Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for recent submissions

  • Fri, 4 Jul 2025
  • Thu, 3 Jul 2025
  • Wed, 2 Jul 2025
  • Tue, 1 Jul 2025
  • Mon, 30 Jun 2025

See today's new changes

Total of 139 entries : 1-25 26-50 51-75 76-100 101-125 126-139
Showing up to 25 entries per page: fewer | more | all

Wed, 2 Jul 2025 (showing 23 of 23 entries )

[51] arXiv:2507.00907 [pdf, other]
Title: The Age of Sensorial Zero Trust: Why We Can No Longer Trust Our Senses
Fabio Correa Xavier
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[52] arXiv:2507.00847 [pdf, html, other]
Title: Stealtooth: Breaking Bluetooth Security Abusing Silent Automatic Pairing
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii
Comments: 13 pages, 6 figures. We plan to extend our evaluation to additional device categories. Responsible disclosure completed
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[53] arXiv:2507.00829 [pdf, html, other]
Title: On the Surprising Efficacy of LLMs for Penetration-Testing
Andreas Happe, Jürgen Cito
Subjects: Cryptography and Security (cs.CR)
[54] arXiv:2507.00827 [pdf, other]
Title: A Technique for the Detection of PDF Tampering or Forgery
Gabriel Grobler, Sheunesu Makura, Hein Venter
Comments: 19 Pages, 5 figures, published in Online Proceedings of the South African Institute of Computer Scientists and Information Technologists 2024 Conference, ISSN 2959-8877
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:2507.00740 [pdf, html, other]
Title: Safe Low Bandwidth SPV: A Formal Treatment of Simplified Payment Verification Protocols and Security Bounds
Craig S Wright
Comments: 56 pages 5 images
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Distributed, Parallel, and Cluster Computing (cs.DC)
[56] arXiv:2507.00637 [pdf, html, other]
Title: Integrating Network and Attack Graphs for Service-Centric Impact Analysis
Joni Herttuainen, Vesa Kuikka, Kimmo K. Kaski
Comments: 17 pages, 13 figures, submitted for peer-review
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[57] arXiv:2507.00595 [pdf, html, other]
Title: The Secrets Must Not Flow: Scaling Security Verification to Large Codebases (extended version)
Linard Arquint, Samarth Kishor, Jason R. Koenig, Joey Dodds, Daniel Kroening, Peter Müller
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[58] arXiv:2507.00577 [pdf, html, other]
Title: BadViM: Backdoor Attack against Vision Mamba
Yinghao Wu, Liyan Zhang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[59] arXiv:2507.00522 [pdf, html, other]
Title: Cyber Attacks Detection, Prevention, and Source Localization in Digital Substation Communication using Hybrid Statistical-Deep Learning
Nicola Cibin, Bas Mulder, Herman Carstens, Peter Palensky, Alexandru Ştefanov
Comments: 10 pages, 6 figures. This work has been submitted to the IEEE for possible publication
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[60] arXiv:2507.00423 [pdf, html, other]
Title: Find a Scapegoat: Poisoning Membership Inference Attack and Defense to Federated Learning
Wenjin Mo, Zhiyuan Li, Minghong Fang, Mingwei Fang
Comments: To appear in ICCV 2025
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[61] arXiv:2507.00348 [pdf, html, other]
Title: Addressing malware family concept drift with triplet autoencoder
Numan Halit Guldemir, Oluwafemi Olukoya, Jesús Martínez-del-Rincón
Journal-ref: Proceedings of the Eighteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2024)
Subjects: Cryptography and Security (cs.CR)
[62] arXiv:2507.00189 [pdf, html, other]
Title: Plug. Play. Persist. Inside a Ready-to-Go Havoc C2 Infrastructure
Alessio Di Santo
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[63] arXiv:2507.00145 [pdf, html, other]
Title: AI-Hybrid TRNG: Kernel-Based Deep Learning for Near-Uniform Entropy Harvesting from Physical Noise
Hasan Yiğit
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Emerging Technologies (cs.ET); Information Theory (cs.IT); Signal Processing (eess.SP)
[64] arXiv:2507.00096 [pdf, html, other]
Title: AI-Governed Agent Architecture for Web-Trustworthy Tokenization of Alternative Assets
Ailiya Borjigin, Wei Zhou, Cong He
Comments: 8 Pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[65] arXiv:2507.00841 (cross-list from cs.AI) [pdf, html, other]
Title: SafeMobile: Chain-level Jailbreak Detection and Automated Evaluation for Multimodal Mobile Agents
Siyuan Liang, Tianmeng Fang, Zhe Liu, Aishan Liu, Yan Xiao, Jinyuan He, Ee-Chien Chang, Xiaochun Cao
Comments: 12 pages
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[66] arXiv:2507.00690 (cross-list from cs.CV) [pdf, html, other]
Title: Cage-Based Deformation for Transferable and Undefendable Point Cloud Attack
Keke Tang, Ziyong Du, Weilong Peng, Xiaofei Wang, Peican Zhu, Ligang Liu, Zhihong Tian
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[67] arXiv:2507.00596 (cross-list from cs.HC) [pdf, html, other]
Title: Gaze3P: Gaze-Based Prediction of User-Perceived Privacy
Mayar Elfares, Pascal Reisert, Ralf Küsters, Andreas Bulling
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[68] arXiv:2507.00367 (cross-list from cs.AR) [pdf, html, other]
Title: Presto: Hardware Acceleration of Ciphers for Hybrid Homomorphic Encryption
Yeonsoo Jeon, Mattan Erez, Michael Orshansky
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[69] arXiv:2507.00299 (cross-list from cs.HC) [pdf, html, other]
Title: When Kids Mode Isn't For Kids: Investigating TikTok's "Under 13 Experience"
Olivia Figueira, Pranathi Chamarthi, Tu Le, Athina Markopoulou
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[70] arXiv:2507.00230 (cross-list from cs.LG) [pdf, html, other]
Title: PPFL-RDSN: Privacy-Preserving Federated Learning-based Residual Dense Spatial Networks for Encrypted Lossy Image Reconstruction
Peilin He, James Joshi
Comments: This paper is under review; do not distribute
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[71] arXiv:2507.00095 (cross-list from quant-ph) [pdf, html, other]
Title: Authentication of Continuous-Variable Quantum Messages
Mehmet Hüseyin Temel, Boris Škorić
Comments: 15 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[72] arXiv:2507.00015 (cross-list from cs.LG) [pdf, html, other]
Title: Vision Transformer with Adversarial Indicator Token against Adversarial Attacks in Radio Signal Classifications
Lu Zhang, Sangarapillai Lambotharan, Gan Zheng, Guisheng Liao, Xuekang Liu, Fabio Roli, Carsten Maple
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[73] arXiv:2507.00003 (cross-list from cs.LG) [pdf, other]
Title: Deciding When Not to Decide: Indeterminacy-Aware Intrusion Detection with NeutroSENSE
Eyhab Al-Masri
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)

Tue, 1 Jul 2025 (showing first 2 of 52 entries )

[74] arXiv:2506.24056 [pdf, html, other]
Title: Logit-Gap Steering: Efficient Short-Suffix Jailbreaks for Aligned Large Language Models
Tung-Ling Li, Hongliang Liu
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[75] arXiv:2506.24033 [pdf, html, other]
Title: Poisoning Attacks to Local Differential Privacy for Ranking Estimation
Pei Zhan (1, 2 and 3), Peng Tang (1, 2 and 3), Yangzhuo Li (1 and 3), Puwen Wei (1 and 3), Shanqing Guo (1 and 3) ((1) School of Cyber Science and Technology, Shandong University, (2) Quan Cheng Laboratory, Jinan, China, (3) State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China)
Comments: This paper, consisting of 24 pages with 31 figures and 1 table, has been accepted by ACM CCS 2025
Subjects: Cryptography and Security (cs.CR)
Total of 139 entries : 1-25 26-50 51-75 76-100 101-125 126-139
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack