Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for July 2025

Total of 616 entries : 1-100 101-200 151-250 201-300 301-400 401-500 ... 601-616
Showing up to 100 entries per page: fewer | more | all
[151] arXiv:2507.06926 [pdf, html, other]
Title: Are NFTs Ready to Keep Australian Artists Engaged?
Ruiqiang Li, Brian Yecies, Qin Wang, Shiping Chen, Jun Shen
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Emerging Technologies (cs.ET)
[152] arXiv:2507.06986 [pdf, html, other]
Title: BarkBeetle: Stealing Decision Tree Models with Fault Injection
Qifan Wang, Jonas Sander, Minmin Jiang, Thomas Eisenbarth, David Oswald
Subjects: Cryptography and Security (cs.CR)
[153] arXiv:2507.07031 [pdf, html, other]
Title: ZKTorch: Compiling ML Inference to Zero-Knowledge Proofs via Parallel Proof Accumulation
Bing-Jyue Chen, Lilia Tang, Daniel Kang
Comments: 16 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[154] arXiv:2507.07056 [pdf, html, other]
Title: LoRAShield: Data-Free Editing Alignment for Secure Personalized LoRA Sharing
Jiahao Chen, junhao li, Yiming Wang, Zhe Ma, Yi Jiang, Chunyi Zhou, Qingming Li, Tianyu Du, Shouling Ji
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[155] arXiv:2507.07210 [pdf, html, other]
Title: WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch
Nils Rollshausen, Alexander Heinrich, Matthias Hollick, Jiska Classen
Comments: To appear in "Proceedings on Privacy Enhancing Technologies"
Subjects: Cryptography and Security (cs.CR)
[156] arXiv:2507.07244 [pdf, html, other]
Title: Automated Attack Testflow Extraction from Cyber Threat Report using BERT for Contextual Analysis
Faissal Ahmadou, Sepehr Ghaffarzadegan, Boubakr Nour, Makan Pourzandi, Mourad Debbabi, Chadi Assi
Subjects: Cryptography and Security (cs.CR)
[157] arXiv:2507.07246 [pdf, html, other]
Title: Disa: Accurate Learning-based Static Disassembly with Attentions
Peicheng Wang, Monika Santra, Mingyu Liu, Cong Sun, Dongrui Zeng, Gang Tan
Comments: To appear at ACM CCS 2025
Subjects: Cryptography and Security (cs.CR)
[158] arXiv:2507.07250 [pdf, html, other]
Title: Semi-fragile watermarking of remote sensing images using DWT, vector quantization and automatic tiling
Jordi Serra-Ruiz, David Megías
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[159] arXiv:2507.07258 [pdf, html, other]
Title: FedP3E: Privacy-Preserving Prototype Exchange for Non-IID IoT Malware Detection in Cross-Silo Federated Learning
Rami Darwish, Mahmoud Abdelsalam, Sajad Khorsandroo, Kaushik Roy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[160] arXiv:2507.07401 [pdf, html, other]
Title: Shuffling for Semantic Secrecy
Fupei Chen, Liyao Xiang, Haoxiang Sun, Hei Victor Cheng, Kaiming Shen
Journal-ref: IEEE Transactions on Information Forensics and Security, vol. 20, pp. 5240-5255, 2025
Subjects: Cryptography and Security (cs.CR)
[161] arXiv:2507.07406 [pdf, html, other]
Title: Phishing Detection in the Gen-AI Era: Quantized LLMs vs Classical Models
Jikesh Thapa, Gurrehmat Chahal, Serban Voinea Gabreanu, Yazan Otoum
Comments: 8 Pages, IEEE Conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[162] arXiv:2507.07413 [pdf, html, other]
Title: Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks
Mohammad F. Al-Hammouri, Yazan Otoum, Rasha Atwa, Amiya Nayak
Comments: 6 pages, IEEE conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[163] arXiv:2507.07416 [pdf, html, other]
Title: Autonomous AI-based Cybersecurity Framework for Critical Infrastructure: Real-Time Threat Mitigation
Jenifer Paulraj, Brindha Raghuraman, Nagarani Gopalakrishnan, Yazan Otoum
Comments: 7 pages, IEEE conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
[164] arXiv:2507.07417 [pdf, other]
Title: May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks
Nishit V. Pandya, Andrey Labunets, Sicun Gao, Earlence Fernandes
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[165] arXiv:2507.07732 [pdf, html, other]
Title: RADAR: a Radio-based Analytics for Dynamic Association and Recognition of pseudonyms in VANETs
Giovanni Gambigliani Zoccoli, Filip Valgimigli, Dario Stabili, Mirco Marchetti
Comments: 7 pages, 4 figures, accepted for publication at the 2025 IEEE 102nd Vehicular Technology Conference: VTC2025-Fall
Subjects: Cryptography and Security (cs.CR)
[166] arXiv:2507.07773 [pdf, html, other]
Title: Rainbow Artifacts from Electromagnetic Signal Injection Attacks on Image Sensors
Youqian Zhang, Xinyu Ji, Zhihao Wang, Qinhong Jiang
Comments: 5 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[167] arXiv:2507.07871 [pdf, html, other]
Title: Mitigating Watermark Forgery in Generative Models via Multi-Key Watermarking
Toluwani Aremu, Noor Hussein, Munachiso Nwadike, Samuele Poppi, Jie Zhang, Karthik Nandakumar, Neil Gong, Nils Lukas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[168] arXiv:2507.07901 [pdf, html, other]
Title: The Trust Fabric: Decentralized Interoperability and Economic Coordination for the Agentic Web
Sree Bhargavi Balija, Rekha Singal, Ramesh Raskar, Erfan Darzi, Raghu Bala, Thomas Hardjono, Ken Huang
Subjects: Cryptography and Security (cs.CR)
[169] arXiv:2507.07916 [pdf, html, other]
Title: Can Large Language Models Improve Phishing Defense? A Large-Scale Controlled Experiment on Warning Dialogue Explanations
Federico Maria Cau, Giuseppe Desolda, Francesco Greco, Lucio Davide Spano, Luca Viganò
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[170] arXiv:2507.07927 [pdf, html, other]
Title: KeyDroid: A Large-Scale Analysis of Secure Key Storage in Android Apps
Jenny Blessing, Ross J. Anderson, Alastair R. Beresford
Subjects: Cryptography and Security (cs.CR)
[171] arXiv:2507.07972 [pdf, html, other]
Title: EinHops: Einsum Notation for Expressive Homomorphic Operations on RNS-CKKS Tensors
Karthik Garimella, Austin Ebel, Brandon Reagen
Comments: 11 pages, 7 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[172] arXiv:2507.07974 [pdf, html, other]
Title: Defending Against Prompt Injection With a Few DefensiveTokens
Sizhe Chen, Yizhu Wang, Nicholas Carlini, Chawin Sitawarin, David Wagner
Subjects: Cryptography and Security (cs.CR)
[173] arXiv:2507.08158 [pdf, html, other]
Title: Beyond the Worst Case: Extending Differential Privacy Guarantees to Realistic Adversaries
Marika Swanberg, Meenatchi Sundaram Muthu Selva Annamalai, Jamie Hayes, Borja Balle, Adam Smith
Subjects: Cryptography and Security (cs.CR)
[174] arXiv:2507.08166 [pdf, html, other]
Title: GPUHammer: Rowhammer Attacks on GPU Memories are Practical
Chris S. Lin, Joyce Qu, Gururaj Saileshwar
Comments: 20 pages, including appendices. The paper will appear in SEC'25
Subjects: Cryptography and Security (cs.CR)
[175] arXiv:2507.08286 [pdf, html, other]
Title: TruChain: A Multi-Layer Architecture for Trusted, Verifiable, and Immutable Open Banking Data
Aufa Nasywa Rahman, Bimo Sunarfri Hantono, Guntur Dharma Putra
Comments: 8 pages, 7 figures. Accepted to IEEE MetaCom 2025
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[176] arXiv:2507.08288 [pdf, html, other]
Title: Invariant-based Robust Weights Watermark for Large Language Models
Qingxiao Guo, Xinjie Zhu, Yilong Ma, Hui Jin, Yunhao Wang, Weifeng Zhang, Xiaobing Guo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[177] arXiv:2507.08312 [pdf, html, other]
Title: Evaluating Post-Quantum Cryptographic Algorithms on Resource-Constrained Devices
Jesus Lopez, Viviana Cadena, Mohammad Saidur Rahman
Comments: 8 pages, 4 figures, 4 tables. This paper is accepted at the IEEE Quantum Week 2025 -- IEEE International Conference on Quantum Computing and Engineering (QCE) 2025
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[178] arXiv:2507.08331 [pdf, html, other]
Title: Qualcomm Trusted Application Emulation for Fuzzing Testing
Chun-I Fan, Li-En Chang, Cheng-Han Shie
Comments: This work is currently under review for presentation at the USENIX Security 2025 poster session
Subjects: Cryptography and Security (cs.CR)
[179] arXiv:2507.08540 [pdf, html, other]
Title: White-Basilisk: A Hybrid Model for Code Vulnerability Detection
Ioannis Lamprou, Alexander Shevtsov, Ioannis Arapakis, Sotiris Ioannidis
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[180] arXiv:2507.08844 [pdf, html, other]
Title: Immutability Does Not Guarantee Trust: A Formal and Logical Refutation
Craig S Wright
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[181] arXiv:2507.08853 [pdf, other]
Title: Clio-X: AWeb3 Solution for Privacy-Preserving AI Access to Digital Archives
Victoria L. Lemieux, Rosa Gil, Faith Molosiwa, Qihong Zhou, Binming Li, Roberto Garcia, Luis De La Torre Cubillo, Zehua Wang
Comments: 28 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Digital Libraries (cs.DL)
[182] arXiv:2507.08862 [pdf, html, other]
Title: RAG Safety: Exploring Knowledge Poisoning Attacks to Retrieval-Augmented Generation
Tianzhe Zhao, Jiaoyan Chen, Yanchi Ru, Haiping Zhu, Nan Hu, Jun Liu, Qika Lin
Comments: 13 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[183] arXiv:2507.08864 [pdf, html, other]
Title: Privacy-Utility-Fairness: A Balanced Approach to Vehicular-Traffic Management System
Poushali Sengupta, Sabita Maharjan, frank Eliassen, Yan Zhang
Comments: accepted in VTC 2025 Spring, Oslo, Norway
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[184] arXiv:2507.08878 [pdf, html, other]
Title: Towards Privacy-Preserving and Personalized Smart Homes via Tailored Small Language Models
Xinyu Huang, Leming Shen, Zijing Ma, Yuanqing Zheng
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[185] arXiv:2507.08904 [pdf, html, other]
Title: CovertAuth: Joint Covert Communication and Authentication in MmWave Systems
Yulin Teng, Keshuang Han, Pinchang Zhang, Xiaohong Jiang, Yulong Shen, Fu Xiao
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[186] arXiv:2507.08978 [pdf, html, other]
Title: Characterizing Security and Privacy Teaching Standards for Schools in the United States
Katherine Limes, Nathan Malkin, Kelsey R. Fulton
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[187] arXiv:2507.09022 [pdf, html, other]
Title: SSH-Passkeys: Leveraging Web Authentication for Passwordless SSH
Moe Kayali, Jonas Schmitt, Franziska Roesner
Subjects: Cryptography and Security (cs.CR)
[188] arXiv:2507.09074 [pdf, other]
Title: Favicon Trojans: Executable Steganography Via Ico Alpha Channel Exploitation
David Noever, Forrest McKee
Subjects: Cryptography and Security (cs.CR)
[189] arXiv:2507.09133 [pdf, html, other]
Title: CLIProv: A Contrastive Log-to-Intelligence Multimodal Approach for Threat Detection and Provenance Analysis
Jingwen Li, Ru Zhang, Jianyi Liu, Wanguo Zhao
Subjects: Cryptography and Security (cs.CR)
[190] arXiv:2507.09231 [pdf, html, other]
Title: Confidential Wrapped Ethereum
Artem Chystiakov, Mariia Zhvanko
Subjects: Cryptography and Security (cs.CR)
[191] arXiv:2507.09288 [pdf, html, other]
Title: Hybrid Quantum Security for IPsec
Javier Blanco-Romero, Pedro Otero García, Daniel Sobral-Blanco, Florina Almenares Mendoza, Ana Fernández Vilas, Manuel Fernández-Veiga
Comments: 23 pages, 6 figures, quantum key distribution, post-quantum cryptography, IPsec security protocols
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[192] arXiv:2507.09301 [pdf, html, other]
Title: Implementing and Evaluating Post-Quantum DNSSEC in CoreDNS
Julio Gento Suela, Javier Blanco-Romero, Florina Almenares Mendoza, Daniel Díaz-Sánchez
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[193] arXiv:2507.09354 [pdf, html, other]
Title: Backscatter Device-aided Integrated Sensing and Communication: A Pareto Optimization Framework
Yifan Zhang, Yu Bai, Riku Jantti, Zheng Yan, Christos Masouros, Zhu Han
Subjects: Cryptography and Security (cs.CR)
[194] arXiv:2507.09411 [pdf, other]
Title: LLMalMorph: On The Feasibility of Generating Variant Malware using Large-Language-Models
Md Ajwad Akil, Adrian Shuai Li, Imtiaz Karim, Arun Iyengar, Ashish Kundu, Vinny Parla, Elisa Bertino
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[195] arXiv:2507.09453 [pdf, html, other]
Title: SmartphoneDemocracy: Privacy-Preserving E-Voting on Decentralized Infrastructure using Novel European Identity
Michał Jóźwik, Johan Pouwelse
Comments: 18 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[196] arXiv:2507.09508 [pdf, html, other]
Title: A Mixture of Linear Corrections Generates Secure Code
Weichen Yu, Ravi Mangal, Terry Zhuo, Matt Fredrikson, Corina S. Pasareanu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[197] arXiv:2507.09564 [pdf, html, other]
Title: A Login Page Transparency and Visual Similarity Based Zero Day Phishing Defense Protocol
Gaurav Varshney, Akanksha Raj, Divya Sangwan, Sharif Abuadbba, Rina Mishra, Yansong Gao
Subjects: Cryptography and Security (cs.CR)
[198] arXiv:2507.09579 [pdf, html, other]
Title: PromptChain: A Decentralized Web3 Architecture for Managing AI Prompts as Digital Assets
Marc Bara
Comments: 14 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[199] arXiv:2507.09580 [pdf, other]
Title: AICrypto: A Comprehensive Benchmark For Evaluating Cryptography Capabilities of Large Language Models
Yu Wang, Yijian Liu, Liheng Ji, Han Luo, Wenjie Li, Xiaofei Zhou, Chiyun Feng, Puji Wang, Yuhan Cao, Geyuan Zhang, Xiaojian Li, Rongwu Xu, Yilei Chen, Tianxing He
Subjects: Cryptography and Security (cs.CR)
[200] arXiv:2507.09607 [pdf, other]
Title: Efficient Private Inference Based on Helper-Assisted Malicious Security Dishonest Majority MPC
Kaiwen Wang, Xiaolin Chang, Junchao Fan, Yuehan Dong
Subjects: Cryptography and Security (cs.CR)
[201] arXiv:2507.09624 [pdf, html, other]
Title: CAN-Trace Attack: Exploit CAN Messages to Uncover Driving Trajectories
Xiaojie Lin, Baihe Ma, Xu Wang, Guangsheng Yu, Ying He, Wei Ni, Ren Ping Liu
Journal-ref: IEEE Trans. Intell. Transp. Syst., vol. 26, no. 3, pp. 3223-3236, Mar. 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[202] arXiv:2507.09699 [pdf, html, other]
Title: Interpreting Differential Privacy in Terms of Disclosure Risk
Zeki Kazan, Sagar Sharma, Wanrong Zhang, Bo Jiang, Qiang Yan
Comments: 11 pages with 6 pages of supplemental material
Subjects: Cryptography and Security (cs.CR)
[203] arXiv:2507.09762 [pdf, html, other]
Title: EventHunter: Dynamic Clustering and Ranking of Security Events from Hacker Forum Discussions
Yasir Ech-Chammakhy, Anas Motii, Anass Rabii, Jaafar Chbili
Comments: Accepted for publication at the 28th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[204] arXiv:2507.09859 [pdf, html, other]
Title: Endorsement-Driven Blockchain SSI Framework for Dynamic IoT Ecosystems
Guntur Dharma Putra, Bagus Rakadyanto Oktavianto Putra
Comments: 5 pages, 4 figures. Accepted to IEEE ICBC 2025 as a short paper
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[205] arXiv:2507.09860 [pdf, other]
Title: Secure and Efficient UAV-Based Face Detection via Homomorphic Encryption and Edge Computing
Nguyen Van Duc, Bui Duc Manh, Quang-Trung Luu, Dinh Thai Hoang, Van-Linh Nguyen, Diep N. Nguyen
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[206] arXiv:2507.09990 [pdf, html, other]
Title: Differentially Private Federated Low Rank Adaptation Beyond Fixed-Matrix
Ming Wen, Jiaqi Zhu, Yuedong Xu, Yipeng Zhou, Dingding Han
Comments: 23 pages, NeurIPS 2025 under review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[207] arXiv:2507.10016 [pdf, html, other]
Title: The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents
Lixu Wang, Kaixiang Yao, Xinfeng Li, Dong Yang, Haoyang Li, Xiaofeng Wang, Wei Dong
Comments: 22 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[208] arXiv:2507.10162 [pdf, html, other]
Title: HASSLE: A Self-Supervised Learning Enhanced Hijacking Attack on Vertical Federated Learning
Weiyang He, Chip-Hong Chang
Subjects: Cryptography and Security (cs.CR)
[209] arXiv:2507.10267 [pdf, html, other]
Title: DNS Tunneling: Threat Landscape and Improved Detection Solutions
Novruz Amirov, Baran Isik, Bilal Ihsan Tuncer, Serif Bahtiyar
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[210] arXiv:2507.10457 [pdf, html, other]
Title: Logic layer Prompt Control Injection (LPCI): A Novel Security Vulnerability Class in Agentic Systems
Hammad Atta, Ken Huang, Manish Bhatt, Kamal Ahmed, Muhammad Aziz Ul Haq, Yasir Mehmood
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[211] arXiv:2507.10489 [pdf, html, other]
Title: SynthGuard: Redefining Synthetic Data Generation with a Scalable and Privacy-Preserving Workflow Framework
Eduardo Brito, Mahmoud Shoush, Kristian Tamm, Paula Etti, Liina Kamm
Comments: This is the extended version of the paper to appear in the Proceedings of the 1st International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025), held in conjunction with the 20th International Conference on Availability, Reliability and Security (ARES 2025)
Subjects: Cryptography and Security (cs.CR)
[212] arXiv:2507.10491 [pdf, html, other]
Title: BURN: Backdoor Unlearning via Adversarial Boundary Analysis
Yanghao Su, Jie Zhang, Yiming Li, Tianwei Zhang, Qing Guo, Weiming Zhang, Nenghai Yu, Nils Lukas, Wenbo Zhou
Subjects: Cryptography and Security (cs.CR)
[213] arXiv:2507.10578 [pdf, html, other]
Title: When and Where do Data Poisons Attack Textual Inversion?
Jeremy Styborski, Mingzhi Lyu, Jiayou Lu, Nupur Kapur, Adams Kong
Comments: Accepted to ICCV 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[214] arXiv:2507.10592 [pdf, other]
Title: Breaking a 5-Bit Elliptic Curve Key using a 133-Qubit Quantum Computer
Steve Tippeconnic
Comments: 32 pages, 5 figures, real hardware results from IBM Quantum, all code, circuits, and raw data are publicly available for replication
Subjects: Cryptography and Security (cs.CR)
[215] arXiv:2507.10610 [pdf, html, other]
Title: LaSM: Layer-wise Scaling Mechanism for Defending Pop-up Attack on GUI Agents
Zihe Yan, Zhuosheng Zhang
Comments: 10 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[216] arXiv:2507.10621 [pdf, html, other]
Title: Game Theory Meets LLM and Agentic AI: Reimagining Cybersecurity for the Age of Intelligent Threats
Quanyan Zhu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Computer Science and Game Theory (cs.GT)
[217] arXiv:2507.10622 [pdf, html, other]
Title: Spectral Feature Extraction for Robust Network Intrusion Detection Using MFCCs
HyeYoung Lee, Muhammad Nadeem, Pavel Tsoi
Subjects: Cryptography and Security (cs.CR); Disordered Systems and Neural Networks (cond-mat.dis-nn); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[218] arXiv:2507.10627 [pdf, html, other]
Title: Crypto-Assisted Graph Degree Sequence Release under Local Differential Privacy
Xiaojian Zhang, Junqing Wang, Kerui Chen, Peiyuan Zhao, Huiyuan Bai
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[219] arXiv:2507.10730 [pdf, html, other]
Title: Access Control for Information-Theoretically Secure Key-Document Stores
Yin Li, Sharad Mehrota, Shantanu Sharma, Komal Kumari
Comments: An extended abstract of this version has been accepted in VLDB 2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS); Information Retrieval (cs.IR)
[220] arXiv:2507.10733 [pdf, html, other]
Title: 3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
Jianyao Yin, Luca Arnaboldi, Honglong Chen, Pascal Berrang
Comments: 14 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[221] arXiv:2507.10808 [pdf, html, other]
Title: Contrastive-KAN: A Semi-Supervised Intrusion Detection Framework for Cybersecurity with scarce Labeled Data
Mohammad Alikhani, Reza Kazemi
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP); Systems and Control (eess.SY)
[222] arXiv:2507.10819 [pdf, html, other]
Title: Reporte de vulnerabilidades en IIoT. Proyecto DEFENDER
Pedro Almansa Jiménez, Lorenzo Fernández Maimó, Ángel Luis Peráles Gómez
Comments: Language: Spanish
Subjects: Cryptography and Security (cs.CR)
[223] arXiv:2507.10836 [pdf, html, other]
Title: REAL-IoT: Characterizing GNN Intrusion Detection Robustness under Practical Adversarial Attack
Zhonghao Zhan, Huichi Zhou, Hamed Haddadi
Subjects: Cryptography and Security (cs.CR)
[224] arXiv:2507.10845 [pdf, html, other]
Title: BandFuzz: An ML-powered Collaborative Fuzzing Framework
Wenxuan Shi, Hongwei Li, Jiahao Yu, Xinqian Sun, Wenbo Guo, Xinyu Xing
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[225] arXiv:2507.10854 [pdf, html, other]
Title: PhreshPhish: A Real-World, High-Quality, Large-Scale Phishing Website Dataset and Benchmark
Thomas Dalton, Hemanth Gowda, Girish Rao, Sachin Pargi, Alireza Hadj Khodabakhshi, Joseph Rombs, Stephan Jou, Manish Marwah
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[226] arXiv:2507.10873 [pdf, other]
Title: From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection
Danyu Sun, Jinghuai Zhang, Jiacen Xu, Yu Zheng, Yuan Tian, Zhou Li
Subjects: Cryptography and Security (cs.CR)
[227] arXiv:2507.10898 [pdf, html, other]
Title: MalCodeAI: Autonomous Vulnerability Detection and Remediation via Language Agnostic Code Reasoning
Jugal Gajjar, Kamalasankari Subramaniakuppusamy, Noha El Kachach
Comments: 6 pages, 4 figures, accepted for publication in IEEE 26th International Conference on Information Reuse and Integration (IRI 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[228] arXiv:2507.10927 [pdf, html, other]
Title: DVFS: A Dynamic Verifiable Fuzzy Search Service for Encrypted Cloud Data
Jie Zhang, Xiaohong Li, Man Zheng, Zhe Hou, Guangdong Bai, Ruitao Feng
Subjects: Cryptography and Security (cs.CR)
[229] arXiv:2507.11137 [pdf, html, other]
Title: Hashed Watermark as a Filter: Defeating Forging and Overwriting Attacks in Weight-based Neural Network Watermarking
Yuan Yao, Jin Song, Jian Jin
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[230] arXiv:2507.11138 [pdf, html, other]
Title: FacialMotionID: Identifying Users of Mixed Reality Headsets using Abstract Facial Motion Representations
Adriano Castro, Simon Hanisch, Matin Fallahi, Thorsten Strufe
Subjects: Cryptography and Security (cs.CR)
[231] arXiv:2507.11155 [pdf, html, other]
Title: Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities
Yiting Qu, Michael Backes, Yang Zhang
Comments: To Appear in the 34th USENIX Security Symposium, August 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[232] arXiv:2507.11310 [pdf, html, other]
Title: LRCTI: A Large Language Model-Based Framework for Multi-Step Evidence Retrieval and Reasoning in Cyber Threat Intelligence Credibility Verification
Fengxiao Tang, Huan Li, Ming Zhao, Zongzong Wu, Shisong Peng, Tao Yin
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[233] arXiv:2507.11324 [pdf, html, other]
Title: A Review of Privacy Metrics for Privacy-Preserving Synthetic Data Generation
Frederik Marinus Trudslev, Matteo Lissandrini, Juan Manuel Rodriguez, Martin Bøgsted, Daniele Dell'Aglio
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[234] arXiv:2507.11499 [pdf, html, other]
Title: Demo: Secure Edge Server for Network Slicing and Resource Allocation in Open RAN
Adhwaa Alchaab, Ayman Younis, Dario Pompili
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[235] arXiv:2507.11500 [pdf, html, other]
Title: ARMOR: Aligning Secure and Safe Large Language Models via Meticulous Reasoning
Zhengyue Zhao, Yingzi Ma, Somesh Jha, Marco Pavone, Chaowei Xiao
Subjects: Cryptography and Security (cs.CR)
[236] arXiv:2507.11630 [pdf, html, other]
Title: Jailbreak-Tuning: Models Efficiently Learn Jailbreak Susceptibility
Brendan Murphy, Dillon Bowen, Shahrad Mohammadzadeh, Julius Broomfield, Adam Gleave, Kellin Pelrine
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computers and Society (cs.CY)
[237] arXiv:2507.11721 [pdf, html, other]
Title: Evasion Under Blockchain Sanctions
Endong Liu, Mark Ryan, Liyi Zhou, Pascal Berrang
Subjects: Cryptography and Security (cs.CR)
[238] arXiv:2507.11763 [pdf, html, other]
Title: Space Cybersecurity Testbed: Fidelity Framework, Example Implementation, and Characterization
Jose Luis Castanon Remy, Caleb Chang, Ekzhin Ear, Shouhuai Xu
Journal-ref: Workshop on Security of Space and Satellite Systems (SpaceSec) 2025, 24 February 2025, San Diego, CA, USA
Subjects: Cryptography and Security (cs.CR)
[239] arXiv:2507.11772 [pdf, html, other]
Title: How To Mitigate And Defend Against DDoS Attacks In IoT Devices
Ifiyemi Leigha, Basak Comlekcioglu, Maria Pilar Bezanilla
Subjects: Cryptography and Security (cs.CR)
[240] arXiv:2507.11775 [pdf, html, other]
Title: Challenges in GenAI and Authentication: a scoping review
Wesley dos Reis Bezerra, Lais Machado Bezerra, Carlos Becker Westphall
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[241] arXiv:2507.11908 [pdf, html, other]
Title: Unveiling Usability Challenges in Web Privacy Controls
Rahat Masood, Sunday Oyinlola Ogundoyin, Muhammad Ikram, Alex Ye
Subjects: Cryptography and Security (cs.CR)
[242] arXiv:2507.11943 [pdf, html, other]
Title: Effective Fine-Tuning of Vision Transformers with Low-Rank Adaptation for Privacy-Preserving Image Classification
Haiwei Lin, Shoko Imaizumi, Hitoshi Kiya
Comments: 3 pages, 3 figures, conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[243] arXiv:2507.12003 [pdf, html, other]
Title: Expanding ML-Documentation Standards For Better Security
Cara Ellen Appel
Comments: Accepted for publication at the 33rd IEEE International Requirements Engineering Workshop (REW 2025)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[244] arXiv:2507.12050 [pdf, html, other]
Title: IDFace: Face Template Protection for Efficient and Secure Identification
Sunpill Kim, Seunghun Paik, Chanwoo Hwang, Dongsoo Kim, Junbum Shin, Jae Hong Seo
Comments: Accepted to ICCV 2025
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[245] arXiv:2507.12061 [pdf, other]
Title: Toward an Intent-Based and Ontology-Driven Autonomic Security Response in Security Orchestration Automation and Response
Zequan Huang, Jacques Robin, Nicolas Herbaut, Nourhène Ben Rabah, Bénédicte Le Grand
Subjects: Cryptography and Security (cs.CR)
[246] arXiv:2507.12098 [pdf, other]
Title: A Privacy-Preserving Framework for Advertising Personalization Incorporating Federated Learning and Differential Privacy
Xiang Li, Yifan Lin, Yuanzhe Zhang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[247] arXiv:2507.12185 [pdf, other]
Title: Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
Rina Mishra, Gaurav Varshney
Subjects: Cryptography and Security (cs.CR)
[248] arXiv:2507.12345 [pdf, html, other]
Title: Efficient Control Flow Attestation by Speculating on Control Flow Path Representations
Liam Tyler, Adam Caulfield, Ivan De Oliveira Nunes
Subjects: Cryptography and Security (cs.CR)
[249] arXiv:2507.12364 [pdf, html, other]
Title: Rethinking the confidential cloud through a unified low-level abstraction for composable isolation
Adrien Ghosn, Charly Castes, Neelu S. Kalani, Yuchen Qian, Marios Kogias, Edouard Bugnion
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[250] arXiv:2507.12456 [pdf, html, other]
Title: On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
Omri Shmueli, Mark Zhandry
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
Total of 616 entries : 1-100 101-200 151-250 201-300 301-400 401-500 ... 601-616
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack