Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2025

Total of 731 entries : 1-100 101-200 201-300 301-400 401-500 501-600 601-700 701-731
Showing up to 100 entries per page: fewer | more | all
[401] arXiv:2506.17317 [pdf, html, other]
Title: Beyond the Scope: Security Testing of Permission Management in Team Workspace
Liuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang, Haoyu Wang, Guangdong Bai, Jin Song Dong
Subjects: Cryptography and Security (cs.CR)
[402] arXiv:2506.17318 [pdf, html, other]
Title: Context manipulation attacks : Web agents are susceptible to corrupted memory
Atharv Singh Patlan, Ashwin Hebbar, Pramod Viswanath, Prateek Mittal
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[403] arXiv:2506.17329 [pdf, html, other]
Title: On the Performance of Cyber-Biomedical Features for Intrusion Detection in Healthcare 5.0
Pedro H. Lui, Lucas P. Siqueira, Juliano F. Kazienko, Vagner E. Quincozes, Silvio E. Quincozes, Daniel Welfer
Comments: 12 pages, 7 figures, conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[404] arXiv:2506.17336 [pdf, html, other]
Title: Privacy-Preserving LLM Interaction with Socratic Chain-of-Thought Reasoning and Homomorphically Encrypted Vector Databases
Yubeen Bae, Minchan Kim, Jaejin Lee, Sangbum Kim, Jaehyung Kim, Yejin Choi, Niloofar Mireshghallah
Comments: 29 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[405] arXiv:2506.17349 [pdf, html, other]
Title: AndroIDS : Android-based Intrusion Detection System using Federated Learning
Akarsh K Nair, Shanik Hubert Satheesh Kumar., Deepti Gupta
Subjects: Cryptography and Security (cs.CR)
[406] arXiv:2506.17350 [pdf, html, other]
Title: CUBA: Controlled Untargeted Backdoor Attack against Deep Neural Networks
Yinghao Wu, Liyan Zhang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[407] arXiv:2506.17353 [pdf, html, other]
Title: Differentiation-Based Extraction of Proprietary Data from Fine-Tuned LLMs
Zongjie Li, Daoyuan Wu, Shuai Wang, Zhendong Su
Comments: In Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS'25), October 13-17, 2025, Taipei, Taiwan, China. ACM, New York, NY, USA, 15 pages. this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[408] arXiv:2506.17371 [pdf, html, other]
Title: Secret Sharing in 5G-MEC: Applicability for joint Security and Dependability
Thilina Pathirana, Ruxandra F. Olimid
Comments: 10 pages, 5 figures, Accepted to the proceedings of 22nd International Conference on Privacy, Security, and Trust (PST2025)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[409] arXiv:2506.17446 [pdf, html, other]
Title: Open Sky, Open Threats: Replay Attacks in Space Launch and Re-entry Phases
Nesrine Benchoubane, Eray Guven, Gunes Karabulut Kurt
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[410] arXiv:2506.17504 [pdf, html, other]
Title: A Smart Contract-based Non-Transferable Signature Verification System using Nominative Signatures
Hinata Nishino, Kazumasa Omote, Keita Emura
Comments: An extended abstract appeared at the 20th Asia Joint Conference on Information Security (AsiaJCIS) 2025
Subjects: Cryptography and Security (cs.CR)
[411] arXiv:2506.17512 [pdf, html, other]
Title: Semantic-Aware Parsing for Security Logs
Julien Piet, Vivian Fang, Rishi Khare, Vern Paxson, Raluca Ada Popa, David Wagner
Subjects: Cryptography and Security (cs.CR)
[412] arXiv:2506.17622 [pdf, html, other]
Title: SoK: Stablecoin Designs, Risks, and the Stablecoin LEGO
Shengchen Ling, Yuefeng Du, Yajin Zhou, Lei Wu, Cong Wang, Xiaohua Jia, Houmin Yan
Subjects: Cryptography and Security (cs.CR)
[413] arXiv:2506.17625 [pdf, html, other]
Title: List-Decodable Byzantine Robust PIR: Lower Communication Complexity, Higher Byzantine Tolerance, Smaller List Size
Pengzhen Ke, Liang Feng Zhang, Huaxiong Wang, Li-Ping Wang
Comments: Submitted to AsiaCrypt 2025
Subjects: Cryptography and Security (cs.CR)
[414] arXiv:2506.17767 [pdf, html, other]
Title: A Locally Differential Private Coding-Assisted Succinct Histogram Protocol
Hsuan-Po Liu, Hessam Mahdavifar
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Signal Processing (eess.SP)
[415] arXiv:2506.17795 [pdf, html, other]
Title: A TRNG Implemented using a Soft-Data Based Sponge Function within a Unified Strong PUF Architecture
Rachel Cazzola, Cyrus Minwalla, Calvin Chan, Jim Plusquellic
Subjects: Cryptography and Security (cs.CR)
[416] arXiv:2506.17805 [pdf, html, other]
Title: AdRo-FL: Informed and Secure Client Selection for Federated Learning in the Presence of Adversarial Aggregator
Md. Kamrul Hossain, Walid Aljoby, Anis Elgabli, Ahmed M. Abdelmoniem, Khaled A. Harras
Comments: 17 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[417] arXiv:2506.17865 [pdf, html, other]
Title: LASA: Enhancing SoC Security Verification with LLM-Aided Property Generation
Dinesh Reddy Ankireddy, Sudipta Paria, Aritra Dasgupta, Sandip Ray, Swarup Bhunia
Comments: 9 pages, 5 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[418] arXiv:2506.17935 [pdf, other]
Title: Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
Zhengwu Huang, Ding Deng, Pengyue Sun, Guangfu Sun, Xiaomei Tang
Comments: 19 pages,7 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[419] arXiv:2506.17988 [pdf, html, other]
Title: Secure User-friendly Blockchain Modular Wallet Design Using Android & OP-TEE
Seongjin Kim, Sanguk Yun, Jungho Jang
Comments: 25 pages
Subjects: Cryptography and Security (cs.CR)
[420] arXiv:2506.18053 [pdf, html, other]
Title: Mechanistic Interpretability in the Presence of Architectural Obfuscation
Marcos Florencio, Thomas Barton
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[421] arXiv:2506.18087 [pdf, html, other]
Title: Federated Learning-Based Data Collaboration Method for Enhancing Edge Cloud AI System Security Using Large Language Models
Huaiying Luo, Cheng Ji
Comments: Accepted by the 2025 5th International Symposium on Computer Technology and Information Science (ISCTIS 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[422] arXiv:2506.18100 [pdf, html, other]
Title: Optimizing Resource Allocation and Energy Efficiency in Federated Fog Computing for IoT
Taimoor Ahmad, Anas Ali
Subjects: Cryptography and Security (cs.CR)
[423] arXiv:2506.18114 [pdf, html, other]
Title: Dynamic Temporal Positional Encodings for Early Intrusion Detection in IoT
Ioannis Panopoulos, Maria-Lamprini A. Bartsioka, Sokratis Nikolaidis, Stylianos I. Venieris, Dimitra I. Kaklamani, Iakovos S. Venieris
Comments: Accepted at the 10th International Conference on Smart and Sustainable Technologies (SpliTech 2025)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[424] arXiv:2506.18150 [pdf, html, other]
Title: HE-LRM: Encrypted Deep Learning Recommendation Models using Fully Homomorphic Encryption
Karthik Garimella, Austin Ebel, Gabrielle De Micheli, Brandon Reagen
Comments: 14 pages, 10 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[425] arXiv:2506.18189 [pdf, html, other]
Title: SoK: Current State of Ethereum's Enshrined Proposer Builder Separation
Maxwell Koegler
Comments: 12 pages, 2 figures, submitted to The Science of Blockchain Conference 2025
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[426] arXiv:2506.18245 [pdf, html, other]
Title: Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection
Lei Yu, Zhirong Huang, Hang Yuan, Shiqi Cheng, Li Yang, Fengjun Zhang, Chenjie Shen, Jiajia Ma, Jingyuan Zhang, Junyi Lu, Chun Zuo
Comments: Accepted to ISSTA 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[427] arXiv:2506.18462 [pdf, html, other]
Title: Adaptive alert prioritisation in security operations centres via learning to defer with human feedback
Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris
Comments: No comment
Subjects: Cryptography and Security (cs.CR)
[428] arXiv:2506.18470 [pdf, other]
Title: Automatic Selection of Protections to Mitigate Risks Against Software Applications
Daniele Canavese, Leonardo Regano, Bjorn De Sutter, Cataldo Basile
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[429] arXiv:2506.18516 [pdf, html, other]
Title: DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?
Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti
Comments: Accepted at ESORICS 2025
Subjects: Cryptography and Security (cs.CR)
[430] arXiv:2506.18543 [pdf, html, other]
Title: Security Assessment of DeepSeek and GPT Series Models against Jailbreak Attacks
Xiaodong Wu, Xiangman Li, Jianbing Ni
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[431] arXiv:2506.18685 [pdf, html, other]
Title: Understanding the Theoretical Guarantees of DPM
Yara Schütt, Esfandiar Mohammadi
Subjects: Cryptography and Security (cs.CR)
[432] arXiv:2506.18715 [pdf, html, other]
Title: Vulnerability Assessment Combining CVSS Temporal Metrics and Bayesian Networks
Stefano Perone, Simone Guarino, Luca Faramondi, Roberto Setola
Comments: This paper has been accepted for the 2025 IEEE International Conference on Cyber Security and Resilience (CSR), Chania, Crete, Greece, August 4-6 2025
Subjects: Cryptography and Security (cs.CR)
[433] arXiv:2506.18767 [pdf, html, other]
Title: Physical Layer Challenge-Response Authentication between Ambient Backscatter Devices
Yifan Zhang, Yongchao Dang, Masoud Kaveh, Zheng Yan, Riku Jäntti, Zhu Han
Subjects: Cryptography and Security (cs.CR)
[434] arXiv:2506.18780 [pdf, other]
Title: Design high-confidence computers using trusted instructional set architecture and emulators
Shuangbao Paul Wang
Journal-ref: High-Confidence Computing 1 (2021) 100009
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[435] arXiv:2506.18795 [pdf, other]
Title: FORGE: An LLM-driven Framework for Large-Scale Smart Contract Vulnerability Dataset Construction
Jiachi Chen, Yiming Shen, Jiashuo Zhang, Zihao Li, John Grundy, Zhenzhe Shao, Yanlin Wang, Jiashui Wang, Ting Chen, Zibin Zheng
Comments: Accepted for the 48th International Conference on Software Engineering (ICSE 2026)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[436] arXiv:2506.18848 [pdf, html, other]
Title: Cellular Automata as Generators of Interleaving Sequences
Sara D. Cardell
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[437] arXiv:2506.18870 [pdf, html, other]
Title: Amplifying Machine Learning Attacks Through Strategic Compositions
Yugeng Liu, Zheng Li, Hai Huang, Michael Backes, Yang Zhang
Subjects: Cryptography and Security (cs.CR)
[438] arXiv:2506.19052 [pdf, other]
Title: Trustworthy Artificial Intelligence for Cyber Threat Analysis
Shuangbao Paul Wang, Paul Mullin
Journal-ref: Springer Lecture Note in Networks and Systems. 978-3-031-16071-4,Vol I, LNNS 542. pp 493-504. 2023
Subjects: Cryptography and Security (cs.CR)
[439] arXiv:2506.19054 [pdf, html, other]
Title: GuardSet-X: Massive Multi-Domain Safety Policy-Grounded Guardrail Dataset
Mintong Kang, Zhaorun Chen, Chejian Xu, Jiawei Zhang, Chengquan Guo, Minzhou Pan, Ivan Revilla, Yu Sun, Bo Li
Subjects: Cryptography and Security (cs.CR)
[440] arXiv:2506.19109 [pdf, html, other]
Title: Enhancing Security in LLM Applications: A Performance Evaluation of Early Detection Systems
Valerii Gakh, Hayretdin Bahsi
Comments: 18 pages, 8 tables, 7 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[441] arXiv:2506.19260 [pdf, html, other]
Title: Network Structures as an Attack Surface: Topology-Based Privacy Leakage in Federated Learning
Murtaza Rangwala, Richard O. Sinnott, Rajkumar Buyya
Comments: 13 pages, 7 figures, 5 tables. Data from the experiments and source code can be found here: this https URL
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[442] arXiv:2506.19356 [pdf, html, other]
Title: WebGuard++:Interpretable Malicious URL Detection via Bidirectional Fusion of HTML Subgraphs and Multi-Scale Convolutional BERT
Ye Tian, Zhang Yumin, Yifan Jia, Jianguo Sun, Yanbin Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[443] arXiv:2506.19360 [pdf, html, other]
Title: SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation
Yunsung Chung, Yunbei Zhang, Nassir Marrouche, Jihun Hamm
Comments: Accepted at the 34th USENIX Security Symposium (USENIX Security '25). 21 pages, plus a 6-page appendix
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[444] arXiv:2506.19368 [pdf, html, other]
Title: Yotta: A Large-Scale Trustless Data Trading Scheme for Blockchain System
Xiang Liu, Zhanpeng Guo, Liangxi Liu, Mengyao Zheng, Yiming Qiu, Linshan Jiang
Comments: 9 pages, 2 figures, Exploratory Paper
Journal-ref: Nanyang Blockchain Conference 2025
Subjects: Cryptography and Security (cs.CR)
[445] arXiv:2506.19393 [pdf, html, other]
Title: ZK-SERIES: Privacy-Preserving Authentication using Temporal Biometric Data
Daniel Reijsbergen, Eyasu Getahun Chekole, Howard Halim, Jianying Zhou
Subjects: Cryptography and Security (cs.CR)
[446] arXiv:2506.19409 [pdf, other]
Title: An ETSI GS QKD compliant TLS implementation
Thomas Prévost (I3S), Bruno Martin (I3S), Olivier Alibart (INPHYNI)
Journal-ref: SECRYPT 2025, INSTICC, Jun 2025, Bilbao, Spain, Spain
Subjects: Cryptography and Security (cs.CR)
[447] arXiv:2506.19453 [pdf, html, other]
Title: FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk
Sajal Halder, Muhammad Ejaz Ahmed, Seyit Camtepe
Comments: In The 30th European Symposium on Research in Computer Security (ESORICS), 22 Sep - 26 Sep, 2025, Toulouse, France
Subjects: Cryptography and Security (cs.CR)
[448] arXiv:2506.19480 [pdf, html, other]
Title: PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes
Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni
Journal-ref: 2025 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Subjects: Cryptography and Security (cs.CR)
[449] arXiv:2506.19563 [pdf, html, other]
Title: PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty
Jinwen He, Yiyang Lu, Zijin Lin, Kai Chen, Yue Zhao
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[450] arXiv:2506.19624 [pdf, html, other]
Title: Decompiling Smart Contracts with a Large Language Model
Isaac David, Liyi Zhou, Dawn Song, Arthur Gervais, Kaihua Qin
Subjects: Cryptography and Security (cs.CR)
[451] arXiv:2506.19635 [pdf, html, other]
Title: On the efficacy of old features for the detection of new bots
Rocco De Nicola, Marinella Petrocchi, Manuel Pratelli
Comments: pre-print version
Journal-ref: Information Processing & Management, Volume 58, Issue 6, November 2021, 102685
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Social and Information Networks (cs.SI)
[452] arXiv:2506.19676 [pdf, html, other]
Title: A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures
Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Hujin Peng, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Ningyu Zhang, Chaochao Chen, Muhammad Khurram Khan, Meng Han
Comments: 41 pages, 13 figures, submitted to IEEE COMST
Subjects: Cryptography and Security (cs.CR)
[453] arXiv:2506.19802 [pdf, html, other]
Title: KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs
Xin Fan Guo, Albert Merono Penuela, Sergio Maffeis, Fabio Pierazzi
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[454] arXiv:2506.19836 [pdf, html, other]
Title: Machine Learning with Privacy for Protected Attributes
Saeed Mahloujifar, Chuan Guo, G. Edward Suh, Kamalika Chaudhuri
Journal-ref: 2025 IEEE Symposium on Security and Privacy (SP)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[455] arXiv:2506.19870 [pdf, other]
Title: Secure Energy Transactions Using Blockchain Leveraging AI for Fraud Detection and Energy Market Stability
Md Asif Ul Hoq Khan, MD Zahedul Islam, Istiaq Ahmed, Md Masud Karim Rabbi, Farhana Rahman Anonna, MD Abdul Fahim Zeeshan, Mehedi Hasan Ridoy, Bivash Ranjan Chowdhury, Md Nazmul Shakir Rabbi, GM Alamin Sadnan
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[456] arXiv:2506.19871 [pdf, html, other]
Title: An Attack Method for Medical Insurance Claim Fraud Detection based on Generative Adversarial Network
Yining Pang, Chenghan Li
Comments: arXiv admin note: text overlap with arXiv:2405.12076 by other authors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[457] arXiv:2506.19874 [pdf, html, other]
Title: Towards Provable (In)Secure Model Weight Release Schemes
Xin Yang, Bintao Tang, Yuhao Wang, Zimo Ji, Terry Jingchen Zhang, Wenyuan Jiang
Comments: 8 pages, 2 figures; author name typos and institutions corrected
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[458] arXiv:2506.19877 [pdf, html, other]
Title: Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS2017
Zhaoyang Xu, Yunbo Liu
Comments: submitted to IEEE CNS 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[459] arXiv:2506.19881 [pdf, html, other]
Title: Blameless Users in a Clean Room: Defining Copyright Protection for Generative Models
Aloni Cohen
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[460] arXiv:2506.19886 [pdf, html, other]
Title: Diffusion-based Task-oriented Semantic Communications with Model Inversion Attack
Xuesong Wang, Mo Li, Xingyan Shi, Zhaoqian Liu, Shenghao Yang
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[461] arXiv:2506.19889 [pdf, html, other]
Title: Retrieval-Confused Generation is a Good Defender for Privacy Violation Attack of Large Language Models
Wanli Peng, Xin Chen, Hang Fu, XinYu He, Xue Yiming, Juan Wen
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[462] arXiv:2506.19892 [pdf, html, other]
Title: RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
Isaac Marroqui Penalva, Enrique Tomás Martínez Beltrán, Manuel Gil Pérez, Alberto Huertas Celdrán
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Performance (cs.PF)
[463] arXiv:2506.19899 [pdf, html, other]
Title: Anti-Phishing Training Does Not Work: A Large-Scale Empirical Assessment of Multi-Modal Training Grounded in the NIST Phish Scale
Andrew T. Rozema, James C. Davis
Comments: 13 pages, 5 apdx
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[464] arXiv:2506.19934 [pdf, other]
Title: A Hybrid Intrusion Detection System with a New Approach to Protect the Cybersecurity of Cloud Computing
Maryam Mahdi Al-Husseini
Comments: 1. Acknowledgment for: Supervisor: Prof. Dr. Alireza Rouhi Advisor: Prof. Dr. Einollah Pira 2. Thesis of MSc. degree for Azarbaijan Shahid Madani University Faculty of Information Technology and Computer Engineering 3. Number of pages: 103 4. Number of Figures: 66
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[465] arXiv:2506.19943 [pdf, html, other]
Title: Quantum-Resistant Domain Name System: A Comprehensive System-Level Study
Juyoul Lee, Sanzida Hoque, Abdullah Aydeger, Engin Zeydan
Comments: Manuscript submitted to ACM, 29 pages, 8 Figures, 15 Tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[466] arXiv:2506.20000 [pdf, html, other]
Title: Can One Safety Loop Guard Them All? Agentic Guard Rails for Federated Computing
Narasimha Raghavan Veeraragavan, Jan Franz Nygård
Comments: Accepted at ICML 2025 Workshop on Collaborative and Federated Agentic Workflows (CFAgentic@ICML'25)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[467] arXiv:2506.20082 [pdf, html, other]
Title: Attack Smarter: Attention-Driven Fine-Grained Webpage Fingerprinting Attacks
Yali Yuan, Weiyi Zou, Guang Cheng
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[468] arXiv:2506.20101 [pdf, html, other]
Title: Secure Multi-Key Homomorphic Encryption with Application to Privacy-Preserving Federated Learning
Jiahui Wu, Tiecheng Sun, Fucai Luo, Haiyan Wang, Weizhe Zhang
Subjects: Cryptography and Security (cs.CR)
[469] arXiv:2506.20102 [pdf, other]
Title: Autonomous Cyber Resilience via a Co-Evolutionary Arms Race within a Fortified Digital Twin Sandbox
Malikussaid, Sutiyo
Comments: 17 pages, 2 figures, 4 equations, 2 algorithms, 4 tables, to be published in ISPACS Conference 2025, unabridged version
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[470] arXiv:2506.20109 [pdf, html, other]
Title: Evaluating Disassembly Errors With Only Binaries
Lambang Akbar Wijayadi, Yuancheng Jiang, Roland H.C. Yap, Zhenkai Liang, Zhuohao Liu
Comments: To appear in ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2025
Subjects: Cryptography and Security (cs.CR)
[471] arXiv:2506.20170 [pdf, html, other]
Title: JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation
Guoqiang Chen, Xin Jin, Zhiqiang Lin
Comments: Accepted by ACM CCS 2025
Subjects: Cryptography and Security (cs.CR)
[472] arXiv:2506.20228 [pdf, other]
Title: Measuring Modern Phishing Tactics: A Quantitative Study of Body Obfuscation Prevalence, Co-occurrence, and Filter Impact
Antony Dalmiere (LAAS), Zheng Zhou (LAAS), Guillaume Auriol (LAAS-TRUST, INSA Toulouse), Vincent Nicomette (LAAS-TSF, LAAS-TRUST), Pascal Marchand (LERASS, IUT Paul Sabatier)
Subjects: Cryptography and Security (cs.CR)
[473] arXiv:2506.20234 [pdf, html, other]
Title: Communication-Efficient Publication of Sparse Vectors under Differential Privacy
Quentin Hillebrand, Vorapong Suppakitpaisarn, Tetsuo Shibuya
Subjects: Cryptography and Security (cs.CR)
[474] arXiv:2506.20290 [pdf, html, other]
Title: Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy
Berkay Kemal Balioglu, Alireza Khodaie, Mehmet Emre Gursoy
Subjects: Cryptography and Security (cs.CR)
[475] arXiv:2506.20415 [pdf, html, other]
Title: SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models
Dipayan Saha, Shams Tarek, Hasan Al Shaikh, Khan Thamid Hasan, Pavan Sai Nalluri, Md. Ajoad Hasan, Nashmin Alam, Jingbo Zhou, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[476] arXiv:2506.20444 [pdf, html, other]
Title: Smart Cuts: Enhance Active Learning for Vulnerability Detection by Pruning Hard-to-Learn Data
Xiang Lan, Tim Menzies, Bowen Xu
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[477] arXiv:2506.20488 [pdf, html, other]
Title: Generative AI for Vulnerability Detection in 6G Wireless Networks: Advances, Case Study, and Future Directions
Shuo Yang, Xinran Zheng, Jinfeng Xu, Jinze Li, Danyang Song, Zheyu Chen, Edith C.H. Ngai
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[478] arXiv:2506.20576 [pdf, html, other]
Title: Vulnerability Disclosure through Adaptive Black-Box Adversarial Attacks on NIDS
Sabrine Ennaji, Elhadj Benkhelifa, Luigi V. Mancini
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[479] arXiv:2506.20585 [pdf, html, other]
Title: On the Impact of Sybil-based Attacks on Mobile Crowdsensing for Transportation
Alexander Söderhäll, Zahra Alimadadi, Panos Papadimitratos
Comments: 7 pages, 5 figures, 2 tables, TrustSense workshop of PerCom 2025
Subjects: Cryptography and Security (cs.CR)
[480] arXiv:2506.20770 [pdf, html, other]
Title: Perry: A High-level Framework for Accelerating Cyber Deception Experimentation
Brian Singer, Yusuf Saquib, Lujo Bauer, Vyas Sekar
Subjects: Cryptography and Security (cs.CR)
[481] arXiv:2506.20800 [pdf, html, other]
Title: SIMulator: SIM Tracing on a (Pico-)Budget
Gabriel K. Gegenhuber, Philipp É. Frenzel, Adrian Dabrowski
Comments: Accepted Poster at WiSec 2025
Subjects: Cryptography and Security (cs.CR)
[482] arXiv:2506.20806 [pdf, html, other]
Title: Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis
Zhonghao Zhan, Huichi Zhou, Hamed Haddadi
Comments: Poster accepted at the 10th IEEE European Symposium on Security and Privacy (Euro S&P 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[483] arXiv:2506.20872 [pdf, html, other]
Title: Empowering Digital Agriculture: A Privacy-Preserving Framework for Data Sharing and Collaborative Research
Osama Zafar, Rosemarie Santa González, Mina Namazi, Alfonso Morales, Erman Ayday
Comments: arXiv admin note: text overlap with arXiv:2409.06069
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[484] arXiv:2506.20915 [pdf, html, other]
Title: ZKPROV: A Zero-Knowledge Approach to Dataset Provenance for Large Language Models
Mina Namazi, Alexander Nemecek, Erman Ayday
Comments: 12 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[485] arXiv:2506.20926 [pdf, html, other]
Title: Towards Generalized and Stealthy Watermarking for Generative Code Models
Haoxuan Li, Jiale Zhang, Xiaobing Sun, Xiapu Luo
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[486] arXiv:2506.20931 [pdf, html, other]
Title: SPA: Towards More Stealth and Persistent Backdoor Attacks in Federated Learning
Chengcheng Zhu, Ye Li, Bosen Rao, Jiale Zhang, Yunlong Mao, Sheng Zhong
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR)
[487] arXiv:2506.20981 [pdf, other]
Title: PrivacyGo: Privacy-Preserving Ad Measurement with Multidimensional Intersection
Jian Du, Haohao Qian, Shikun Zhang, Wen-jie Lu, Donghang Lu, Yongchuan Niu, Bo Jiang, Yongjun Zhao, Qiang Yan
Subjects: Cryptography and Security (cs.CR)
[488] arXiv:2506.21069 [pdf, html, other]
Title: TEMPEST-LoRa: Cross-Technology Covert Communication
Xieyang Sun, Yuanqing Zheng, Wei Xi, Zuhao Chen, Zhizhen Chen, Han Hao, Zhiping Jiang, Sheng Zhong
Comments: 15 pages, 19 figures, and this paper has been accepted to ACM CCS 2025
Subjects: Cryptography and Security (cs.CR)
[489] arXiv:2506.21106 [pdf, html, other]
Title: PhishKey: A Novel Centroid-Based Approach for Enhanced Phishing Detection Using Adaptive HTML Component Extraction
Felipe Castaño, Eduardo Fidalgo, Enrique Alegre, Rocio Alaiz-Rodríguez, Raul Orduna, Francesco Zola
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[490] arXiv:2506.21134 [pdf, html, other]
Title: Inside Job: Defending Kubernetes Clusters Against Network Misconfigurations
Jacopo Bufalino, Jose Luis Martin-Navarro, Mario Di Francesco, Tuomas Aura
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[491] arXiv:2506.21308 [pdf, other]
Title: Balancing Privacy and Utility in Correlated Data: A Study of Bayesian Differential Privacy
Martin Lange, Patricia Guerra-Balboa, Javier Parra-Arnau, Thorsten Strufe
Comments: This is the extended version of the paper accepted in the Proceedings of the VLDB Endowment (PVLDB), 2025. The code used for our experiments is accessible in this https URL
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[492] arXiv:2506.21688 [pdf, html, other]
Title: CyGym: A Simulation-Based Game-Theoretic Analysis Framework for Cybersecurity
Michael Lanier, Yevgeniy Vorobeychik
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[493] arXiv:2506.21874 [pdf, html, other]
Title: On the Feasibility of Poisoning Text-to-Image AI Models via Adversarial Mislabeling
Stanley Wu, Ronik Bhaskar, Anna Yoo Jeong Ha, Shawn Shan, Haitao Zheng, Ben Y. Zhao
Comments: ACM Conference on Computer and Communications Security 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[494] arXiv:2506.21897 [pdf, html, other]
Title: One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-Channels
Twisha Chattopadhyay, Fabricio Ceschin, Marco E. Garza, Dymytriy Zyunkin, Animesh Chhotaray, Aaron P. Stebner, Saman Zonouz, Raheem Beyah
Comments: 17 pages [Extended Version]
Subjects: Cryptography and Security (cs.CR)
[495] arXiv:2506.21914 [pdf, html, other]
Title: Consumer Beware! Exploring Data Brokers' CCPA Compliance
Elina van Kempen, Isita Bagayatkar, Pavel Frolikov, Chloe Georgiou, Gene Tsudik
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[496] arXiv:2506.22180 [pdf, html, other]
Title: Reliability Analysis of Smart Contract Execution Architectures: A Comparative Simulation Study
Önder Gürcan
Comments: 23 pages, 5 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[497] arXiv:2506.22323 [pdf, html, other]
Title: Under the Hood of BlotchyQuasar: DLL-Based RAT Campaigns Against Latin America
Alessio Di Santo
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Operating Systems (cs.OS); Programming Languages (cs.PL)
[498] arXiv:2506.22506 [pdf, html, other]
Title: SABRE-FL: Selective and Accurate Backdoor Rejection for Federated Prompt Learning
Momin Ahmad Khan, Yasra Chandio, Fatima Muhammad Anwar
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[499] arXiv:2506.22515 [pdf, other]
Title: In-context learning for the classification of manipulation techniques in phishing emails
Antony Dalmiere (LAAS-TRUST, LAAS), Guillaume Auriol (LAAS-TRUST, INSA Toulouse), Vincent Nicomette (LAAS-TSF, LAAS), Pascal Marchand (LERASS)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[500] arXiv:2506.22521 [pdf, html, other]
Title: A Survey on Model Extraction Attacks and Defenses for Large Language Models
Kaixiang Zhao, Lincan Li, Kaize Ding, Neil Zhenqiang Gong, Yue Zhao, Yushun Dong
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
Total of 731 entries : 1-100 101-200 201-300 301-400 401-500 501-600 601-700 701-731
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack