Skip to main content

Showing 1–7 of 7 results for author: Cruz, J P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.04250  [pdf, ps, other

    cs.CR cs.SE

    An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts

    Authors: Chihiro Kado, Naoto Yanai, Jason Paul Cruz, Kyosuke Yamashita, Shingo Okamura

    Abstract: Vulnerabilities of Ethereum smart contracts often cause serious financial damage. Whereas the Solidity compiler has been updated to prevent vulnerabilities, its effectiveness has not been revealed so far, to the best of our knowledge. In this paper, we shed light on the impact of compiler versions of vulnerabilities of Ethereum smart contracts. To this end, we collected 503,572 contracts with Soli… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

  2. arXiv:2101.02377  [pdf, other

    cs.CR cs.LG cs.SE

    Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts

    Authors: Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Shingo Okamura

    Abstract: Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have been discovered in the past decade. Many security analysis tools have been created to detect such vulnerabilities, but their performance decreases drastically when codes to be analyzed are being rewritten. In this paper, we propose Eth2Vec, a machine-learning-based static analysi… ▽ More

    Submitted 8 January, 2021; v1 submitted 7 January, 2021; originally announced January 2021.

  3. arXiv:2008.13346  [pdf, ps, other

    cs.CR

    APVAS: Reducing Memory Size of AS\_PATH Validation by Using Aggregate Signatures

    Authors: Ouyang Junjie, Naoto Yanai, Tatsuya Takemura, Masayuki Okada, Shingo Okamura, Jason Paul Cruz

    Abstract: The \textit{BGPsec} protocol, which is an extension of the border gateway protocol (BGP), uses digital signatures to guarantee the validity of routing information. However, BGPsec's use of digital signatures in routing information causes a lack of memory in BGP routers and therefore creates a gaping security hole in today's Internet. This problem hinders the practical realization and implementatio… ▽ More

    Submitted 30 August, 2020; originally announced August 2020.

  4. arXiv:2007.01029  [pdf, ps, other

    cs.CR

    Hunting for Re-Entrancy Attacks in Ethereum Smart Contracts via Static Analysis

    Authors: Yuichiro Chinen, Naoto Yanai, Jason Paul Cruz, Shingo Okamura

    Abstract: Ethereum smart contracts are programs that are deployed and executed in a consensus-based blockchain managed by a peer-to-peer network. Several re-entrancy attacks that aim to steal Ether, the cryptocurrency used in Ethereum, stored in deployed smart contracts have been found in the recent years. A countermeasure to such attacks is based on dynamic analysis that executes the smart contracts themse… ▽ More

    Submitted 2 July, 2020; originally announced July 2020.

    Journal ref: IEEE Blockchain 2020

  5. Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation

    Authors: Masahiro Kamimura, Naoto Yanai, Shingo Okamura, Jason Paul Cruz

    Abstract: In the use of a cloud storage, sharing of data with efficient access control is an important requirement in addition to data security and privacy. Cui et al. (IEEE Trans. on Comp. 2016) proposed \textit{key-aggregate searchable encryption (KASE)}, which allows a data owner to issue an \textit{aggregate key} that enables a user to search in an authorized subset of encrypted files by generating an e… ▽ More

    Submitted 29 August, 2019; originally announced August 2019.

    Journal ref: IEEE Access (Volume: 8, Issue:1. 20 January 2020)

  6. MOBIUS: Model-Oblivious Binarized Neural Networks

    Authors: Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka

    Abstract: A privacy-preserving framework in which a computational resource provider receives encrypted data from a client and returns prediction results without decrypting the data, i.e., oblivious neural network or encrypted prediction, has been studied in machine learning that provides prediction services. In this work, we present MOBIUS (Model-Oblivious BInary neUral networkS), a new system that combines… ▽ More

    Submitted 29 November, 2018; originally announced November 2018.

    Journal ref: IEEE Access (Volume: 7, Issue:1. 04 September 2019)

  7. arXiv:1507.05049  [pdf

    math.HO cs.CY

    Computer-assisted independent study in mutivariate calculus

    Authors: L. Descalço, Paula Carvalho, J. P. Cruz, Paula Oliveira, Dina Seabra

    Abstract: Learning mathematics requires students to work in an independent way which is particularly challenging for such an abstract subject. Advancements in technology and, taking the student as the focus of his own learning, led to a change of paradigm in the design and development of educational contents. In this paper we describe the first experience with an interactive feedback and assessment tool (Si… ▽ More

    Submitted 14 July, 2015; originally announced July 2015.

    Comments: 8 pages, EDULEARN15