hossein Shokouhinejad, Roozbeh Razavi-Far, Hesamodin Mohammadian, Mahdi Rabbani, Samuel Ansong, Griffin Higgins, Ali A Ghorbani
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[232] arXiv:2502.10599 [pdf, other]
Title: Federated Learning-Driven Cybersecurity Framework for IoT Networks with Privacy-Preserving and Real-Time Threat Detection Capabilities
Milad Rahmati
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[233] arXiv:2502.10624 [pdf, other]
Title: Network evasion detection with Bi-LSTM model
Kehua Chen, Jingping Jia
Comments: 4 pages,5 figures
Journal-ref: CSAI 2018
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[234] arXiv:2502.10646 [pdf, html, other]
Title: Dark Deceptions in DHCP: Dismantling Network Defenses
Robert Dilworth
Comments: 8 pages, 4 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[235] arXiv:2502.10673 [pdf, html, other]
Title: Dataset Protection via Watermarked Canaries in Retrieval-Augmented LLMs
Yepeng Liu, Xuandong Zhao, Dawn Song, Yuheng Bu
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[236] arXiv:2502.10711 [pdf, other]
Title: A Computational Model for Ransomware Detection Using Cross-Domain Entropy Signatures
Michael Mannon, Evan Statham, Quentin Featherstone, Sebastian Arkwright, Clive Fenwick, Gareth Willoughby
Comments: arXiv admin note: This paper has been withdrawn by arXiv due to disputed and unverifiable authorship
Subjects: Cryptography and Security (cs.CR)
[237] arXiv:2502.10719 [pdf, other]
Title: Reverse Engineering the Apple M1 Conditional Branch Predictor for Out-of-Place Spectre Mistraining
Adam Tuby, Adam Morrison
Subjects: Cryptography and Security (cs.CR)
[238] arXiv:2502.10722 [pdf, html, other]
Title: PMU-Data: Data Traces Could be Distinguished
Zhouyang Li, Pengfei Qiu, Yu Qing, Chunlu Wang, Dongsheng Wang, Xiao Zhang, Gang Qu
Subjects: Cryptography and Security (cs.CR)
[239] arXiv:2502.10771 [pdf, html, other]
Title: Assessing the Trustworthiness of Electronic Identity Management Systems: Framework and Insights from Inception to Deployment
Mirko Bottarelli, Gregory Epiphaniou, Shah Mahmood, Mark Hooper, Carsten Maple
Subjects: Cryptography and Security (cs.CR)
[240] arXiv:2502.10801 [pdf, html, other]
Title: FaceSwapGuard: Safeguarding Facial Privacy from DeepFake Threats through Identity Obfuscation
Li Wang, Zheng Li, Xuhong Zhang, Shouling Ji, Shanqing Guo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[241] arXiv:2502.10803 [pdf, html, other]
Title: PDA: Generalizable Detection of AI-Generated Images via Post-hoc Distribution Alignment
Li Wang, Wenyu Chen, Zheng Li, Shanqing Guo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[242] arXiv:2502.10825 [pdf, html, other]
Title: MITRE ATT&CK Applications in Cybersecurity and The Way Forward
Yuning Jiang, Qiaoran Meng, Feiyang Shang, Nay Oo, Le Thi Hong Minh, Hoon Wei Lim, Biplab Sikdar
Comments: 37 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[243] arXiv:2502.10984 [pdf, other]
Title: Sound Conveyors for Stealthy Data Transmission
Sachith Dassanayaka
Subjects: Cryptography and Security (cs.CR)
[244] arXiv:2502.11006 [pdf, other]
Title: Prompt Inject Detection with Generative Explanation as an Investigative Tool
Jonathan Pan, Swee Liang Wong, Yidi Yuan, Xin Wei Chia
Comments: 5 pages, 4 tables, 3 diagrams
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[245] arXiv:2502.11014 [pdf, html, other]
Title: Leveraging Large Language Models for Cybersecurity: Enhancing SMS Spam Detection with Robust and Context-Aware Text Classification
Mohsen Ahmadi, Matin Khajavi, Abbas Varmaghani, Ali Ala, Kasra Danesh, Danial Javaheri
Subjects: Cryptography and Security (cs.CR)
[246] arXiv:2502.11029 [pdf, html, other]
Title: HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning
Wenqiang Ruan, Xin Lin, Ruisheng Zhou, Guopeng Lin, Shui Yu, Weili Han
Comments: This paper has been accepted for publication at USENIX Security 2025. Please cite this paper as 'Wenqiang Ruan, Xin Lin, Ruisheng Zhou, Guopeng Lin, Shui Yu, Weili Han, HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning. In Proceedings of the 34th USENIX Security, August 13-15, 2025, Seattle, WA, USA.'
Subjects: Cryptography and Security (cs.CR)
[247] arXiv:2502.11070 [pdf, html, other]
Title: A Survey on Vulnerability Prioritization: Taxonomy, Metrics, and Research Challenges
Yuning Jiang, Nay Oo, Qiaoran Meng, Hoon Wei Lim, Biplab Sikdar
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[248] arXiv:2502.11110 [pdf, other]
Title: Ramp Up NTT in Record Time using GPU-Accelerated Algorithms and LLM-based Code Generation
Yu Cui, Hang Fu, Licheng Wang, Haibin Zhang
Subjects: Cryptography and Security (cs.CR)
[249] arXiv:2502.11121 [pdf, html, other]
Title: Reversible Data Hiding over Encrypted Images via Intrinsic Correlation in Block-Based Secret Sharing
Jianhui Zou, Weijia Cao, Shuang Yi, Yifeng Zheng, Zhongyun Hua
Subjects: Cryptography and Security (cs.CR)
[250] arXiv:2502.11127 [pdf, html, other]
Title: G-Safeguard: A Topology-Guided Security Lens and Treatment on LLM-based Multi-agent Systems
Shilong Wang, Guibin Zhang, Miao Yu, Guancheng Wan, Fanci Meng, Chongye Guo, Kun Wang, Yang Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
Total of 622 entries : 1-50 51-100 101-150 151-200 201-250 251-300 301-350 351-400 ... 601-622
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack