Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for recent submissions

  • Mon, 25 Aug 2025
  • Fri, 22 Aug 2025
  • Thu, 21 Aug 2025
  • Wed, 20 Aug 2025
  • Tue, 19 Aug 2025

See today's new changes

Total of 128 entries : 1-50 51-100 101-128
Showing up to 50 entries per page: fewer | more | all

Mon, 25 Aug 2025 (showing 21 of 21 entries )

[1] arXiv:2508.16406 [pdf, other]
Title: Retrieval-Augmented Defense: Adaptive and Controllable Jailbreak Prevention for Large Language Models
Guangyu Yang, Jinghong Chen, Jingbiao Mei, Weizhe Lin, Bill Byrne
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[2] arXiv:2508.16405 [pdf, html, other]
Title: Temperature-Resilient Reconfigurable PUF with Dual-Pulse Modulation based on SOT-MRAM Chip
Min Wang, Chuanpeng Jiang, Zhaohao Wang, Zhengyi Hou, Zhongkui Zhang, Yuanfu Zhao, Hongxi Liu, Weisheng Zhao
Subjects: Cryptography and Security (cs.CR); Applied Physics (physics.app-ph)
[3] arXiv:2508.16347 [pdf, html, other]
Title: Confusion is the Final Barrier: Rethinking Jailbreak Evaluation and Investigating the Real Misuse Threat of LLMs
Yu Yan, Sheng Sun, Zhe Wang, Yijun Lin, Zenghao Duan, zhifei zheng, Min Liu, Zhiyi yin, Jianping Zhang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[4] arXiv:2508.16202 [pdf, html, other]
Title: How to Beat Nakamoto in the Race
Shu-Jie Cao, Dongning Guo
Comments: Accepted for presentation at the 2025 ACM Conference on Computer and Communications Security (CCS)
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2508.16189 [pdf, other]
Title: A Relay-Chain-Powered Ciphertext-Policy Attribute-Based Encryption in Intelligent Transportation Systems
Aparna Singh, Geetanjali Rathee, Chaker Abdelaziz Kerrache, Mohamed Chahine Ghanem
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[6] arXiv:2508.16150 [pdf, html, other]
Title: Evaluating the Defense Potential of Machine Unlearning against Membership Inference Attacks
Aristeidis Sidiropoulos, Christos Chrysanthos Nikolaidis, Theodoros Tsiolakis, Nikolaos Pavlidis, Vasilis Perifanis, Pavlos S. Efraimidis
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:2508.16133 [pdf, html, other]
Title: SoK: Understanding the Fundamentals and Implications of Sensor Out-of-band Vulnerabilities
Shilin Xiao, Wenjun Zhu, Yan Jiang, Kai Wang, Peiwang Wang, Chen Yan, Xiaoyu Ji, Wenyuan Xu
Comments: Accepted by NDSS 2026
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:2508.16078 [pdf, html, other]
Title: A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries
Nadeem Ahmed, Lei Zhang, Aryya Gangopadhyay
Comments: To be published in IEEE International Conference on Quantum Computing and Engineering (QCE) 2025
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[9] arXiv:2508.15987 [pdf, html, other]
Title: PickleBall: Secure Deserialization of Pickle-based Machine Learning Models
Andreas D. Kellas, Neophytos Christou, Wenxin Jiang, Penghui Li, Laurent Simon, Yaniv David, Vasileios P. Kemerlis, James C. Davis, Junfeng Yang
Comments: To be published in the proceedings of 2025 ACM CCS
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[10] arXiv:2508.15934 [pdf, html, other]
Title: Strategic Sample Selection for Improved Clean-Label Backdoor Attacks in Text Classification
Onur Alp Kirci, M. Emre Gursoy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[11] arXiv:2508.15917 [pdf, html, other]
Title: Evolving k-Threshold Visual Cryptography Schemes
Xiaoli Zhuo, Xuehu Yan, Lintao Liu, Wei Yan
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:2508.15865 [pdf, html, other]
Title: Securing Swarms: Cross-Domain Adaptation for ROS2-based CPS Anomaly Detection
Julia Boone, Fatemeh Afghah
Comments: Accepted for publication in MILCOM 2025. 6 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[13] arXiv:2508.15850 [pdf, html, other]
Title: Linkage Attacks Expose Identity Risks in Public ECG Data Sharing
Ziyu Wang, Elahe Khatibi, Farshad Firouzi, Sanaz Rahimi Mousavi, Krishnendu Chakrabarty, Amir M. Rahmani
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[14] arXiv:2508.15848 [pdf, html, other]
Title: Self-Disguise Attack: Induce the LLM to disguise itself for AIGT detection evasion
Yinghan Zhou, Juan Wen, Wanli Peng, Zhengxian Wu, Ziwei Zhang, Yiming Xue
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[15] arXiv:2508.15840 [pdf, html, other]
Title: Unveiling Unicode's Unseen Underpinnings in Undermining Authorship Attribution
Robert Dilworth
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[16] arXiv:2508.15839 [pdf, html, other]
Title: CIA+TA Risk Assessment for AI Reasoning Vulnerabilities
Yuksel Aydin
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[17] arXiv:2508.15808 [pdf, html, other]
Title: Uplifted Attackers, Human Defenders: The Cyber Offense-Defense Balance for Trailing-Edge Organizations
Benjamin Murphy, Twm Stone
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[18] arXiv:2508.15778 [pdf, html, other]
Title: Towards Stealthy and Effective Backdoor Attacks on Lane Detection: A Naturalistic Data Poisoning Approach
Yifan Liao, Yuxin Cao, Yedi Zhang, Wentao He, Yan Xiao, Xianglong Du, Zhiyong Huang, Jin Song Dong
Comments: 12 pages,7 figures
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:2508.15776 [pdf, other]
Title: Implementing Zero Trust Architecture to Enhance Security and Resilience in the Pharmaceutical Supply Chain
Saeid Ghasemshirazi, Ghazaleh Shirvani, Marziye Ranjbar Tavakoli, Bahar Ghaedi, Mohammad Amin Langarizadeh
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE)
[20] arXiv:2508.15898 (cross-list from cs.PL) [pdf, html, other]
Title: Automated Formal Verification of a Software Fault Isolation System
Matthew Sotoudeh, Zachary Yedidia
Comments: Short paper to appear at FMCAD 2025, this https URL
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[21] arXiv:2508.15844 (cross-list from cs.GT) [pdf, html, other]
Title: Ransomware Negotiation: Dynamics and Privacy-Preserving Mechanism Design
Haohui Zhang, Sirui Shen, Xinyu Hu, Chenglu Jin
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)

Fri, 22 Aug 2025 (showing 16 of 16 entries )

[22] arXiv:2508.15606 [pdf, html, other]
Title: Towards Scalable and Interpretable Mobile App Risk Analysis via Large Language Models
Yu Yang, Zhenyuan Li, Xiandong Ran, Jiahao Liu, Jiahui Wang, Bo Yu, Shouling Ji
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:2508.15541 [pdf, html, other]
Title: BadFU: Backdoor Federated Learning through Adversarial Machine Unlearning
Bingguang Lu, Hongsheng Hu, Yuantian Miao, Shaleeza Sohail, Chaoxiang He, Shuo Wang, Xiao Chen
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[24] arXiv:2508.15386 [pdf, html, other]
Title: A Practical Guideline and Taxonomy to LLVM's Control Flow Integrity
Sabine Houy, Bruno Kreyssig, Timothee Riom, Alexandre Bartel, Patrick McDaniel
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[25] arXiv:2508.15310 [pdf, other]
Title: IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents
Hengyu An, Jinghuai Zhang, Tianyu Du, Chunyi Zhou, Qingming Li, Tao Lin, Shouling Ji
Comments: EMNLP 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[26] arXiv:2508.15306 [pdf, html, other]
Title: Connected and Exposed: Cybersecurity Risks, Regulatory Gaps, and Public Perception in Internet-Connected Vehicles
Henrietta Hegyi, Laszlo Erdodi
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:2508.15252 [pdf, html, other]
Title: Retrieval-Augmented Review Generation for Poisoning Recommender Systems
Shiyi Yang, Xinshu Li, Guanglin Zhou, Chen Wang, Xiwei Xu, Liming Zhu, Lina Yao
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Information Retrieval (cs.IR)
[28] arXiv:2508.15183 [pdf, html, other]
Title: Private Hyperparameter Tuning with Ex-Post Guarantee
Badih Ghazi, Pritish Kamath, Alexander Knop, Ravi Kumar, Pasin Manurangsi, Chiyuan Zhang
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[29] arXiv:2508.15172 [pdf, html, other]
Title: Conditional Cube Attack on Round-Reduced ASCON
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
Journal-ref: IACR Transactions on Symmetric Cryptology, 2017(1), 175-202
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:2508.15100 [pdf, html, other]
Title: Adaptive Anomaly Detection in Evolving Network Environments
Ehssan Mousavipour, Andrey Dimanchev, Majid Ghaderi
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31] arXiv:2508.15089 [pdf, html, other]
Title: Tighter Privacy Analysis for Truncated Poisson Sampling
Arun Ganesh
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:2508.15042 [pdf, html, other]
Title: When Machine Learning Meets Vulnerability Discovery: Challenges and Lessons Learned
Sima Arasteh, Christophe Hauser
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:2508.15036 [pdf, html, other]
Title: MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs
Ruyi Ding, Tianhong Xu, Xinyi Shen, Aidong Adam Ding, Yunsi Fei
Comments: This paper will appear in CCS 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[34] arXiv:2508.15031 [pdf, html, other]
Title: A Systematic Survey of Model Extraction Attacks and Defenses: State-of-the-Art and Perspectives
Kaixiang Zhao, Lincan Li, Kaize Ding, Neil Zhenqiang Gong, Yue Zhao, Yushun Dong
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[35] arXiv:2508.14925 [pdf, html, other]
Title: MCPTox: A Benchmark for Tool Poisoning Attack on Real-World MCP Servers
Zhiqiang Wang, Yichao Gao, Yanting Wang, Suyuan Liu, Haifeng Sun, Haoran Cheng, Guanquan Shi, Haohua Du, Xiangyang Li
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[36] arXiv:2508.15314 (cross-list from cs.CV) [pdf, html, other]
Title: VideoEraser: Concept Erasure in Text-to-Video Diffusion Models
Naen Xu, Jinghuai Zhang, Changjiang Li, Zhi Chen, Chunyi Zhou, Qingming Li, Tianyu Du, Shouling Ji
Comments: To appear in the 2025 Conference on Empirical Methods in Natural Language Processing (EMNLP)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[37] arXiv:2508.15141 (cross-list from cs.LG) [pdf, html, other]
Title: Towards Reliable and Generalizable Differentially Private Machine Learning (Extended Version)
Wenxuan Bao, Vincent Bindschaedler
Comments: This paper is published at ACSAC 2024. This is the extended version that includes an overview of the relevant literature. We open-source our codebase at: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Thu, 21 Aug 2025 (showing first 13 of 19 entries )

[38] arXiv:2508.14815 [pdf, html, other]
Title: A Lightweight Privacy-Preserving Smart Metering Billing Protocol with Dynamic Tariff Policy Adjustment
Farid Zaredar, Morteza Amini
Comments: 12 pages, 8 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:2508.14796 [pdf, html, other]
Title: A Guide to Stakeholder Analysis for Cybersecurity Researchers
James C Davis, Sophie Chen, Huiyun Peng, Paschal C Amusuo, Kelechi G Kalu
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[40] arXiv:2508.14744 [pdf, html, other]
Title: A Collusion-Resistance Privacy-Preserving Smart Metering Protocol for Operational Utility
Farid Zaredar, Morteza Amini
Comments: 13 pages, 9 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[41] arXiv:2508.14703 [pdf, html, other]
Title: A Lightweight Incentive-Based Privacy-Preserving Smart Metering Protocol for Value-Added Services
Farid Zaredar, Morteza Amini
Comments: 18 Pages, 7 Figures, 6 Tables,
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:2508.14699 [pdf, html, other]
Title: Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection
Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes, Huaming Chen
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[43] arXiv:2508.14568 [pdf, other]
Title: Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell
Wouter Legiest, Jan-Pieter D'Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede
Comments: Published at 34th USENIX Security Symposium (USENIX Security 2025). 2025
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:2508.14530 [pdf, html, other]
Title: DOPA: Stealthy and Generalizable Backdoor Attacks from a Single Client under Challenging Federated Constraints
Xuezheng Qin, Ruwei Huang, Xiaolong Tang, Feng Li
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:2508.14526 [pdf, html, other]
Title: CoFacS -- Simulating a Complete Factory to Study the Security of Interconnected Production
Stefan Lenz, David Schachtschneider, Simon Jonas, Liam Tirpitz, Sandra Geisler, Martin Henze
Comments: Accepted for publication in Proceedings of the 2025 IEEE 50th Conference on Local Computer Networks (LCN)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[46] arXiv:2508.14402 [pdf, html, other]
Title: Precision over Noise: Tailoring S3 Public Access Detection to Reduce False Positives in Cloud Security Platforms
Dikshant, Geetika Verma
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:2508.14300 [pdf, html, other]
Title: MultiFuzz: A Dense Retrieval-based Multi-Agent System for Network Protocol Fuzzing
Youssef Maklad, Fares Wael, Ali Hamdi, Wael Elsersy, Khaled Shaban
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Multiagent Systems (cs.MA); Networking and Internet Architecture (cs.NI)
[48] arXiv:2508.14284 [pdf, html, other]
Title: Differentially Private aggregate hints in mev-share
Jonathan Passerat-Palmbach, Sarisht Wadhwa
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:2508.14261 [pdf, html, other]
Title: SaMOSA: Sandbox for Malware Orchestration and Side-Channel Analysis
Meet Udeshi, Venkata Sai Charan Putrevu, Prashanth Krishnamurthy, Ramesh Karri, Farshad Khorrami
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:2508.14230 [pdf, html, other]
Title: A Taxonomy and Methodology for Proof-of-Location Systems
Eduardo Brito, Fernando Castillo, Liina Kamm, Amnir Hadachi, Ulrich Norbisrath
Comments: This work has been accepted to the 29th International Conference on Enterprise Design, Operations, and Computing (EDOC 2025)
Subjects: Cryptography and Security (cs.CR)
Total of 128 entries : 1-50 51-100 101-128
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack