Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2025

Total of 731 entries : 1-100 101-200 201-300 251-350 301-400 401-500 501-600 ... 701-731
Showing up to 100 entries per page: fewer | more | all
[251] arXiv:2506.10645 [pdf, html, other]
Title: From IOCs to Group Profiles: On the Specificity of Threat Group Behaviors in CTI Knowledge Bases
Aakanksha Saha, Martina Lindorfer, Juan Caballero
Subjects: Cryptography and Security (cs.CR)
[252] arXiv:2506.10665 [pdf, other]
Title: GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems
Davide Maffiola, Stefano Longari, Michele Carminati, Mara Tanelli, Stefano Zanero
Journal-ref: IEEE Transactions on Intelligent Transportation Systems ( Volume: 23, Issue: 8, August 2022)
Subjects: Cryptography and Security (cs.CR)
[253] arXiv:2506.10721 [pdf, html, other]
Title: Commitment Schemes for Multi-Party Computation
Ioan Ionescu, Ruxandra F. Olimid
Subjects: Cryptography and Security (cs.CR)
[254] arXiv:2506.10722 [pdf, html, other]
Title: TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks
Xiaoxing Mo, Yuxuan Cheng, Nan Sun, Leo Yu Zhang, Wei Luo, Shang Gao
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[255] arXiv:2506.10744 [pdf, html, other]
Title: ObfusBFA: A Holistic Approach to Safeguarding DNNs from Different Types of Bit-Flip Attacks
Xiaobei Yan, Han Qiu, Tianwei Zhang
Subjects: Cryptography and Security (cs.CR)
[256] arXiv:2506.10755 [pdf, html, other]
Title: Quantifying Azure RBAC Wildcard Overreach
Christophe Parisel
Subjects: Cryptography and Security (cs.CR)
[257] arXiv:2506.10776 [pdf, html, other]
Title: ME: Trigger Element Combination Backdoor Attack on Copyright Infringement
Feiyu Yang, Siyuan Liang, Aishan Liu, Dacheng Tao
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[258] arXiv:2506.10949 [pdf, html, other]
Title: Monitoring Decomposition Attacks in LLMs with Lightweight Sequential Monitors
Chen Yueh-Han, Nitish Joshi, Yulin Chen, Maksym Andriushchenko, Rico Angell, He He
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[259] arXiv:2506.11212 [pdf, other]
Title: User Perceptions and Attitudes Toward Untraceability in Messaging Platforms
Carla F. Griggio, Boel Nelson, Zefan Sramek, Aslan Askarov
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[260] arXiv:2506.11325 [pdf, html, other]
Title: Uncovering Reliable Indicators: Improving IoC Extraction from Threat Reports
Evangelos Froudakis, Athanasios Avgetidis, Sean Tyler Frankum, Roberto Perdisci, Manos Antonakakis, Angelos Keromytis
Subjects: Cryptography and Security (cs.CR)
[261] arXiv:2506.11423 [pdf, html, other]
Title: Bhatt Conjectures: On Necessary-But-Not-Sufficient Benchmark Tautology for Human Like Reasoning
Manish Bhatt
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[262] arXiv:2506.11444 [pdf, html, other]
Title: GaussMarker: Robust Dual-Domain Watermark for Diffusion Models
Kecen Li, Zhicong Huang, Xinwen Hou, Cheng Hong
Comments: Accepted at ICML 2025
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[263] arXiv:2506.11458 [pdf, html, other]
Title: Computational Attestations of Polynomial Integrity Towards Verifiable Machine-Learning
Dustin Ray, Caroline El Jazmi
Comments: 21 pages, Future Technologies Conference (FTC) 2024
Subjects: Cryptography and Security (cs.CR)
[264] arXiv:2506.11521 [pdf, html, other]
Title: Investigating Vulnerabilities and Defenses Against Audio-Visual Attacks: A Comprehensive Survey Emphasizing Multimodal Models
Jinming Wen, Xinyi Wu, Shuai Zhao, Yanhao Jia, Yuwen Li
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multimedia (cs.MM)
[265] arXiv:2506.11586 [pdf, html, other]
Title: SecONNds: Secure Outsourced Neural Network Inference on ImageNet
Shashank Balla
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[266] arXiv:2506.11612 [pdf, html, other]
Title: KEENHash: Hashing Programs into Function-Aware Embeddings for Large-Scale Binary Code Similarity Analysis
Zhijie Liu, Qiyi Tang, Sen Nie, Shi Wu, Liang Feng Zhang, Yutian Tang
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[267] arXiv:2506.11635 [pdf, html, other]
Title: FAA Framework: A Large Language Model-Based Approach for Credit Card Fraud Investigations
Shaun Shuster, Eyal Zaloof, Asaf Shabtai, Rami Puzis
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[268] arXiv:2506.11669 [pdf, html, other]
Title: DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond
Guanjie Li, Tom H. Luan, Chengzhe Lai, Jinkai Zheng, Rongxing Lu
Subjects: Cryptography and Security (cs.CR)
[269] arXiv:2506.11679 [pdf, other]
Title: LLMs on support of privacy and security of mobile apps: state of the art and research directions
Tran Thanh Lam Nguyen, Barbara Carminati, Elena Ferrari
Comments: I am writing to respectfully request the withdrawal of my recent submission to arXiv due to an authorship issue. The paper was submitted without the explicit consent of two co-authors. After internal discussion, they have expressed clear disagreement with the submission and raised concerns about unresolved academic inaccuracies in the current version
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[270] arXiv:2506.11687 [pdf, html, other]
Title: Differential Privacy in Machine Learning: From Symbolic AI to LLMs
Francisco Aguilera-Martínez, Fernando Berzal
Comments: arXiv admin note: text overlap with arXiv:2303.00654 by other authors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[271] arXiv:2506.11939 [pdf, html, other]
Title: Today's Cat Is Tomorrow's Dog: Accounting for Time-Based Changes in the Labels of ML Vulnerability Detection Approaches
Ranindya Paramitha, Yuan Feng, Fabio Massacci
Comments: Accepted at The ACM International Conference on the Foundations of Software Engineering (FSE) 2025. Published in the Proceedings of the ACM on Software Engineering (PACMSE), Issue FSE 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[272] arXiv:2506.11954 [pdf, html, other]
Title: Technical Evaluation of a Disruptive Approach in Homomorphic AI
Eric Filiol
Comments: This is the extended version of the talk presented at CyberWiseCon 2025 in Vilnius, Lituania in May 21$^{st}$-23$^{rd}$, 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[273] arXiv:2506.11970 [pdf, html, other]
Title: CnC-PRAC: Coalesce, not Cache, Per Row Activation Counts for an Efficient in-DRAM Rowhammer Mitigation
Chris S. Lin, Jeonghyun Woo, Prashant J. Nair, Gururaj Saileshwar
Comments: 8 pages, including appendices. The paper is presented at DRAMSec 2025. (see this https URL)
Subjects: Cryptography and Security (cs.CR)
[274] arXiv:2506.12026 [pdf, html, other]
Title: LURK-T: Limited Use of Remote Keys With Added Trust in TLS 1.3
Behnam Shobiri, Sajjad Pourali, Daniel Migault, Ioana Boureanu, Stere Preda, Mohammad Mannan, Amr Youssef
Journal-ref: IEEE Transactions on Network Science and Engineering, vol. 11, no. 6, pp. 6313-6327, Nov.-Dec. 2024
Subjects: Cryptography and Security (cs.CR)
[275] arXiv:2506.12060 [pdf, other]
Title: Organizational Adaptation to Generative AI in Cybersecurity: A Systematic Review
Christopher Nott
Comments: 38 pages, 1 table, 1 figure
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[276] arXiv:2506.12088 [pdf, other]
Title: Risks & Benefits of LLMs & GenAI for Platform Integrity, Healthcare Diagnostics, Financial Trust and Compliance, Cybersecurity, Privacy & AI Safety: A Comprehensive Survey, Roadmap & Implementation Blueprint
Kiarash Ahi
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[277] arXiv:2506.12096 [pdf, other]
Title: Quantum Computing and Cybersecurity in Accounting and Finance: Current and Future Challenges and the Opportunities for Securing Accounting and Finance Systems in the Post-Quantum World
Huma Habib Shadan, Sardar Islam (Victoria University)
Comments: 44 Pages, 2 Figures, 4 Tables, 1 Flow Diagram
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[278] arXiv:2506.12100 [pdf, html, other]
Title: LLM Embedding-based Attribution (LEA): Quantifying Source Contributions to Generative Model's Response for Vulnerability Analysis
Reza Fayyazi, Michael Zuzak, Shanchieh Jay Yang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[279] arXiv:2506.12104 [pdf, html, other]
Title: DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agents
Hao Li, Xiaogeng Liu, Hung-Chun Chiu, Dianqi Li, Ning Zhang, Chaowei Xiao
Comments: 18 pages, 12 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[280] arXiv:2506.12108 [pdf, other]
Title: A Lightweight IDS for Early APT Detection Using a Novel Feature Selection Method
Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[281] arXiv:2506.12113 [pdf, html, other]
Title: Semantic Preprocessing for LLM-based Malware Analysis
Benjamin Marais, Tony Quertier, Grégoire Barrue
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[282] arXiv:2506.12257 [pdf, other]
Title: Lessons for Cybersecurity from the American Public Health System
Adam Shostack (University of Washington), L. Jean Camp (Indiana University), Yi Ting Chua (University of Tulsa), Josiah Dykstra (Trail of Bits), Brian LaMacchia (FARCASTER Consulting Group), Daniel Lopresti (Lehigh University)
Subjects: Cryptography and Security (cs.CR)
[283] arXiv:2506.12274 [pdf, other]
Title: InfoFlood: Jailbreaking Large Language Models with Information Overload
Advait Yadav, Haibo Jin, Man Luo, Jun Zhuang, Haohan Wang
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[284] arXiv:2506.12299 [pdf, html, other]
Title: QGuard:Question-based Zero-shot Guard for Multi-modal LLM Safety
Taegyeong Lee, Jeonghwa Yoo, Hyoungseo Cho, Soo Yong Kim, Yunho Maeng
Comments: Accept to ACLW 2025 (WOAH)
Journal-ref: ACL Workshop 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[285] arXiv:2506.12328 [pdf, html, other]
Title: Information-theoretic Estimation of the Risk of Privacy Leaks
Kenneth Odoh
Subjects: Cryptography and Security (cs.CR)
[286] arXiv:2506.12344 [pdf, html, other]
Title: Restoring Gaussian Blurred Face Images for Deanonymization Attacks
Haoyu Zhai, Shuo Wang, Pirouz Naghavi, Qingying Hao, Gang Wang
Comments: 18 pages, 16 figures, IEEE Transaction format
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[287] arXiv:2506.12411 [pdf, html, other]
Title: InverTune: Removing Backdoors from Multimodal Contrastive Learning Models via Trigger Inversion and Activation Tuning
Mengyuan Sun, Yu Li, Yuchen Liu, Bo Du, Yunjie Ge
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[288] arXiv:2506.12430 [pdf, html, other]
Title: Pushing the Limits of Safety: A Technical Report on the ATLAS Challenge 2025
Zonghao Ying, Siyang Wu, Run Hao, Peng Ying, Shixuan Sun, Pengyu Chen, Junze Chen, Hao Du, Kaiwen Shen, Shangkun Wu, Jiwei Wei, Shiyuan He, Yang Yang, Xiaohai Xu, Ke Ma, Qianqian Xu, Qingming Huang, Shi Lin, Xun Wang, Changting Lin, Meng Han, Yilei Jiang, Siqi Lai, Yaozhi Zheng, Yifei Song, Xiangyu Yue, Zonglei Jing, Tianyuan Zhang, Zhilei Zhu, Aishan Liu, Jiakai Wang, Siyuan Liang, Xianglong Kong, Hainan Li, Junjie Mu, Haotong Qin, Yue Yu, Lei Chen, Felix Juefei-Xu, Qing Guo, Xinyun Chen, Yew Soon Ong, Xianglong Liu, Dawn Song, Alan Yuille, Philip Torr, Dacheng Tao
Comments: AdvML@CVPR Challenge Report
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[289] arXiv:2506.12466 [pdf, html, other]
Title: Towards Safety and Security Testing of Cyberphysical Power Systems by Shape Validation
Alexander Geiger, Immanuel Hacker, Ömer Sen, Andreas Ulbig
Comments: Accepted to 2025 IEEE International Conference on Cyber Security and Resilience (CSR)
Subjects: Cryptography and Security (cs.CR)
[290] arXiv:2506.12519 [pdf, html, other]
Title: Exploiting AI for Attacks: On the Interplay between Adversarial AI and Offensive AI
Saskia Laura Schröer, Luca Pajola, Alberto Castagnaro, Giovanni Apruzzese, Mauro Conti
Comments: under submission
Subjects: Cryptography and Security (cs.CR)
[291] arXiv:2506.12522 [pdf, html, other]
Title: When Forgetting Triggers Backdoors: A Clean Unlearning Attack
Marco Arazzi, Antonino Nocera, Vinod P
Subjects: Cryptography and Security (cs.CR)
[292] arXiv:2506.12523 [pdf, html, other]
Title: Privacy-preserving and reward-based mechanisms of proof of engagement
Matteo Marco Montanari, Alessandro Aldini
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[293] arXiv:2506.12551 [pdf, html, other]
Title: MEraser: An Effective Fingerprint Erasure Approach for Large Language Models
Jingxuan Zhang, Zhenhua Xu, Rui Hu, Wenpeng Xing, Xuhong Zhang, Meng Han
Comments: Accepted by ACL 2025, Main Conference, Long Paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[294] arXiv:2506.12580 [pdf, html, other]
Title: GNSS Spoofing Detection Based on Opportunistic Position Information
Wenjie Liu, Panos Papadimitratos
Subjects: Cryptography and Security (cs.CR)
[295] arXiv:2506.12675 [pdf, html, other]
Title: Watermarking Quantum Neural Networks Based on Sample Grouped and Paired Training
Limengnan Zhou, Hanzhou Wu
Subjects: Cryptography and Security (cs.CR)
[296] arXiv:2506.12685 [pdf, html, other]
Title: Alphabet Index Mapping: Jailbreaking LLMs through Semantic Dissimilarity
Bilal Saleh Husain
Comments: 10 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[297] arXiv:2506.12699 [pdf, html, other]
Title: SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and Mitigation
Yashothara Shanmugarasa, Ming Ding, M.A.P Chamikara, Thierry Rakotoarivelo
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[298] arXiv:2506.12707 [pdf, html, other]
Title: SecurityLingua: Efficient Defense of LLM Jailbreak Attacks via Security-Aware Prompt Compression
Yucheng Li, Surin Ahn, Huiqiang Jiang, Amir H. Abdi, Yuqing Yang, Lili Qiu
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[299] arXiv:2506.12761 [pdf, html, other]
Title: Versatile and Fast Location-Based Private Information Retrieval with Fully Homomorphic Encryption over the Torus
Joon Soo Yoo, Taeho Kim, Ji Won Yoon
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[300] arXiv:2506.12802 [pdf, html, other]
Title: Bidirectional Biometric Authentication Using Transciphering and (T)FHE
Joon Soo Yoo, Tae Min Ahn, Ji Won Yoon
Subjects: Cryptography and Security (cs.CR)
[301] arXiv:2506.12846 [pdf, html, other]
Title: VFEFL: Privacy-Preserving Federated Learning against Malicious Clients via Verifiable Functional Encryption
Nina Cai, Jinguang Han, Weizhi Meng
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[302] arXiv:2506.12880 [pdf, html, other]
Title: Universal Jailbreak Suffixes Are Strong Attention Hijackers
Matan Ben-Tov, Mor Geva, Mahmood Sharif
Subjects: Cryptography and Security (cs.CR)
[303] arXiv:2506.12883 [pdf, html, other]
Title: Cut Tracing with E-Graphs for Boolean FHE Circuit Synthesis
Julien de Castelnau, Mingfei Yu, Giovanni De Micheli
Comments: 7 pages, 5 figures, presented to EGRAPHS25 workshop, not in conference proceedings
Subjects: Cryptography and Security (cs.CR)
[304] arXiv:2506.12995 [pdf, html, other]
Title: Open Source, Open Threats? Investigating Security Challenges in Open-Source Software
Seyed Ali Akhavani, Behzad Ousat, Amin Kharraz
Subjects: Cryptography and Security (cs.CR)
[305] arXiv:2506.13009 [pdf, html, other]
Title: Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective
Nima Naderloui, Shenao Yan, Binghui Wang, Jie Fu, Wendy Hui Wang, Weiran Liu, Yuan Hong
Comments: To appear in USENIX Security '25
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[306] arXiv:2506.13024 [pdf, html, other]
Title: Position: Certified Robustness Does Not (Yet) Imply Model Security
Andrew C. Cullen, Paul Montague, Sarah M. Erfani, Benjamin I.P. Rubinstein
Comments: 9 pages, ICML, 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[307] arXiv:2506.13052 [pdf, html, other]
Title: Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions
Steven Su, Erik Rye, Dave Levin, Robert Beverly
Subjects: Cryptography and Security (cs.CR)
[308] arXiv:2506.13090 [pdf, html, other]
Title: Detecting Hard-Coded Credentials in Software Repositories via LLMs
Chidera Biringa, Gokhan Kul
Comments: Accepted to the ACM Digital Threats: Research and Practice (DTRAP)
Subjects: Cryptography and Security (cs.CR)
[309] arXiv:2506.13161 [pdf, html, other]
Title: Using LLMs for Security Advisory Investigations: How Far Are We?
Bayu Fedra Abdullah, Yusuf Sulistyo Nugroho, Brittany Reid, Raula Gaikovina Kula, Kazumasa Shimari, Kenichi Matsumoto
Comments: 6 pages, 6 figures, 8 tables, conference paper
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[310] arXiv:2506.13170 [pdf, html, other]
Title: Dual Protection Ring: User Profiling Via Differential Privacy and Service Dissemination Through Private Information Retrieval
Imdad Ullah, Najm Hassan, Tariq Ahamed Ahangar, Zawar Hussain Shah, Mehregan Mahdavi, Andrew Levula
Subjects: Cryptography and Security (cs.CR)
[311] arXiv:2506.13205 [pdf, html, other]
Title: Poison Once, Control Anywhere: Clean-Text Visual Backdoors in VLM-based Mobile Agents
Xuan Wang, Siyuan Liang, Zhe Liu, Yi Yu, Aishan Liu, Yuliang Lu, Xitong Gao, Ee-Chien Chang
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[312] arXiv:2506.13246 [pdf, html, other]
Title: On Immutable Memory Systems for Artificial Agents: A Blockchain-Indexed Automata-Theoretic Framework Using ECDH-Keyed Merkle Chains
Craig Steven Wright
Comments: 47 pages, includes formal automata specifications, cryptographic constructions, and epistemic architecture schema
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[313] arXiv:2506.13261 [pdf, html, other]
Title: Building Automotive Security on Internet Standards: An Integration of DNSSEC, DANE, and DANCE to Authenticate and Authorize In-Car Services
Timo Salomon, Mehmet Mueller, Philipp Meyer, Thomas C. Schmidt
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[314] arXiv:2506.13323 [pdf, html, other]
Title: Tady: A Neural Disassembler without Structural Constraint Violations
Siliang Qin, Fengrui Yang, Hao Wang, Bolun Zhang, Zeyu Gao, Chao Zhang, Kai Chen
Comments: Usenix Security'25
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Software Engineering (cs.SE)
[315] arXiv:2506.13360 [pdf, html, other]
Title: The Rich Get Richer in Bitcoin Mining Induced by Blockchain Forks
Akira Sakurai, Kazuyuki Shudo
Subjects: Cryptography and Security (cs.CR)
[316] arXiv:2506.13418 [pdf, html, other]
Title: New characterization of full weight spectrum one-orbit cyclic subspace codes
Minjia Shi, Wenhao Song
Subjects: Cryptography and Security (cs.CR)
[317] arXiv:2506.13434 [pdf, html, other]
Title: From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs
Alsharif Abuadbba, Chris Hicks, Kristen Moore, Vasilios Mavroudis, Burak Hasircioglu, Diksha Goel, Piers Jennings
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR)
[318] arXiv:2506.13494 [pdf, html, other]
Title: Watermarking LLM-Generated Datasets in Downstream Tasks
Yugeng Liu, Tianshuo Cong, Michael Backes, Zheng Li, Yang Zhang
Subjects: Cryptography and Security (cs.CR)
[319] arXiv:2506.13563 [pdf, other]
Title: Unlearning-Enhanced Website Fingerprinting Attack: Against Backdoor Poisoning in Anonymous Networks
Yali Yuan, Kai Xu, Ruolin Ma, Yuchen Zhang
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[320] arXiv:2506.13612 [pdf, html, other]
Title: EBS-CFL: Efficient and Byzantine-robust Secure Clustered Federated Learning
Zhiqiang Li, Haiyong Bao, Menghong Guan, Hao Pan, Cheng Huang, Hong-Ning Dai
Comments: Accepted by AAAI 25
Journal-ref: Proceedings of the AAAI Conference on Artificial Intelligence, 39(17), 18593-18601, 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[321] arXiv:2506.13737 [pdf, html, other]
Title: ExtendAttack: Attacking Servers of LRMs via Extending Reasoning
Zhenhao Zhu, Yue Liu, Yingwei Ma, Hongcheng Gao, Nuo Chen, Yanpei Guo, Wenjie Qu, Huiying Xu, Xinzhong Zhu, Jiaheng Zhang
Subjects: Cryptography and Security (cs.CR)
[322] arXiv:2506.13746 [pdf, html, other]
Title: Evaluating Large Language Models for Phishing Detection, Self-Consistency, Faithfulness, and Explainability
Shova Kuikel, Aritran Piplai, Palvi Aggarwal
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[323] arXiv:2506.13895 [pdf, html, other]
Title: A Dual-Layer Image Encryption Framework Using Chaotic AES with Dynamic S-Boxes and Steganographic QR Codes
Md Rishadul Bayesh, Dabbrata Das, Md Ahadullah
Comments: 24 pages (including references), 14 figures. Submitted to a journal for publication
Subjects: Cryptography and Security (cs.CR)
[324] arXiv:2506.14057 [pdf, html, other]
Title: SoK: Advances and Open Problems in Web Tracking
Yash Vekaria (1), Yohan Beugin (2), Shaoor Munir (1), Gunes Acar (3), Nataliia Bielova (4), Steven Englehardt (5), Umar Iqbal (6), Alexandros Kapravelos (7), Pierre Laperdrix (8), Nick Nikiforakis (9), Jason Polakis (10), Franziska Roesner (11), Zubair Shafiq (1), Sebastian Zimmeck (12) ((1) University of California Davis, USA, (2) University of Wisconsin-Madison, USA, (3) Radboud University, Netherlands, (4) Inria Centre at Universite Cote d'Azur, France, (5) Independent Researcher, USA, (6) Washington University in St. Louis, USA, (7) North Carolina State University, USA, (8) Centre National de la Recherche Scientifique, France, (9) Stony Brook University, USA, (10) University of Illinois Chicago, USA, (11) University of Washington, USA, (12) Wesleyan University, USA)
Comments: Extended Version is available at: this https URL
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[325] arXiv:2506.14124 [pdf, other]
Title: From Permissioned to Proof-of-Stake Consensus
Jovan Komatovic, Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Ertem Nusret Tas
Subjects: Cryptography and Security (cs.CR)
[326] arXiv:2506.14323 [pdf, html, other]
Title: Vulnerability Disclosure or Notification? Best Practices for Reaching Stakeholders at Scale
Ting-Han Chen, Jeroen van der Ham-de Vos
Comments: 18 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[327] arXiv:2506.14337 [pdf, html, other]
Title: LLM-Powered Intent-Based Categorization of Phishing Emails
Even Eilertsen, Vasileios Mavroeidis, Gudmund Grov
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[328] arXiv:2506.14340 [pdf, html, other]
Title: Quantum Enhanced Entropy Pool for Cryptographic Applications and Proofs
Buniechukwu Njoku, Sonai Biswas, Milad Ghadimi, Mohammad Shojafar, Gabriele Gradoni, Riccardo Bassoli, Frank H. P. Fitzek
Comments: 6 pages, 6 figures, Conference: IEEE Future Networks World Forum 2024
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[329] arXiv:2506.14374 [pdf, other]
Title: Excessive Reasoning Attack on Reasoning LLMs
Wai Man Si, Mingjie Li, Michael Backes, Yang Zhang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[330] arXiv:2506.14393 [pdf, other]
Title: Consensus Power Inequality: A Comparative Study of Blockchain Networks
Kamil Tylinski, Abylay Satybaldy, Paolo Tasca
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[331] arXiv:2506.14466 [pdf, html, other]
Title: MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem
Xingan Gao, Xiaobing Sun, Sicong Cao, Kaifeng Huang, Di Wu, Xiaolei Liu, Xingwei Lin, Yang Xiang
Subjects: Cryptography and Security (cs.CR)
[332] arXiv:2506.14489 [pdf, html, other]
Title: ReDASH: Fast and efficient Scaling in Arithmetic Garbled Circuits for Secure Outsourced Inference
Felix Maurer, Jonas Sander, Thomas Eisenbarth
Subjects: Cryptography and Security (cs.CR)
[333] arXiv:2506.14566 [pdf, html, other]
Title: Anonymous Authentication using Attribute-based Encryption
Nouha Oualha
Subjects: Cryptography and Security (cs.CR)
[334] arXiv:2506.14576 [pdf, html, other]
Title: SoK: Privacy-Enhancing Technologies in Artificial Intelligence
Nouha Oualha
Subjects: Cryptography and Security (cs.CR)
[335] arXiv:2506.14582 [pdf, html, other]
Title: Busting the Paper Ballot: Voting Meets Adversarial Machine Learning
Kaleel Mahmood, Caleb Manicke, Ethan Rathbun, Aayushi Verma, Sohaib Ahmad, Nicholas Stamatakis, Laurent Michel, Benjamin Fuller
Comments: 18 Pages. Author version of article to appear at CCS 2025
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[336] arXiv:2506.14682 [pdf, html, other]
Title: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models
Ads Dawson, Rob Mulla, Nick Landers, Shane Caldwell
Comments: 43 pages, 13 figures, 16 tables
Subjects: Cryptography and Security (cs.CR)
[337] arXiv:2506.14697 [pdf, html, other]
Title: AGENTSAFE: Benchmarking the Safety of Embodied Agents on Hazardous Instructions
Aishan Liu, Zonghao Ying, Le Wang, Junjie Mu, Jinyang Guo, Jiakai Wang, Yuqing Ma, Siyuan Liang, Mingchuan Zhang, Xianglong Liu, Dacheng Tao
Comments: MAS@ICML 2025 camera ready
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[338] arXiv:2506.14913 [pdf, html, other]
Title: Winter Soldier: Backdooring Language Models at Pre-Training with Indirect Data Poisoning
Wassim Bouaziz, Mathurin Videau, Nicolas Usunier, El-Mahdi El-Mhamdi
Comments: 18 pages, 12 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[339] arXiv:2506.14944 [pdf, html, other]
Title: Fair Data Exchange at Near-Plaintext Efficiency
Majid Khabbazian
Comments: Revision notes. This version significantly reduces communication overhead and proof-generation/verification time compared to the previous draft, bringing fair data exchange to near-plaintext speed and size
Subjects: Cryptography and Security (cs.CR)
[340] arXiv:2506.14964 [pdf, html, other]
Title: Narrowing the Gap between TEEs Threat Model and Deployment Strategies
Filip Rezabek, Jonathan Passerat-Palmbach, Moe Mahhouk, Frieder Erdmann, Andrew Miller
Subjects: Cryptography and Security (cs.CR)
[341] arXiv:2506.15018 [pdf, html, other]
Title: Private Continual Counting of Unbounded Streams
Ben Jacobsen, Kassem Fawaz
Comments: 12 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[342] arXiv:2506.15028 [pdf, other]
Title: Systems-Theoretic and Data-Driven Security Analysis in ML-enabled Medical Devices
Gargi Mitra, Mohammadreza Hallajiyan, Inji Kim, Athish Pranav Dharmalingam, Mohammed Elnawawy, Shahrear Iqbal, Karthik Pattabiraman, Homa Alemzadeh
Comments: 32 pages, 6 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
[343] arXiv:2506.15034 [pdf, other]
Title: MECHA: Multithreaded and Efficient Cryptographic Hardware Access
Pratama Derry, Laksmono Agus Mahardika Ari, Iqbal Muhammad, Howon Kim
Comments: 4 Page
Subjects: Cryptography and Security (cs.CR)
[344] arXiv:2506.15043 [pdf, other]
Title: Advanced Prediction of Hypersonic Missile Trajectories with CNN-LSTM-GRU Architectures
Amir Hossein Baradaran
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[345] arXiv:2506.15070 [pdf, html, other]
Title: Toward a Lightweight, Scalable, and Parallel Secure Encryption Engine
Rasha Karakchi, Rye Stahle-Smith, Nishant Chinnasami, Tiffany Yu
Comments: This is submitted to the ACM/IEEE Symposium on Edge Computing (SEC 2025)
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[346] arXiv:2506.15075 [pdf, html, other]
Title: CWGAN-GP Augmented CAE for Jamming Detection in 5G-NR in Non-IID Datasets
Samhita Kuili, Mohammadreza Amini, Burak Kantarci
Comments: 6 pages, 5 figures, Accepted to IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[347] arXiv:2506.15093 [pdf, other]
Title: Flexible Hardware-Enabled Guarantees for AI Compute
James Petrie, Onni Aarne, Nora Ammann, David Dalrymple
Subjects: Cryptography and Security (cs.CR)
[348] arXiv:2506.15100 [pdf, other]
Title: International Security Applications of Flexible Hardware-Enabled Guarantees
Onni Aarne, James Petrie
Subjects: Cryptography and Security (cs.CR)
[349] arXiv:2506.15102 [pdf, html, other]
Title: EVA-S2PMLP: Secure and Scalable Two-Party MLP via Spatial Transformation
Shizhao Peng, Shoumo Li, Tianle Tao
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[350] arXiv:2506.15112 [pdf, html, other]
Title: PDLRecover: Privacy-preserving Decentralized Model Recovery with Machine Unlearning
Xiangman Li, Xiaodong Wu, Jianbing Ni, Mohamed Mahmoud, Maazen Alsabaan
Subjects: Cryptography and Security (cs.CR)
Total of 731 entries : 1-100 101-200 201-300 251-350 301-400 401-500 501-600 ... 701-731
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack