Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2025

Total of 731 entries : 101-350 251-500 501-731
Showing up to 250 entries per page: fewer | more | all
[101] arXiv:2506.05074 [pdf, other]
Title: EMBER2024 -- A Benchmark Dataset for Holistic Evaluation of Malware Classifiers
Robert J. Joyce, Gideon Miller, Phil Roth, Richard Zak, Elliott Zaresky-Williams, Hyrum Anderson, Edward Raff, James Holt
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[102] arXiv:2506.05126 [pdf, html, other]
Title: Membership Inference Attacks on Sequence Models
Lorenzo Rossi, Michael Aerni, Jie Zhang, Florian Tramèr
Comments: Accepted to the 8th Deep Learning Security and Privacy Workshop (DLSP) workshop (best paper award)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[103] arXiv:2506.05129 [pdf, html, other]
Title: OpenCCA: An Open Framework to Enable Arm CCA Research
Andrin Bertschi, Shweta Shinde
Subjects: Cryptography and Security (cs.CR)
[104] arXiv:2506.05242 [pdf, html, other]
Title: SECNEURON: Reliable and Flexible Abuse Control in Local LLMs via Hybrid Neuron Encryption
Zhiqiang Wang, Haohua Du, Junyang Wang, Haifeng Sun, Kaiwen Guo, Haikuo Yu, Chao Liu, Xiang-Yang Li
Subjects: Cryptography and Security (cs.CR)
[105] arXiv:2506.05290 [pdf, html, other]
Title: Big Bird: Privacy Budget Management for W3C's Privacy-Preserving Attribution API
Pierre Tholoniat, Alison Caulfield, Giorgio Cavicchioli, Mark Chen, Nikos Goutzoulias, Benjamin Case, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Martin Thomson
Subjects: Cryptography and Security (cs.CR)
[106] arXiv:2506.05346 [pdf, html, other]
Title: Why LLM Safety Guardrails Collapse After Fine-tuning: A Similarity Analysis Between Alignment and Fine-tuning Datasets
Lei Hsiung, Tianyu Pang, Yung-Chen Tang, Linyue Song, Tsung-Yi Ho, Pin-Yu Chen, Yaoqing Yang
Comments: Project Page: this https URL
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[107] arXiv:2506.05355 [pdf, html, other]
Title: Zero-Trust Mobility-Aware Authentication Framework for Secure Vehicular Fog Computing Networks
Taimoor Ahmad
Subjects: Cryptography and Security (cs.CR)
[108] arXiv:2506.05356 [pdf, html, other]
Title: AI-Driven Dynamic Firewall Optimization Using Reinforcement Learning for Anomaly Detection and Prevention
Taimoor Ahmad
Subjects: Cryptography and Security (cs.CR)
[109] arXiv:2506.05374 [pdf, html, other]
Title: A New Representation of Binary Sequences by means of Boolean Functions
S.D. Cardell, A. Fuúter-Sabater, V. Requena, M. Beltrá
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[110] arXiv:2506.05376 [pdf, html, other]
Title: A Red Teaming Roadmap Towards System-Level Safety
Zifan Wang, Christina Q. Knight, Jeremy Kritz, Willow E. Primack, Julian Michael
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[111] arXiv:2506.05381 [pdf, html, other]
Title: Heterogeneous Secure Transmissions in IRS-Assisted NOMA Communications: CO-GNN Approach
Linlin Liang, Zongkai Tian, Haiyan Huang, Xiaoyan Li, Zhisheng Yin, Dehua Zhang, Nina Zhang, Wenchao Zhai
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Signal Processing (eess.SP)
[112] arXiv:2506.05382 [pdf, html, other]
Title: How stealthy is stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World
Francesco Panebianco, Mario D'Onghia, Stefano Zanero aand Michele Carminati
Journal-ref: In: Nemec Zlatolas, L., Rannenberg, K., Welzer, T., Garcia-Alfaro, J. (eds) ICT Systems Security and Privacy Protection. SEC 2025. IFIP Advances in Information and Communication Technology, vol 746. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[113] arXiv:2506.05394 [pdf, html, other]
Title: Attacking Attention of Foundation Models Disrupts Downstream Tasks
Hondamunige Prasanna Silva, Federico Becattini, Lorenzo Seidenari
Comments: Paper published at CVPR 2025 Workshop Advml
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[114] arXiv:2506.05401 [pdf, html, other]
Title: Robust Anti-Backdoor Instruction Tuning in LVLMs
Yuan Xun, Siyuan Liang, Xiaojun Jia, Xinwei Liu, Xiaochun Cao
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[115] arXiv:2506.05402 [pdf, html, other]
Title: Sylva: Tailoring Personalized Adversarial Defense in Pre-trained Models via Collaborative Fine-tuning
Tianyu Qi, Lei Xue, Yufeng Zhan, Xiaobo Ma
Comments: Accepted by the ACM Conference on Computer and Communications Security (CCS) 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[116] arXiv:2506.05403 [pdf, html, other]
Title: Poisoning Behavioral-based Worker Selection in Mobile Crowdsensing using Generative Adversarial Networks
Ruba Nasser, Ahmed Alagha, Shakti Singh, Rabeb Mizouni, Hadi Otrok, Jamal Bentahar
Subjects: Cryptography and Security (cs.CR)
[117] arXiv:2506.05407 [pdf, html, other]
Title: PCEvolve: Private Contrastive Evolution for Synthetic Dataset Generation via Few-Shot Private Data and Generative APIs
Jianqing Zhang, Yang Liu, Jie Fu, Yang Hua, Tianyuan Zou, Jian Cao, Qiang Yang
Comments: Accepted as ICML Spotlight (top 2.6%)
Subjects: Cryptography and Security (cs.CR)
[118] arXiv:2506.05408 [pdf, html, other]
Title: Differentially Private Federated $k$-Means Clustering with Server-Side Data
Jonathan Scott, Christoph H. Lampert, David Saulpic
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119] arXiv:2506.05411 [pdf, html, other]
Title: QA-HFL: Quality-Aware Hierarchical Federated Learning for Resource-Constrained Mobile Devices with Heterogeneous Image Quality
Sajid Hussain, Muhammad Sohail, Nauman Ali Khan
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[120] arXiv:2506.05416 [pdf, html, other]
Title: FERRET: Private Deep Learning Faster And Better Than DPSGD
David Zagardo
Comments: 28 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[121] arXiv:2506.05421 [pdf, html, other]
Title: TRIDENT -- A Three-Tier Privacy-Preserving Propaganda Detection Model in Mobile Networks using Transformers, Adversarial Learning, and Differential Privacy
Al Nahian Bin Emran, Dhiman Goswami, Md Hasan Ullah Sadi, Sanchari Das
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[122] arXiv:2506.05430 [pdf, html, other]
Title: Explainer-guided Targeted Adversarial Attacks against Binary Code Similarity Detection Models
Mingjie Chen (Zhejiang University), Tiancheng Zhu (Huazhong University of Science and Technology), Mingxue Zhang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University & Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security), Yiling He (University College London), Minghao Lin (University of Southern California), Penghui Li (Columbia University), Kui Ren (The State Key Laboratory of Blockchain and Data Security, Zhejiang University)
Comments: 12 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[123] arXiv:2506.05446 [pdf, html, other]
Title: Sentinel: SOTA model to protect against prompt injections
Dror Ivry, Oran Nahum
Comments: 6 pages, 2 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124] arXiv:2506.05502 [pdf, html, other]
Title: StealthInk: A Multi-bit and Stealthy Watermark for Large Language Models
Ya Jiang, Chuxiong Wu, Massieh Kordi Boroujeny, Brian Mark, Kai Zeng
Comments: camera-ready version
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[125] arXiv:2506.05594 [pdf, html, other]
Title: SoK: Are Watermarks in LLMs Ready for Deployment?
Kieu Dang, Phung Lai, NhatHai Phan, Yelong Shen, Ruoming Jin, Abdallah Khreishah, My Thai
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[126] arXiv:2506.05601 [pdf, html, other]
Title: Network Hexagons Under Attack: Secure Crowdsourcing of Geo-Referenced Data
Okemawo Obadofin, Joao Barros
Journal-ref: 2025 IEEE Security and Privacy Workshops (SPW)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[127] arXiv:2506.05611 [pdf, html, other]
Title: Breaking Anonymity at Scale: Re-identifying the Trajectories of 100K Real Users in Japan
Abhishek Kumar Mishra, Mathieu Cunche, Heber H. Arcolezi
Subjects: Cryptography and Security (cs.CR)
[128] arXiv:2506.05640 [pdf, html, other]
Title: FedShield-LLM: A Secure and Scalable Federated Fine-Tuned Large Language Model
Md Jueal Mia, M. Hadi Amini
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[129] arXiv:2506.05692 [pdf, other]
Title: SafeGenBench: A Benchmark Framework for Security Vulnerability Detection in LLM-Generated Code
Xinghang Li, Jingzhe Ding, Chao Peng, Bing Zhao, Xiang Gao, Hongwan Gao, Xinchen Gu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[130] arXiv:2506.05708 [pdf, html, other]
Title: Hybrid Stabilization Protocol for Cross-Chain Digital Assets Using Adaptor Signatures and AI-Driven Arbitrage
Shengwei You, Andrey Kuehlkamp, Jarek Nabrzyski
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE)
[131] arXiv:2506.05711 [pdf, html, other]
Title: A symmetric LWE-based Multi-Recipient Cryptosystem
Saikat Gope, Srinivasan Krishnaswamy, Chayan Bhawal
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[132] arXiv:2506.05734 [pdf, html, other]
Title: There's Waldo: PCB Tamper Forensic Analysis using Explainable AI on Impedance Signatures
Maryam Saadat Safa, Seyedmohammad Nouraniboosjin, Fatemeh Ganji, Shahin Tajik
Subjects: Cryptography and Security (cs.CR)
[133] arXiv:2506.05739 [pdf, html, other]
Title: To Protect the LLM Agent Against the Prompt Injection Attack with Polymorphic Prompt
Zhilong Wang, Neha Nagaraja, Lan Zhang, Hayretdin Bahsi, Pawan Patil, Peng Liu
Comments: To appear in the Industry Track of the 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[134] arXiv:2506.05740 [pdf, html, other]
Title: FIST: A Structured Threat Modeling Framework for Fraud Incidents
Yu-Chen Dai, Lu-An Chen, Sy-Jye Her, Yu-Xian Jiang
Subjects: Cryptography and Security (cs.CR)
[135] arXiv:2506.05743 [pdf, html, other]
Title: When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning
Ruining Sun, Hongsheng Hu, Wei Luo, Zhaoxi Zhang, Yanjun Zhang, Haizhuan Yuan, Leo Yu Zhang
Comments: Accepted In ACM ASIA Conference on Computer and Communications Security (ASIA CCS '25), August 25-29, 2025, Ha Noi, Vietnam. For Code, see this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[136] arXiv:2506.05844 [pdf, html, other]
Title: $\text{C}^{2}\text{BNVAE}$: Dual-Conditional Deep Generation of Network Traffic Data for Network Intrusion Detection System Balancing
Yifan Zeng
Comments: In ICML 2025 Workshop NewInML
Subjects: Cryptography and Security (cs.CR)
[137] arXiv:2506.05867 [pdf, html, other]
Title: Stealix: Model Stealing via Prompt Evolution
Zhixiong Zhuang, Hui-Po Wang, Maria-Irina Nicolae, Mario Fritz
Comments: Accepted at ICML 2025. The project page is at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[138] arXiv:2506.05900 [pdf, html, other]
Title: Differentially Private Explanations for Clusters
Amir Gilad, Tova Milo, Kathy Razmadze, Ron Zadicario
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[139] arXiv:2506.05932 [pdf, other]
Title: Combating Reentrancy Bugs on Sharded Blockchains
Roman Kashitsyn, Robin Künzler, Ognjen Marić, Lara Schmid
Subjects: Cryptography and Security (cs.CR)
[140] arXiv:2506.06119 [pdf, html, other]
Title: SATversary: Adversarial Attacks on Satellite Fingerprinting
Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic
Comments: 19 pages, 18 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[141] arXiv:2506.06124 [pdf, html, other]
Title: PrivTru: A Privacy-by-Design Data Trustee Minimizing Information Leakage
Lukas Gehring, Florian Tschorsch
Comments: 14 pages, 2 figures, IFIP Sec 2025
Subjects: Cryptography and Security (cs.CR)
[142] arXiv:2506.06151 [pdf, html, other]
Title: Joint-GCG: Unified Gradient-Based Poisoning Attacks on Retrieval-Augmented Generation Systems
Haowei Wang, Rupeng Zhang, Junjie Wang, Mingyang Li, Yuekai Huang, Dandan Wang, Qing Wang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[143] arXiv:2506.06161 [pdf, html, other]
Title: ORCAS: Obfuscation-Resilient Binary Code Similarity Analysis using Dominance Enhanced Semantic Graph
Yufeng Wang, Yuhong Feng, Yixuan Cao, Haoran Li, Haiyue Feng, Yifeng Wang
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[144] arXiv:2506.06226 [pdf, html, other]
Title: PROVSYN: Synthesizing Provenance Graphs for Data Augmentation in Intrusion Detection Systems
Yi Huang, Wajih UI Hassan, Yao Guo, Xiangqun Chen, Ding Li
Subjects: Cryptography and Security (cs.CR)
[145] arXiv:2506.06407 [pdf, other]
Title: TimeWak: Temporal Chained-Hashing Watermark for Time Series Data
Zhi Wen Soi, Chaoyi Zhu, Fouad Abiad, Aditya Shankar, Jeroen M. Galjaard, Huijuan Wang, Lydia Y. Chen
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multimedia (cs.MM)
[146] arXiv:2506.06409 [pdf, html, other]
Title: HeavyWater and SimplexWater: Watermarking Low-Entropy Text Distributions
Dor Tsur, Carol Xuan Long, Claudio Mayrink Verdun, Hsiang Hsu, Chen-Fu Chen, Haim Permuter, Sajani Vithana, Flavio P. Calmon
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computers and Society (cs.CY); Information Theory (cs.IT); Machine Learning (cs.LG)
[147] arXiv:2506.06414 [pdf, html, other]
Title: Benchmarking Misuse Mitigation Against Covert Adversaries
Davis Brown, Mahdi Sabbaghi, Luze Sun, Alexander Robey, George J. Pappas, Eric Wong, Hamed Hassani
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[148] arXiv:2506.06518 [pdf, html, other]
Title: A Systematic Review of Poisoning Attacks Against Large Language Models
Neil Fendley, Edward W. Staley, Joshua Carney, William Redman, Marie Chau, Nathan Drenkow
Comments: 28 Pages including number
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[149] arXiv:2506.06530 [pdf, html, other]
Title: Breaking the Gaussian Barrier: Residual-PAC Privacy for Automatic Privatization
Tao Zhang, Yevgeniy Vorobeychik
Subjects: Cryptography and Security (cs.CR)
[150] arXiv:2506.06547 [pdf, html, other]
Title: The complexity of the SupportMinors Modeling for the MinRank Problem
Daniel Cabarcas, Giulia Gaggero, Elisa Gorla
Subjects: Cryptography and Security (cs.CR); Commutative Algebra (math.AC)
[151] arXiv:2506.06565 [pdf, html, other]
Title: Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security
Emilia Rivas, Sabrina Saika, Ahtesham Bakht, Aritran Piplai, Nathaniel D. Bastian, Ankit Shah
Comments: In Proceedings of the 22nd International Conference on Security and Cryptography, ISBN 978-989-758-760-3, ISSN 2184-7711, pages 547-554
Subjects: Cryptography and Security (cs.CR)
[152] arXiv:2506.06572 [pdf, html, other]
Title: Cyber Security of Sensor Systems for State Sequence Estimation: an AI Approach
Xubin Fang, Rick S. Blum, Ramesh Bharadwaj, Brian M. Sadler
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[153] arXiv:2506.06597 [pdf, html, other]
Title: Stochastic Training for Side-Channel Resilient AI
Anuj Dubey, Aydin Aysu
Subjects: Cryptography and Security (cs.CR)
[154] arXiv:2506.06604 [pdf, html, other]
Title: Scoring the Unscorables: Cyber Risk Assessment Beyond Internet Scans
Armin Sarabi, Manish Karir, Mingyan Liu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[155] arXiv:2506.06635 [pdf, html, other]
Title: TrustConnect: An In-Vehicle Anomaly Detection Framework through Topology-Based Trust Rating
Ayan Roy, Jeetkumar Patel, Rik Chakraborti, Shudip Datta
Comments: To Appear in 2025 the IEEE 101st Vehicular Technology Conference: VTC2025-Spring
Subjects: Cryptography and Security (cs.CR)
[156] arXiv:2506.06730 [pdf, html, other]
Title: Fuse and Federate: Enhancing EV Charging Station Security with Multimodal Fusion and Federated Learning
Rabah Rahal, Abdelaziz Amara Korba, Yacine Ghamri-Doudane
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[157] arXiv:2506.06735 [pdf, other]
Title: Ai-Driven Vulnerability Analysis in Smart Contracts: Trends, Challenges and Future Directions
Mesut Ozdag
Journal-ref: International Journal of Artificial Intelligence and Applications (IJAIA), Vol.16, No.3, May 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[158] arXiv:2506.06742 [pdf, html, other]
Title: LADSG: Label-Anonymized Distillation and Similar Gradient Substitution for Label Privacy in Vertical Federated Learning
Zeyu Yan, Yanfei Yao, Xuanbing Wen, Shixiong Zhang, Juli Zhang, Kai Fan
Comments: 20 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[159] arXiv:2506.06975 [pdf, html, other]
Title: Auditing Black-Box LLM APIs with a Rank-Based Uniformity Test
Xiaoyuan Zhu, Yaowen Ye, Tianyi Qiu, Hanlin Zhu, Sijun Tan, Ajraf Mannan, Jonathan Michala, Raluca Ada Popa, Willie Neiswanger
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[160] arXiv:2506.07010 [pdf, html, other]
Title: ModelForge: Using GenAI to Improve the Development of Security Protocols
Martin Duclos, Ivan A. Fernandez, Kaneesha Moore, Sudip Mittal, Edward Zieglar
Subjects: Cryptography and Security (cs.CR)
[161] arXiv:2506.07031 [pdf, html, other]
Title: HauntAttack: When Attack Follows Reasoning as a Shadow
Jingyuan Ma, Rui Li, Zheng Li, Junfeng Liu, Lei Sha, Zhifang Sui
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[162] arXiv:2506.07034 [pdf, html, other]
Title: NanoZone: Scalable, Efficient, and Secure Memory Protection for Arm CCA
Shiqi Liu, Yongpeng Gao, Mingyang Zhang, Jie Wang
Subjects: Cryptography and Security (cs.CR)
[163] arXiv:2506.07077 [pdf, other]
Title: Dual-Priv Pruning : Efficient Differential Private Fine-Tuning in Multimodal Large Language Models
Qianshan Wei, Jiaqi Li, Zihan You, Yi Zhan, Kecen Li, Jialin Wu, Xinfeng Li Hengjun Liu, Yi Yu, Bin Cao, Yiwen Xu, Yang Liu, Guilin Qi
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[164] arXiv:2506.07153 [pdf, other]
Title: Mind the Web: The Security of Web Use Agents
Avishag Shapira, Parth Atulbhai Gandhi, Edan Habler, Oleg Brodt, Asaf Shabtai
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[165] arXiv:2506.07190 [pdf, html, other]
Title: A Simulation-based Evaluation Framework for Inter-VM RowHammer Mitigation Techniques
Hidemasa Kawasaki, Soramichi Akiyama
Comments: Presented in Fifth Workshop on DRAM Security (DRAMSec), June 21, 2025
Subjects: Cryptography and Security (cs.CR)
[166] arXiv:2506.07200 [pdf, html, other]
Title: Efficient RL-based Cache Vulnerability Exploration by Penalizing Useless Agent Actions
Kanato Nakanishi, Soramichi Akiyama
Comments: Presented in Machine Learning for Computer Architecture and Systems (MLArchSys), June 21, 2025
Subjects: Cryptography and Security (cs.CR)
[167] arXiv:2506.07263 [pdf, html, other]
Title: Exploiting Inaccurate Branch History in Side-Channel Attacks
Yuhui Zhu, Alessandro Biondi
Comments: 20 pages, 8 figures, to be published in proceedings of the 34th USENIX Security Symposium (2025)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[168] arXiv:2506.07313 [pdf, html, other]
Title: SCGAgent: Recreating the Benefits of Reasoning Models for Secure Code Generation with Agentic Workflows
Rebecca Saul, Hao Wang, Koushik Sen, David Wagner
Subjects: Cryptography and Security (cs.CR)
[169] arXiv:2506.07372 [pdf, html, other]
Title: Enhanced Consistency Bi-directional GAN(CBiGAN) for Malware Anomaly Detection
Thesath Wijayasiri, Kar Wai Fok, Vrizlynn L. L. Thing
Subjects: Cryptography and Security (cs.CR)
[170] arXiv:2506.07392 [pdf, html, other]
Title: From Static to Adaptive Defense: Federated Multi-Agent Deep Reinforcement Learning-Driven Moving Target Defense Against DoS Attacks in UAV Swarm Networks
Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Tian Qin, Yuyu Zhao
Comments: 13pages; In submission
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[171] arXiv:2506.07402 [pdf, html, other]
Title: Beyond Jailbreaks: Revealing Stealthier and Broader LLM Security Risks Stemming from Alignment Failures
Yukai Zhou, Sibei Yang, Wenjie Wang
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[172] arXiv:2506.07403 [pdf, html, other]
Title: Enhancing Watermarking Quality for LLMs via Contextual Generation States Awareness
Peiru Yang, Xintian Li, Wanchun Ni, Jinhua Yin, Huili Wang, Guoshun Nan, Shangguang Wang, Yongfeng Huang, Tao Qi
Subjects: Cryptography and Security (cs.CR)
[173] arXiv:2506.07404 [pdf, html, other]
Title: Pixel-Sensitive and Robust Steganography Based on Polar Codes
Yujun Ji, Jinsheng Li, Ling Liu, Qi Cao, Tao Dai
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[174] arXiv:2506.07480 [pdf, other]
Title: Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain
Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan
Subjects: Cryptography and Security (cs.CR)
[175] arXiv:2506.07586 [pdf, html, other]
Title: MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity
Bikash Saha, Sandeep Kumar Shukla
Subjects: Cryptography and Security (cs.CR)
[176] arXiv:2506.07605 [pdf, other]
Title: TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems
Marco Di Gennaro, Giovanni De Lucia, Stefano Longari, Stefano Zanero, Michele Carminati
Journal-ref: Proceedings on Privacy Enhancing Technologies 2025(4)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[177] arXiv:2506.07714 [pdf, html, other]
Title: Profiling Electric Vehicles via Early Charging Voltage Patterns
Francesco Marchiori, Denis Donadel, Alessandro Brighente, Mauro Conti
Comments: Accepted to be presented at the AI&CPSS Workshop in conjunction with ARES 2025
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
[178] arXiv:2506.07728 [pdf, html, other]
Title: "I wasn't sure if this is indeed a security risk": Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages
Rajdeep Ghosh, Shiladitya De, Mainack Mondal
Comments: This extended version of our USENIX Security '25 paper on Security issue reporting in NPM packages includes appendices for interested readers
Subjects: Cryptography and Security (cs.CR)
[179] arXiv:2506.07827 [pdf, html, other]
Title: User-space library rootkits revisited: Are user-space detection mechanisms futile?
Enrique Soriano-Salvador, Gorka Guardiola Múzquiz, Juan González Gómez
Subjects: Cryptography and Security (cs.CR)
[180] arXiv:2506.07836 [pdf, other]
Title: Are Trees Really Green? A Detection Approach of IoT Malware Attacks
Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Giacinto
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[181] arXiv:2506.07868 [pdf, html, other]
Title: Securing Unbounded Differential Privacy Against Timing Attacks
Zachary Ratliff, Salil Vadhan
Subjects: Cryptography and Security (cs.CR)
[182] arXiv:2506.07882 [pdf, html, other]
Title: Evaluating explainable AI for deep learning-based network intrusion detection system alert classification
Rajesh Kalakoti, Risto Vaarandi, Hayretdin Bahsi, Sven Nõmm
Comments: Accepted version of a paper published in the Proceedings of the 11th International Conference on Information Systems Security and Privacy (ICISSP 2025). Final version available via SCITEPRESS
Subjects: Cryptography and Security (cs.CR)
[183] arXiv:2506.07888 [pdf, html, other]
Title: SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark
Rui Wen, Yiyong Liu, Michael Backes, Yang Zhang
Comments: To Appear in the 34th USENIX Security Symposium, August 13-15, 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[184] arXiv:2506.07894 [pdf, html, other]
Title: Secure Distributed Learning for CAVs: Defending Against Gradient Leakage with Leveled Homomorphic Encryption
Muhammad Ali Najjar, Ren-Yi Huang, Dumindu Samaraweera, Prashant Shekhar
Subjects: Cryptography and Security (cs.CR)
[185] arXiv:2506.07974 [pdf, html, other]
Title: Exposing Hidden Backdoors in NFT Smart Contracts: A Static Security Analysis of Rug Pull Patterns
Chetan Pathade, Shweta Hooli
Comments: 10 Pages, 4 Figures
Subjects: Cryptography and Security (cs.CR)
[186] arXiv:2506.07988 [pdf, html, other]
Title: Unraveling Ethereum's Mempool: The Impact of Fee Fairness, Transaction Prioritization, and Consensus Efficiency
S M Mostaq Hossain, Amani Altarawneh
Comments: 7 pages, 6 figures and 1 table
Subjects: Cryptography and Security (cs.CR)
[187] arXiv:2506.08188 [pdf, html, other]
Title: GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors
Wenlong Meng, Shuguo Fan, Chengkun Wei, Min Chen, Yuwei Li, Yuanchao Zhang, Zhikun Zhang, Wenzhi Chen
Comments: Accepted to USENIX Security'25
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[188] arXiv:2506.08192 [pdf, html, other]
Title: Interpreting Agent Behaviors in Reinforcement-Learning-Based Cyber-Battle Simulation Platforms
Jared Claypoole, Steven Cheung, Ashish Gehani, Vinod Yegneswaran, Ahmad Ridley
Journal-ref: The AAAI-25 Workshop on Artificial Intelligence for Cyber Security (AICS), March 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[189] arXiv:2506.08218 [pdf, html, other]
Title: gh0stEdit: Exploiting Layer-Based Access Vulnerability Within Docker Container Images
Alan Mills, Jonathan White, Phil Legg
Subjects: Cryptography and Security (cs.CR)
[190] arXiv:2506.08252 [pdf, html, other]
Title: PoSyn: Secure Power Side-Channel Aware Synthesis
Amisha Srivastava, Samit S. Miftah, Hyunmin Kim, Debjit Pal, Kanad Basu
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[191] arXiv:2506.08320 [pdf, html, other]
Title: How Good LLM-Generated Password Policies Are?
Vivek Vaidya, Aditya Patwardhan, Ashish Kundu
Comments: 11 pages, 2 Tables, 9 figures, 3 Algorithms
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[192] arXiv:2506.08330 [pdf, other]
Title: Distortion Search, A Web Search Privacy Heuristic
Kato Mivule, Kenneth Hopkinson
Comments: 11 pages, 11 figures, Future Technologies Conference (FTC) 2017
Subjects: Cryptography and Security (cs.CR)
[193] arXiv:2506.08336 [pdf, html, other]
Title: Your Agent Can Defend Itself against Backdoor Attacks
Li Changjiang, Liang Jiacheng, Cao Bochuan, Chen Jinghui, Wang Ting
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[194] arXiv:2506.08445 [pdf, html, other]
Title: GPS Spoofing Attacks on AI-based Navigation Systems with Obstacle Avoidance in UAV
Ji Hyuk Jung, Mi Yeon Hong, Ji Won Yoon
Subjects: Cryptography and Security (cs.CR)
[195] arXiv:2506.08482 [pdf, html, other]
Title: One Patch to Rule Them All: Transforming Static Patches into Dynamic Attacks in the Physical World
Xingshuo Han, Chen Ling, Shiyi Yao, Haozhao Wang, Hangcheng Liu, Yutong Wu, Shengmin Xu, Changhai Ou, Xinyi Huang, Tianwei Zhang
Subjects: Cryptography and Security (cs.CR)
[196] arXiv:2506.08602 [pdf, other]
Title: WGLE:Backdoor-free and Multi-bit Black-box Watermarking for Graph Neural Networks
Tingzhi Li, Xuefeng Liu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[197] arXiv:2506.08693 [pdf, html, other]
Title: On the Ethics of Using LLMs for Offensive Security
Andreas Happe, Jürgen Cito
Subjects: Cryptography and Security (cs.CR)
[198] arXiv:2506.08781 [pdf, html, other]
Title: Lightweight and High-Throughput Secure Logging for Internet of Things and Cold Cloud Continuum
Saif E. Nouma, Attila A. Yavuz
Subjects: Cryptography and Security (cs.CR)
[199] arXiv:2506.08828 [pdf, html, other]
Title: Lightweight Electronic Signatures and Reliable Access Control Included in Sensor Networks to Prevent Cyber Attacks from Modifying Patient Data
Mishall Al-Zubaidie
Comments: 22 pages, 11 figures, conference
Subjects: Cryptography and Security (cs.CR)
[200] arXiv:2506.08838 [pdf, html, other]
Title: ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint Inference
Yuchong Xie, Wenhui Zhang, Dongdong She
Comments: To appear on 34th ISSTA
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[201] arXiv:2506.08866 [pdf, html, other]
Title: SmartAttack: Air-Gap Attack via Smartwatches
Mordechai Guri
Comments: Accepted to IEEE COMPSAC 2025 (SEPT)
Subjects: Cryptography and Security (cs.CR)
[202] arXiv:2506.08918 [pdf, html, other]
Title: Quantifying Mix Network Privacy Erosion with Generative Models
Vasilios Mavroudis, Tariq Elahi
Subjects: Cryptography and Security (cs.CR)
[203] arXiv:2506.08922 [pdf, html, other]
Title: Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels
Clément Parssegny, Johan Mazel, Olivier Levillain, Pierre Chifflier
Subjects: Cryptography and Security (cs.CR)
[204] arXiv:2506.08996 [pdf, html, other]
Title: Navigating Cookie Consent Violations Across the Globe
Brian Tang, Duc Bui, Kang G. Shin
Comments: Published at 34th USENIX Security Symposium (2025)
Subjects: Cryptography and Security (cs.CR)
[205] arXiv:2506.09148 [pdf, other]
Title: Adversarial Text Generation with Dynamic Contextual Perturbation
Hetvi Waghela, Jaydip Sen, Sneha Rakshit, Subhasis Dasgupta
Comments: This is the accepted version of the paper, which was presented at IEEE CALCON. The conference was organized at Jadavpur University, Kolkata, from December 14 to 15, 2025. The paper is six pages long, and it consists of six tables and six figures. This is not the final camera-ready version of the paper
Journal-ref: Proceedings of the IEEE Calcutta Conference (CALCON), Kolkata, India, 2024, pp. 1-6
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[206] arXiv:2506.09312 [pdf, other]
Title: What is the Cost of Differential Privacy for Deep Learning-Based Trajectory Generation?
Erik Buchholz, Natasha Fernandes, David D. Nguyen, Alsharif Abuadbba, Surya Nepal, Salil S. Kanhere
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[207] arXiv:2506.09353 [pdf, html, other]
Title: DAVSP: Safety Alignment for Large Vision-Language Models via Deep Aligned Visual Safety Prompt
Yitong Zhang, Jia Li, Liyi Cai, Ge Li
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[208] arXiv:2506.09365 [pdf, html, other]
Title: ContextBuddy: AI-Enhanced Contextual Insights for Security Alert Investigation (Applied to Intrusion Detection)
Ronal Singh, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris
Comments: 27 pages, 33 figures, 7 tables, under review
Subjects: Cryptography and Security (cs.CR)
[209] arXiv:2506.09387 [pdf, html, other]
Title: Epass: Efficient and Privacy-Preserving Asynchronous Payment on Blockchain
Weijie Wang, Jinwen Liang, Chuan Zhang, Ximeng Liu, Liehuang Zhu, Song Guo
Subjects: Cryptography and Security (cs.CR)
[210] arXiv:2506.09418 [pdf, html, other]
Title: Securing Open RAN: A Survey of Cryptographic Challenges and Emerging Solutions for 5G
Ryan Barker, Fatemeh Afghah
Comments: 4 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[211] arXiv:2506.09443 [pdf, html, other]
Title: LLMs Cannot Reliably Judge (Yet?): A Comprehensive Assessment on the Robustness of LLM-as-a-Judge
Songze Li, Chuokun Xu, Jiaying Wang, Xueluan Gong, Chen Chen, Jirui Zhang, Jun Wang, Kwok-Yan Lam, Shouling Ji
Subjects: Cryptography and Security (cs.CR)
[212] arXiv:2506.09464 [pdf, other]
Title: Efficient Hardware Implementation of Modular Multiplier over GF (2m) on FPGA
Ruby Kumari, Gaurav Purohit, Abhijit Karmakar
Comments: 18 pages, 11 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[213] arXiv:2506.09502 [pdf, html, other]
Title: The Security Overview and Analysis of 3GPP 5G MAC CE
Jin Cao, Yuanyuan Yang, Ruhui Ma, Sheng Li, Hui Li
Subjects: Cryptography and Security (cs.CR)
[214] arXiv:2506.09525 [pdf, html, other]
Title: Beyond Personalization: Federated Recommendation with Calibration via Low-rank Decomposition
Jundong Chen, Honglei Zhang, Haoxuan Li, Chunxu Zhang, Zhiwei Li, Yidong Li
Subjects: Cryptography and Security (cs.CR)
[215] arXiv:2506.09559 [pdf, html, other]
Title: Identity and Access Management for the Computing Continuum
Chalima Dimitra Nassar Kyriakidou, Athanasia Maria Papathanasiou, Vasilios A. Siris, Nikos Fotiou, George C. Polyzos, Eduardo Cánovas Martínez, Antonio Skarmeta
Comments: Proceedings of the 2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum, pp 33-39. 2025
Subjects: Cryptography and Security (cs.CR)
[216] arXiv:2506.09562 [pdf, html, other]
Title: TooBadRL: Trigger Optimization to Boost Effectiveness of Backdoor Attacks on Deep Reinforcement Learning
Songze Li, Mingxuan Zhang, Kang Wei, Shouling Ji
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[217] arXiv:2506.09569 [pdf, html, other]
Title: The Rabin cryptosystem over number fields
Alessandro Cobbe, Andreas Nickel, Akay Schuster
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[218] arXiv:2506.09580 [pdf, html, other]
Title: The Everyday Security of Living with Conflict
Jessica McClearn, Reem Talhouk, Rikke Bjerg Jensen
Comments: Published in IEEE Security and Privacy Magazine
Journal-ref: IEEE Security & Privacy, Mar.-Apr. 2025, pp. 95-100, vol. 23
Subjects: Cryptography and Security (cs.CR)
[219] arXiv:2506.09662 [pdf, html, other]
Title: Empirical Quantification of Spurious Correlations in Malware Detection
Bianca Perasso, Ludovico Lozza, Andrea Ponte, Luca Demetrio, Luca Oneto, Fabio Roli
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[220] arXiv:2506.09719 [pdf, html, other]
Title: On the Virtues of Information Security in the UK Climate Movement
Mikaela Brough, Rikke Bjerg Jensen, Martin R. Albrecht
Comments: To appear at the USENIX Security Symposium 2025
Subjects: Cryptography and Security (cs.CR)
[221] arXiv:2506.09807 [pdf, html, other]
Title: Physical Layer-Based Device Fingerprinting for Wireless Security: From Theory to Practice
Junqing Zhang, Francesco Ardizzon, Mattia Piana, Guanxiong Shen, Stefano Tomasin
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[222] arXiv:2506.09950 [pdf, html, other]
Title: Oracle-Based Multistep Strategy for Solving Polynomial Systems Over Finite Fields and Algebraic Cryptanalysis of the Aradi Cipher
La Scala Roberto, Sharwan Kumar Tiwari
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC); Commutative Algebra (math.AC)
[223] arXiv:2506.09956 [pdf, html, other]
Title: LLMail-Inject: A Dataset from a Realistic Adaptive Prompt Injection Challenge
Sahar Abdelnabi, Aideen Fay, Ahmed Salem, Egor Zverev, Kai-Chieh Liao, Chi-Huang Liu, Chun-Chih Kuo, Jannis Weigend, Danyael Manlangit, Alex Apostolov, Haris Umair, João Donato, Masayuki Kawakita, Athar Mahboob, Tran Huu Bach, Tsun-Han Chiang, Myeongjin Cho, Hajin Choi, Byeonghyeon Kim, Hyeonjin Lee, Benjamin Pannell, Conor McCauley, Mark Russinovich, Andrew Paverd, Giovanni Cherubin
Comments: Dataset at: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[224] arXiv:2506.10020 [pdf, html, other]
Title: From Threat to Tool: Leveraging Refusal-Aware Injection Attacks for Safety Alignment
Kyubyung Chae, Hyunbin Jin, Taesup Kim
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[225] arXiv:2506.10022 [pdf, html, other]
Title: LLMs Caught in the Crossfire: Malware Requests and Jailbreak Challenges
Haoyang Li, Huan Gao, Zhiyuan Zhao, Zhiyu Lin, Junyu Gao, Xuelong Li
Comments: Accepted as ACL 2025 main conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[226] arXiv:2506.10024 [pdf, html, other]
Title: Private Memorization Editing: Turning Memorization into a Defense to Strengthen Data Privacy in Large Language Models
Elena Sofia Ruzzetti, Giancarlo A. Xompero, Davide Venditti, Fabio Massimo Zanzotto
Comments: To be published at ACL 2025 (Main)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[227] arXiv:2506.10025 [pdf, html, other]
Title: Mind the Gap: Revealing Security Barriers through Situational Awareness of Small and Medium Business Key Decision-Makers
Yuanhaur Chang, Oren Heller, Yaniv Shlomo, Iddo Bar-Noy, Ella Bokobza, Michal Grinstein-Weiss, Ning Zhang
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[228] arXiv:2506.10028 [pdf, other]
Title: Secure Data Access in Cloud Environments Using Quantum Cryptography
S. Vasavi Venkata Lakshmi, Ziaul Haque Choudhury
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[229] arXiv:2506.10029 [pdf, other]
Title: Evaluation empirique de la sécurisation et de l'alignement de ChatGPT et Gemini: analyse comparative des vulnérabilités par expérimentations de jailbreaks
Rafaël Nouailles (GdR)
Comments: in French language
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[230] arXiv:2506.10030 [pdf, html, other]
Title: Safeguarding Multimodal Knowledge Copyright in the RAG-as-a-Service Environment
Tianyu Chen, Jian Lou, Wenjie Wang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[231] arXiv:2506.10039 [pdf, html, other]
Title: Symbolic Generation and Modular Embedding of High-Quality abc-Triples
Michael A. Idowu
Comments: 17 pages, includes tables and illustrative examples; discusses symbolic generation of abc-triples and applications in entropy filtering and cryptographic pre-processing
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM)
[232] arXiv:2506.10042 [pdf, html, other]
Title: Multiverse Privacy Theory for Contextual Risks in Complex User-AI Interactions
Ece Gumusel
Comments: 5 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[233] arXiv:2506.10047 [pdf, other]
Title: GenBreak: Red Teaming Text-to-Image Generators Using Large Language Models
Zilong Wang, Xiang Zheng, Xiaosen Wang, Bo Wang, Xingjun Ma, Yu-Gang Jiang
Comments: 27 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[234] arXiv:2506.10104 [pdf, html, other]
Title: Expert-in-the-Loop Systems with Cross-Domain and In-Domain Few-Shot Learning for Software Vulnerability Detection
David Farr, Kevin Talty, Alexandra Farr, John Stockdale, Iain Cruickshank, Jevin West
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[235] arXiv:2506.10125 [pdf, html, other]
Title: D-LiFT: Improving LLM-based Decompiler Backend via Code Quality-driven Fine-tuning
Muqi Zou, Hongyu Cai, Hongwei Wu, Zion Leonahenahe Basque, Arslan Khan, Berkay Celik, Dave (Jing)Tian, Antonio Bianchi, Ruoyu (Fish)Wang, Dongyan Xu
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[236] arXiv:2506.10147 [pdf, other]
Title: Unconditionally Secure Wireless-Wired Ground-Satellite-Ground Communication Networks Utilizing Classical and Quantum Noise
Lucas Truax, Sandip Roy, Laszlo B. Kish
Journal-ref: Fluctuation and Noise Letters Vol. 24, No. 3 (2025)
Subjects: Cryptography and Security (cs.CR)
[237] arXiv:2506.10171 [pdf, other]
Title: Disclosure Audits for LLM Agents
Saswat Das, Jameson Sandler, Ferdinando Fioretto
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[238] arXiv:2506.10175 [pdf, other]
Title: AURA: A Multi-Agent Intelligence Framework for Knowledge-Enhanced Cyber Threat Attribution
Nanda Rani, Sandeep Kumar Shukla
Subjects: Cryptography and Security (cs.CR)
[239] arXiv:2506.10194 [pdf, html, other]
Title: Guardians of the Regime: When and Why Autocrats Create Secret Police
Marius Mehrl, Mila Pfander, Theresa Winner, Cornelius Fritz
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[240] arXiv:2506.10236 [pdf, html, other]
Title: Prompt Attacks Reveal Superficial Knowledge Removal in Unlearning Methods
Yeonwoo Jang, Shariqah Hossain, Ashwin Sreevatsa, Diogo Cruz
Comments: 19 pages, 6 figures. Accepted at COLM 2025 SoLaR Workshop
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computers and Society (cs.CY); Machine Learning (cs.LG)
[241] arXiv:2506.10323 [pdf, html, other]
Title: ELFuzz: Efficient Input Generation via LLM-driven Synthesis Over Fuzzer Space
Chuyang Chen, Brendan Dolan-Gavitt, Zhiqiang Lin
Comments: Accepted by USENIX Security'25 Cycle 2
Journal-ref: The 34th USENIX Security Symposium, 2025
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[242] arXiv:2506.10327 [pdf, other]
Title: A Comprehensive Survey of Unmanned Aerial Systems' Risks and Mitigation Strategies
Sharad Shrestha, Mohammed Ababneh, Satyajayant Misra, Henry M. Cathey Jr., Roopa Vishwanathan, Matt Jansen, Jinhong Choi, Rakesh Bobba, Yeongjin Jang
Subjects: Cryptography and Security (cs.CR)
[243] arXiv:2506.10338 [pdf, html, other]
Title: Adaptive Chosen-Ciphertext Security of Distributed Broadcast Encryption
Kwangsu Lee
Comments: arXiv admin note: text overlap with arXiv:2505.17527
Subjects: Cryptography and Security (cs.CR)
[244] arXiv:2506.10399 [pdf, html, other]
Title: FicGCN: Unveiling the Homomorphic Encryption Efficiency from Irregular Graph Convolutional Networks
Zhaoxuan Kan, Husheng Han, Shangyi Shi, Tenghui Hua, Hang Lu, Xiaowei Li, Jianan Mu, Xing Hu
Comments: Accepted by ICML 2025
Subjects: Cryptography and Security (cs.CR)
[245] arXiv:2506.10424 [pdf, html, other]
Title: SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Kaiyuan Zhang, Siyuan Cheng, Hanxi Guo, Yuetian Chen, Zian Su, Shengwei An, Yuntao Du, Charles Fleming, Ashish Kundu, Xiangyu Zhang, Ninghui Li
Comments: Accepted by the 34th USENIX Security Symposium 2025. Code is available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[246] arXiv:2506.10467 [pdf, html, other]
Title: Specification and Evaluation of Multi-Agent LLM Systems -- Prototype and Cybersecurity Applications
Felix Härer
Comments: This work has been submitted for publication. Copyright may be transferred. In this case, this version will be updated with a notice, according to the publisher's guidelines
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[247] arXiv:2506.10502 [pdf, html, other]
Title: A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks
Junhua Lin, Marc Juarez (University of Edinburgh)
Comments: 18 pages, to be published in the 34th USENIX Security Symposium
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[248] arXiv:2506.10597 [pdf, html, other]
Title: SoK: Evaluating Jailbreak Guardrails for Large Language Models
Xunguang Wang, Zhenlan Ji, Wenxuan Wang, Zongjie Li, Daoyuan Wu, Shuai Wang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[249] arXiv:2506.10620 [pdf, html, other]
Title: Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation
Stefano Longari, Paolo Cerracchio, Michele Carminati, Stefano Zanero
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[250] arXiv:2506.10638 [pdf, html, other]
Title: CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment
Stefano Longari, Alessandro Pozone, Jessica Leoni, Mario Polino, Michele Carminati, Mara Tanelli, Stefano Zanero
Journal-ref: IEEE Transactions on Emerging Topics in Computing ( Volume: 12, Issue: 2, April-June 2024)
Subjects: Cryptography and Security (cs.CR)
[251] arXiv:2506.10645 [pdf, html, other]
Title: From IOCs to Group Profiles: On the Specificity of Threat Group Behaviors in CTI Knowledge Bases
Aakanksha Saha, Martina Lindorfer, Juan Caballero
Subjects: Cryptography and Security (cs.CR)
[252] arXiv:2506.10665 [pdf, other]
Title: GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems
Davide Maffiola, Stefano Longari, Michele Carminati, Mara Tanelli, Stefano Zanero
Journal-ref: IEEE Transactions on Intelligent Transportation Systems ( Volume: 23, Issue: 8, August 2022)
Subjects: Cryptography and Security (cs.CR)
[253] arXiv:2506.10721 [pdf, html, other]
Title: Commitment Schemes for Multi-Party Computation
Ioan Ionescu, Ruxandra F. Olimid
Subjects: Cryptography and Security (cs.CR)
[254] arXiv:2506.10722 [pdf, html, other]
Title: TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks
Xiaoxing Mo, Yuxuan Cheng, Nan Sun, Leo Yu Zhang, Wei Luo, Shang Gao
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[255] arXiv:2506.10744 [pdf, html, other]
Title: ObfusBFA: A Holistic Approach to Safeguarding DNNs from Different Types of Bit-Flip Attacks
Xiaobei Yan, Han Qiu, Tianwei Zhang
Subjects: Cryptography and Security (cs.CR)
[256] arXiv:2506.10755 [pdf, html, other]
Title: Quantifying Azure RBAC Wildcard Overreach
Christophe Parisel
Subjects: Cryptography and Security (cs.CR)
[257] arXiv:2506.10776 [pdf, html, other]
Title: ME: Trigger Element Combination Backdoor Attack on Copyright Infringement
Feiyu Yang, Siyuan Liang, Aishan Liu, Dacheng Tao
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[258] arXiv:2506.10949 [pdf, html, other]
Title: Monitoring Decomposition Attacks in LLMs with Lightweight Sequential Monitors
Chen Yueh-Han, Nitish Joshi, Yulin Chen, Maksym Andriushchenko, Rico Angell, He He
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[259] arXiv:2506.11212 [pdf, other]
Title: User Perceptions and Attitudes Toward Untraceability in Messaging Platforms
Carla F. Griggio, Boel Nelson, Zefan Sramek, Aslan Askarov
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[260] arXiv:2506.11325 [pdf, html, other]
Title: Uncovering Reliable Indicators: Improving IoC Extraction from Threat Reports
Evangelos Froudakis, Athanasios Avgetidis, Sean Tyler Frankum, Roberto Perdisci, Manos Antonakakis, Angelos Keromytis
Subjects: Cryptography and Security (cs.CR)
[261] arXiv:2506.11423 [pdf, html, other]
Title: Bhatt Conjectures: On Necessary-But-Not-Sufficient Benchmark Tautology for Human Like Reasoning
Manish Bhatt
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[262] arXiv:2506.11444 [pdf, html, other]
Title: GaussMarker: Robust Dual-Domain Watermark for Diffusion Models
Kecen Li, Zhicong Huang, Xinwen Hou, Cheng Hong
Comments: Accepted at ICML 2025
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[263] arXiv:2506.11458 [pdf, html, other]
Title: Computational Attestations of Polynomial Integrity Towards Verifiable Machine-Learning
Dustin Ray, Caroline El Jazmi
Comments: 21 pages, Future Technologies Conference (FTC) 2024
Subjects: Cryptography and Security (cs.CR)
[264] arXiv:2506.11521 [pdf, html, other]
Title: Investigating Vulnerabilities and Defenses Against Audio-Visual Attacks: A Comprehensive Survey Emphasizing Multimodal Models
Jinming Wen, Xinyi Wu, Shuai Zhao, Yanhao Jia, Yuwen Li
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multimedia (cs.MM)
[265] arXiv:2506.11586 [pdf, html, other]
Title: SecONNds: Secure Outsourced Neural Network Inference on ImageNet
Shashank Balla
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[266] arXiv:2506.11612 [pdf, html, other]
Title: KEENHash: Hashing Programs into Function-Aware Embeddings for Large-Scale Binary Code Similarity Analysis
Zhijie Liu, Qiyi Tang, Sen Nie, Shi Wu, Liang Feng Zhang, Yutian Tang
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[267] arXiv:2506.11635 [pdf, html, other]
Title: FAA Framework: A Large Language Model-Based Approach for Credit Card Fraud Investigations
Shaun Shuster, Eyal Zaloof, Asaf Shabtai, Rami Puzis
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[268] arXiv:2506.11669 [pdf, html, other]
Title: DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond
Guanjie Li, Tom H. Luan, Chengzhe Lai, Jinkai Zheng, Rongxing Lu
Subjects: Cryptography and Security (cs.CR)
[269] arXiv:2506.11679 [pdf, other]
Title: LLMs on support of privacy and security of mobile apps: state of the art and research directions
Tran Thanh Lam Nguyen, Barbara Carminati, Elena Ferrari
Comments: I am writing to respectfully request the withdrawal of my recent submission to arXiv due to an authorship issue. The paper was submitted without the explicit consent of two co-authors. After internal discussion, they have expressed clear disagreement with the submission and raised concerns about unresolved academic inaccuracies in the current version
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[270] arXiv:2506.11687 [pdf, html, other]
Title: Differential Privacy in Machine Learning: From Symbolic AI to LLMs
Francisco Aguilera-Martínez, Fernando Berzal
Comments: arXiv admin note: text overlap with arXiv:2303.00654 by other authors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[271] arXiv:2506.11939 [pdf, html, other]
Title: Today's Cat Is Tomorrow's Dog: Accounting for Time-Based Changes in the Labels of ML Vulnerability Detection Approaches
Ranindya Paramitha, Yuan Feng, Fabio Massacci
Comments: Accepted at The ACM International Conference on the Foundations of Software Engineering (FSE) 2025. Published in the Proceedings of the ACM on Software Engineering (PACMSE), Issue FSE 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[272] arXiv:2506.11954 [pdf, html, other]
Title: Technical Evaluation of a Disruptive Approach in Homomorphic AI
Eric Filiol
Comments: This is the extended version of the talk presented at CyberWiseCon 2025 in Vilnius, Lituania in May 21$^{st}$-23$^{rd}$, 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[273] arXiv:2506.11970 [pdf, html, other]
Title: CnC-PRAC: Coalesce, not Cache, Per Row Activation Counts for an Efficient in-DRAM Rowhammer Mitigation
Chris S. Lin, Jeonghyun Woo, Prashant J. Nair, Gururaj Saileshwar
Comments: 8 pages, including appendices. The paper is presented at DRAMSec 2025. (see this https URL)
Subjects: Cryptography and Security (cs.CR)
[274] arXiv:2506.12026 [pdf, html, other]
Title: LURK-T: Limited Use of Remote Keys With Added Trust in TLS 1.3
Behnam Shobiri, Sajjad Pourali, Daniel Migault, Ioana Boureanu, Stere Preda, Mohammad Mannan, Amr Youssef
Journal-ref: IEEE Transactions on Network Science and Engineering, vol. 11, no. 6, pp. 6313-6327, Nov.-Dec. 2024
Subjects: Cryptography and Security (cs.CR)
[275] arXiv:2506.12060 [pdf, other]
Title: Organizational Adaptation to Generative AI in Cybersecurity: A Systematic Review
Christopher Nott
Comments: 38 pages, 1 table, 1 figure
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[276] arXiv:2506.12088 [pdf, other]
Title: Risks & Benefits of LLMs & GenAI for Platform Integrity, Healthcare Diagnostics, Financial Trust and Compliance, Cybersecurity, Privacy & AI Safety: A Comprehensive Survey, Roadmap & Implementation Blueprint
Kiarash Ahi
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[277] arXiv:2506.12096 [pdf, other]
Title: Quantum Computing and Cybersecurity in Accounting and Finance: Current and Future Challenges and the Opportunities for Securing Accounting and Finance Systems in the Post-Quantum World
Huma Habib Shadan, Sardar Islam (Victoria University)
Comments: 44 Pages, 2 Figures, 4 Tables, 1 Flow Diagram
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[278] arXiv:2506.12100 [pdf, html, other]
Title: LLM Embedding-based Attribution (LEA): Quantifying Source Contributions to Generative Model's Response for Vulnerability Analysis
Reza Fayyazi, Michael Zuzak, Shanchieh Jay Yang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[279] arXiv:2506.12104 [pdf, html, other]
Title: DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agents
Hao Li, Xiaogeng Liu, Hung-Chun Chiu, Dianqi Li, Ning Zhang, Chaowei Xiao
Comments: 18 pages, 12 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[280] arXiv:2506.12108 [pdf, other]
Title: A Lightweight IDS for Early APT Detection Using a Novel Feature Selection Method
Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[281] arXiv:2506.12113 [pdf, html, other]
Title: Semantic Preprocessing for LLM-based Malware Analysis
Benjamin Marais, Tony Quertier, Grégoire Barrue
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[282] arXiv:2506.12257 [pdf, other]
Title: Lessons for Cybersecurity from the American Public Health System
Adam Shostack (University of Washington), L. Jean Camp (Indiana University), Yi Ting Chua (University of Tulsa), Josiah Dykstra (Trail of Bits), Brian LaMacchia (FARCASTER Consulting Group), Daniel Lopresti (Lehigh University)
Subjects: Cryptography and Security (cs.CR)
[283] arXiv:2506.12274 [pdf, other]
Title: InfoFlood: Jailbreaking Large Language Models with Information Overload
Advait Yadav, Haibo Jin, Man Luo, Jun Zhuang, Haohan Wang
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[284] arXiv:2506.12299 [pdf, html, other]
Title: QGuard:Question-based Zero-shot Guard for Multi-modal LLM Safety
Taegyeong Lee, Jeonghwa Yoo, Hyoungseo Cho, Soo Yong Kim, Yunho Maeng
Comments: Accept to ACLW 2025 (WOAH)
Journal-ref: ACL Workshop 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[285] arXiv:2506.12328 [pdf, html, other]
Title: Information-theoretic Estimation of the Risk of Privacy Leaks
Kenneth Odoh
Subjects: Cryptography and Security (cs.CR)
[286] arXiv:2506.12344 [pdf, html, other]
Title: Restoring Gaussian Blurred Face Images for Deanonymization Attacks
Haoyu Zhai, Shuo Wang, Pirouz Naghavi, Qingying Hao, Gang Wang
Comments: 18 pages, 16 figures, IEEE Transaction format
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[287] arXiv:2506.12411 [pdf, html, other]
Title: InverTune: Removing Backdoors from Multimodal Contrastive Learning Models via Trigger Inversion and Activation Tuning
Mengyuan Sun, Yu Li, Yuchen Liu, Bo Du, Yunjie Ge
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[288] arXiv:2506.12430 [pdf, html, other]
Title: Pushing the Limits of Safety: A Technical Report on the ATLAS Challenge 2025
Zonghao Ying, Siyang Wu, Run Hao, Peng Ying, Shixuan Sun, Pengyu Chen, Junze Chen, Hao Du, Kaiwen Shen, Shangkun Wu, Jiwei Wei, Shiyuan He, Yang Yang, Xiaohai Xu, Ke Ma, Qianqian Xu, Qingming Huang, Shi Lin, Xun Wang, Changting Lin, Meng Han, Yilei Jiang, Siqi Lai, Yaozhi Zheng, Yifei Song, Xiangyu Yue, Zonglei Jing, Tianyuan Zhang, Zhilei Zhu, Aishan Liu, Jiakai Wang, Siyuan Liang, Xianglong Kong, Hainan Li, Junjie Mu, Haotong Qin, Yue Yu, Lei Chen, Felix Juefei-Xu, Qing Guo, Xinyun Chen, Yew Soon Ong, Xianglong Liu, Dawn Song, Alan Yuille, Philip Torr, Dacheng Tao
Comments: AdvML@CVPR Challenge Report
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[289] arXiv:2506.12466 [pdf, html, other]
Title: Towards Safety and Security Testing of Cyberphysical Power Systems by Shape Validation
Alexander Geiger, Immanuel Hacker, Ömer Sen, Andreas Ulbig
Comments: Accepted to 2025 IEEE International Conference on Cyber Security and Resilience (CSR)
Subjects: Cryptography and Security (cs.CR)
[290] arXiv:2506.12519 [pdf, html, other]
Title: Exploiting AI for Attacks: On the Interplay between Adversarial AI and Offensive AI
Saskia Laura Schröer, Luca Pajola, Alberto Castagnaro, Giovanni Apruzzese, Mauro Conti
Comments: under submission
Subjects: Cryptography and Security (cs.CR)
[291] arXiv:2506.12522 [pdf, html, other]
Title: When Forgetting Triggers Backdoors: A Clean Unlearning Attack
Marco Arazzi, Antonino Nocera, Vinod P
Subjects: Cryptography and Security (cs.CR)
[292] arXiv:2506.12523 [pdf, html, other]
Title: Privacy-preserving and reward-based mechanisms of proof of engagement
Matteo Marco Montanari, Alessandro Aldini
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[293] arXiv:2506.12551 [pdf, html, other]
Title: MEraser: An Effective Fingerprint Erasure Approach for Large Language Models
Jingxuan Zhang, Zhenhua Xu, Rui Hu, Wenpeng Xing, Xuhong Zhang, Meng Han
Comments: Accepted by ACL 2025, Main Conference, Long Paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[294] arXiv:2506.12580 [pdf, html, other]
Title: GNSS Spoofing Detection Based on Opportunistic Position Information
Wenjie Liu, Panos Papadimitratos
Subjects: Cryptography and Security (cs.CR)
[295] arXiv:2506.12675 [pdf, html, other]
Title: Watermarking Quantum Neural Networks Based on Sample Grouped and Paired Training
Limengnan Zhou, Hanzhou Wu
Subjects: Cryptography and Security (cs.CR)
[296] arXiv:2506.12685 [pdf, html, other]
Title: Alphabet Index Mapping: Jailbreaking LLMs through Semantic Dissimilarity
Bilal Saleh Husain
Comments: 10 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[297] arXiv:2506.12699 [pdf, html, other]
Title: SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and Mitigation
Yashothara Shanmugarasa, Ming Ding, M.A.P Chamikara, Thierry Rakotoarivelo
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[298] arXiv:2506.12707 [pdf, html, other]
Title: SecurityLingua: Efficient Defense of LLM Jailbreak Attacks via Security-Aware Prompt Compression
Yucheng Li, Surin Ahn, Huiqiang Jiang, Amir H. Abdi, Yuqing Yang, Lili Qiu
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[299] arXiv:2506.12761 [pdf, html, other]
Title: Versatile and Fast Location-Based Private Information Retrieval with Fully Homomorphic Encryption over the Torus
Joon Soo Yoo, Taeho Kim, Ji Won Yoon
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[300] arXiv:2506.12802 [pdf, html, other]
Title: Bidirectional Biometric Authentication Using Transciphering and (T)FHE
Joon Soo Yoo, Tae Min Ahn, Ji Won Yoon
Subjects: Cryptography and Security (cs.CR)
[301] arXiv:2506.12846 [pdf, html, other]
Title: VFEFL: Privacy-Preserving Federated Learning against Malicious Clients via Verifiable Functional Encryption
Nina Cai, Jinguang Han, Weizhi Meng
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[302] arXiv:2506.12880 [pdf, html, other]
Title: Universal Jailbreak Suffixes Are Strong Attention Hijackers
Matan Ben-Tov, Mor Geva, Mahmood Sharif
Subjects: Cryptography and Security (cs.CR)
[303] arXiv:2506.12883 [pdf, html, other]
Title: Cut Tracing with E-Graphs for Boolean FHE Circuit Synthesis
Julien de Castelnau, Mingfei Yu, Giovanni De Micheli
Comments: 7 pages, 5 figures, presented to EGRAPHS25 workshop, not in conference proceedings
Subjects: Cryptography and Security (cs.CR)
[304] arXiv:2506.12995 [pdf, html, other]
Title: Open Source, Open Threats? Investigating Security Challenges in Open-Source Software
Seyed Ali Akhavani, Behzad Ousat, Amin Kharraz
Subjects: Cryptography and Security (cs.CR)
[305] arXiv:2506.13009 [pdf, html, other]
Title: Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective
Nima Naderloui, Shenao Yan, Binghui Wang, Jie Fu, Wendy Hui Wang, Weiran Liu, Yuan Hong
Comments: To appear in USENIX Security '25
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[306] arXiv:2506.13024 [pdf, html, other]
Title: Position: Certified Robustness Does Not (Yet) Imply Model Security
Andrew C. Cullen, Paul Montague, Sarah M. Erfani, Benjamin I.P. Rubinstein
Comments: 9 pages, ICML, 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[307] arXiv:2506.13052 [pdf, html, other]
Title: Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions
Steven Su, Erik Rye, Dave Levin, Robert Beverly
Subjects: Cryptography and Security (cs.CR)
[308] arXiv:2506.13090 [pdf, html, other]
Title: Detecting Hard-Coded Credentials in Software Repositories via LLMs
Chidera Biringa, Gokhan Kul
Comments: Accepted to the ACM Digital Threats: Research and Practice (DTRAP)
Subjects: Cryptography and Security (cs.CR)
[309] arXiv:2506.13161 [pdf, html, other]
Title: Using LLMs for Security Advisory Investigations: How Far Are We?
Bayu Fedra Abdullah, Yusuf Sulistyo Nugroho, Brittany Reid, Raula Gaikovina Kula, Kazumasa Shimari, Kenichi Matsumoto
Comments: 6 pages, 6 figures, 8 tables, conference paper
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[310] arXiv:2506.13170 [pdf, html, other]
Title: Dual Protection Ring: User Profiling Via Differential Privacy and Service Dissemination Through Private Information Retrieval
Imdad Ullah, Najm Hassan, Tariq Ahamed Ahangar, Zawar Hussain Shah, Mehregan Mahdavi, Andrew Levula
Subjects: Cryptography and Security (cs.CR)
[311] arXiv:2506.13205 [pdf, html, other]
Title: Poison Once, Control Anywhere: Clean-Text Visual Backdoors in VLM-based Mobile Agents
Xuan Wang, Siyuan Liang, Zhe Liu, Yi Yu, Aishan Liu, Yuliang Lu, Xitong Gao, Ee-Chien Chang
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[312] arXiv:2506.13246 [pdf, html, other]
Title: On Immutable Memory Systems for Artificial Agents: A Blockchain-Indexed Automata-Theoretic Framework Using ECDH-Keyed Merkle Chains
Craig Steven Wright
Comments: 47 pages, includes formal automata specifications, cryptographic constructions, and epistemic architecture schema
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[313] arXiv:2506.13261 [pdf, html, other]
Title: Building Automotive Security on Internet Standards: An Integration of DNSSEC, DANE, and DANCE to Authenticate and Authorize In-Car Services
Timo Salomon, Mehmet Mueller, Philipp Meyer, Thomas C. Schmidt
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[314] arXiv:2506.13323 [pdf, html, other]
Title: Tady: A Neural Disassembler without Structural Constraint Violations
Siliang Qin, Fengrui Yang, Hao Wang, Bolun Zhang, Zeyu Gao, Chao Zhang, Kai Chen
Comments: Usenix Security'25
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Software Engineering (cs.SE)
[315] arXiv:2506.13360 [pdf, html, other]
Title: The Rich Get Richer in Bitcoin Mining Induced by Blockchain Forks
Akira Sakurai, Kazuyuki Shudo
Subjects: Cryptography and Security (cs.CR)
[316] arXiv:2506.13418 [pdf, html, other]
Title: New characterization of full weight spectrum one-orbit cyclic subspace codes
Minjia Shi, Wenhao Song
Subjects: Cryptography and Security (cs.CR)
[317] arXiv:2506.13434 [pdf, html, other]
Title: From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs
Alsharif Abuadbba, Chris Hicks, Kristen Moore, Vasilios Mavroudis, Burak Hasircioglu, Diksha Goel, Piers Jennings
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR)
[318] arXiv:2506.13494 [pdf, html, other]
Title: Watermarking LLM-Generated Datasets in Downstream Tasks
Yugeng Liu, Tianshuo Cong, Michael Backes, Zheng Li, Yang Zhang
Subjects: Cryptography and Security (cs.CR)
[319] arXiv:2506.13563 [pdf, other]
Title: Unlearning-Enhanced Website Fingerprinting Attack: Against Backdoor Poisoning in Anonymous Networks
Yali Yuan, Kai Xu, Ruolin Ma, Yuchen Zhang
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[320] arXiv:2506.13612 [pdf, html, other]
Title: EBS-CFL: Efficient and Byzantine-robust Secure Clustered Federated Learning
Zhiqiang Li, Haiyong Bao, Menghong Guan, Hao Pan, Cheng Huang, Hong-Ning Dai
Comments: Accepted by AAAI 25
Journal-ref: Proceedings of the AAAI Conference on Artificial Intelligence, 39(17), 18593-18601, 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[321] arXiv:2506.13737 [pdf, html, other]
Title: ExtendAttack: Attacking Servers of LRMs via Extending Reasoning
Zhenhao Zhu, Yue Liu, Yingwei Ma, Hongcheng Gao, Nuo Chen, Yanpei Guo, Wenjie Qu, Huiying Xu, Xinzhong Zhu, Jiaheng Zhang
Subjects: Cryptography and Security (cs.CR)
[322] arXiv:2506.13746 [pdf, html, other]
Title: Evaluating Large Language Models for Phishing Detection, Self-Consistency, Faithfulness, and Explainability
Shova Kuikel, Aritran Piplai, Palvi Aggarwal
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[323] arXiv:2506.13895 [pdf, html, other]
Title: A Dual-Layer Image Encryption Framework Using Chaotic AES with Dynamic S-Boxes and Steganographic QR Codes
Md Rishadul Bayesh, Dabbrata Das, Md Ahadullah
Comments: 24 pages (including references), 14 figures. Submitted to a journal for publication
Subjects: Cryptography and Security (cs.CR)
[324] arXiv:2506.14057 [pdf, html, other]
Title: SoK: Advances and Open Problems in Web Tracking
Yash Vekaria (1), Yohan Beugin (2), Shaoor Munir (1), Gunes Acar (3), Nataliia Bielova (4), Steven Englehardt (5), Umar Iqbal (6), Alexandros Kapravelos (7), Pierre Laperdrix (8), Nick Nikiforakis (9), Jason Polakis (10), Franziska Roesner (11), Zubair Shafiq (1), Sebastian Zimmeck (12) ((1) University of California Davis, USA, (2) University of Wisconsin-Madison, USA, (3) Radboud University, Netherlands, (4) Inria Centre at Universite Cote d'Azur, France, (5) Independent Researcher, USA, (6) Washington University in St. Louis, USA, (7) North Carolina State University, USA, (8) Centre National de la Recherche Scientifique, France, (9) Stony Brook University, USA, (10) University of Illinois Chicago, USA, (11) University of Washington, USA, (12) Wesleyan University, USA)
Comments: Extended Version is available at: this https URL
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[325] arXiv:2506.14124 [pdf, other]
Title: From Permissioned to Proof-of-Stake Consensus
Jovan Komatovic, Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Ertem Nusret Tas
Subjects: Cryptography and Security (cs.CR)
[326] arXiv:2506.14323 [pdf, html, other]
Title: Vulnerability Disclosure or Notification? Best Practices for Reaching Stakeholders at Scale
Ting-Han Chen, Jeroen van der Ham-de Vos
Comments: 18 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[327] arXiv:2506.14337 [pdf, html, other]
Title: LLM-Powered Intent-Based Categorization of Phishing Emails
Even Eilertsen, Vasileios Mavroeidis, Gudmund Grov
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[328] arXiv:2506.14340 [pdf, html, other]
Title: Quantum Enhanced Entropy Pool for Cryptographic Applications and Proofs
Buniechukwu Njoku, Sonai Biswas, Milad Ghadimi, Mohammad Shojafar, Gabriele Gradoni, Riccardo Bassoli, Frank H. P. Fitzek
Comments: 6 pages, 6 figures, Conference: IEEE Future Networks World Forum 2024
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[329] arXiv:2506.14374 [pdf, other]
Title: Excessive Reasoning Attack on Reasoning LLMs
Wai Man Si, Mingjie Li, Michael Backes, Yang Zhang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[330] arXiv:2506.14393 [pdf, other]
Title: Consensus Power Inequality: A Comparative Study of Blockchain Networks
Kamil Tylinski, Abylay Satybaldy, Paolo Tasca
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[331] arXiv:2506.14466 [pdf, html, other]
Title: MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem
Xingan Gao, Xiaobing Sun, Sicong Cao, Kaifeng Huang, Di Wu, Xiaolei Liu, Xingwei Lin, Yang Xiang
Subjects: Cryptography and Security (cs.CR)
[332] arXiv:2506.14489 [pdf, html, other]
Title: ReDASH: Fast and efficient Scaling in Arithmetic Garbled Circuits for Secure Outsourced Inference
Felix Maurer, Jonas Sander, Thomas Eisenbarth
Subjects: Cryptography and Security (cs.CR)
[333] arXiv:2506.14566 [pdf, html, other]
Title: Anonymous Authentication using Attribute-based Encryption
Nouha Oualha
Subjects: Cryptography and Security (cs.CR)
[334] arXiv:2506.14576 [pdf, html, other]
Title: SoK: Privacy-Enhancing Technologies in Artificial Intelligence
Nouha Oualha
Subjects: Cryptography and Security (cs.CR)
[335] arXiv:2506.14582 [pdf, html, other]
Title: Busting the Paper Ballot: Voting Meets Adversarial Machine Learning
Kaleel Mahmood, Caleb Manicke, Ethan Rathbun, Aayushi Verma, Sohaib Ahmad, Nicholas Stamatakis, Laurent Michel, Benjamin Fuller
Comments: 18 Pages. Author version of article to appear at CCS 2025
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[336] arXiv:2506.14682 [pdf, html, other]
Title: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models
Ads Dawson, Rob Mulla, Nick Landers, Shane Caldwell
Comments: 43 pages, 13 figures, 16 tables
Subjects: Cryptography and Security (cs.CR)
[337] arXiv:2506.14697 [pdf, html, other]
Title: AGENTSAFE: Benchmarking the Safety of Embodied Agents on Hazardous Instructions
Aishan Liu, Zonghao Ying, Le Wang, Junjie Mu, Jinyang Guo, Jiakai Wang, Yuqing Ma, Siyuan Liang, Mingchuan Zhang, Xianglong Liu, Dacheng Tao
Comments: MAS@ICML 2025 camera ready
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[338] arXiv:2506.14913 [pdf, html, other]
Title: Winter Soldier: Backdooring Language Models at Pre-Training with Indirect Data Poisoning
Wassim Bouaziz, Mathurin Videau, Nicolas Usunier, El-Mahdi El-Mhamdi
Comments: 18 pages, 12 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[339] arXiv:2506.14944 [pdf, html, other]
Title: Fair Data Exchange at Near-Plaintext Efficiency
Majid Khabbazian
Comments: Revision notes. This version significantly reduces communication overhead and proof-generation/verification time compared to the previous draft, bringing fair data exchange to near-plaintext speed and size
Subjects: Cryptography and Security (cs.CR)
[340] arXiv:2506.14964 [pdf, html, other]
Title: Narrowing the Gap between TEEs Threat Model and Deployment Strategies
Filip Rezabek, Jonathan Passerat-Palmbach, Moe Mahhouk, Frieder Erdmann, Andrew Miller
Subjects: Cryptography and Security (cs.CR)
[341] arXiv:2506.15018 [pdf, html, other]
Title: Private Continual Counting of Unbounded Streams
Ben Jacobsen, Kassem Fawaz
Comments: 12 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[342] arXiv:2506.15028 [pdf, other]
Title: Systems-Theoretic and Data-Driven Security Analysis in ML-enabled Medical Devices
Gargi Mitra, Mohammadreza Hallajiyan, Inji Kim, Athish Pranav Dharmalingam, Mohammed Elnawawy, Shahrear Iqbal, Karthik Pattabiraman, Homa Alemzadeh
Comments: 32 pages, 6 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
[343] arXiv:2506.15034 [pdf, other]
Title: MECHA: Multithreaded and Efficient Cryptographic Hardware Access
Pratama Derry, Laksmono Agus Mahardika Ari, Iqbal Muhammad, Howon Kim
Comments: 4 Page
Subjects: Cryptography and Security (cs.CR)
[344] arXiv:2506.15043 [pdf, other]
Title: Advanced Prediction of Hypersonic Missile Trajectories with CNN-LSTM-GRU Architectures
Amir Hossein Baradaran
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[345] arXiv:2506.15070 [pdf, html, other]
Title: Toward a Lightweight, Scalable, and Parallel Secure Encryption Engine
Rasha Karakchi, Rye Stahle-Smith, Nishant Chinnasami, Tiffany Yu
Comments: This is submitted to the ACM/IEEE Symposium on Edge Computing (SEC 2025)
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[346] arXiv:2506.15075 [pdf, html, other]
Title: CWGAN-GP Augmented CAE for Jamming Detection in 5G-NR in Non-IID Datasets
Samhita Kuili, Mohammadreza Amini, Burak Kantarci
Comments: 6 pages, 5 figures, Accepted to IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[347] arXiv:2506.15093 [pdf, other]
Title: Flexible Hardware-Enabled Guarantees for AI Compute
James Petrie, Onni Aarne, Nora Ammann, David Dalrymple
Subjects: Cryptography and Security (cs.CR)
[348] arXiv:2506.15100 [pdf, other]
Title: International Security Applications of Flexible Hardware-Enabled Guarantees
Onni Aarne, James Petrie
Subjects: Cryptography and Security (cs.CR)
[349] arXiv:2506.15102 [pdf, html, other]
Title: EVA-S2PMLP: Secure and Scalable Two-Party MLP via Spatial Transformation
Shizhao Peng, Shoumo Li, Tianle Tao
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[350] arXiv:2506.15112 [pdf, html, other]
Title: PDLRecover: Privacy-preserving Decentralized Model Recovery with Machine Unlearning
Xiangman Li, Xiaodong Wu, Jianbing Ni, Mohamed Mahmoud, Maazen Alsabaan
Subjects: Cryptography and Security (cs.CR)
Total of 731 entries : 101-350 251-500 501-731
Showing up to 250 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack