We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 130 entries: 1-130 ]
[ showing 130 entries per page: fewer | more ]

Mon, 6 May 2024

[1]  arXiv:2405.02238 [pdf, other]
Title: Secure and Efficient General Matrix Multiplication On Cloud Using Homomorphic Encryption
Comments: 10 pages, 7 figures. 4 tables
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2405.02147 [pdf, other]
Title: Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network
Comments: 16 pages, 7 figures, to appear at ACM CCS 2024
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2405.02106 [pdf, ps, other]
Title: Got Root? A Linux Priv-Esc Benchmark
Comments: arXiv admin note: text overlap with arXiv:2310.11409
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2405.02070 [pdf, other]
Title: Strategies for Intrusion Monitoring in Cloud Services
Comments: 5 pages
Journal-ref: Proc of the 8th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2017), Athens, Greece, February 2017, pp. 49-53, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[5]  arXiv:2405.02043 [pdf, ps, other]
Title: On human-centred security: A new systems model based on modes and mode transitions
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[6]  arXiv:2405.01963 [pdf, other]
Title: From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[7]  arXiv:2405.01888 [pdf, other]
Title: Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2405.01867 [pdf, ps, other]
Title: Cyber Security in Energy Informatics: A Non-technical Perspective
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2405.01819 [pdf, other]
Title: Sequencer Level Security
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[10]  arXiv:2405.01809 [pdf, ps, other]
Title: A Logic of Sattestation
Comments: 18 pages. Extended version (including proofs) of paper to appear in CSF'24
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[11]  arXiv:2405.01741 [pdf, other]
Title: PVF (Parameter Vulnerability Factor): A Quantitative Metric Measuring AI Vulnerability and Resilience Against Parameter Corruptions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[12]  arXiv:2405.01728 [pdf, other]
Title: Explainability Guided Adversarial Evasion Attacks on Malware Detectors
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2405.01716 [pdf, other]
Title: ATTAXONOMY: Unpacking Differential Privacy Guarantees Against Practical Adversaries
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[14]  arXiv:2405.01693 [pdf, other]
Title: Adversarial Attacks on Reinforcement Learning Agents for Command and Control
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2405.01674 [pdf, ps, other]
Title: Generative AI in Cybersecurity
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2405.01668 [pdf, other]
Title: WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[17]  arXiv:2405.01934 (cross-list from cs.CV) [pdf, other]
Title: Impact of Architectural Modifications on Deep Learning Adversarial Robustness
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2405.01852 (cross-list from cs.DC) [pdf, ps, other]
Title: Tokenization of Real Estate Assets Using Blockchain
Journal-ref: IJIIT vol.18, no.3 2022: pp.1-12.
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[19]  arXiv:2405.01844 (cross-list from cs.NI) [pdf, other]
Title: A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[20]  arXiv:2405.01795 (cross-list from cs.HC) [pdf, ps, other]
Title: The Role of Human Factors in the LastPass Breach
Authors: Niroop Sugunaraj
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)

Fri, 3 May 2024

[21]  arXiv:2405.01509 [pdf, other]
Title: Learnable Linguistic Watermarks for Tracing Model Extraction Attacks on Large Language Models
Comments: not decided
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[22]  arXiv:2405.01460 [pdf, other]
Title: Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders
Comments: Accepted by ICML 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[23]  arXiv:2405.01459 [pdf, other]
Title: Unconditionally Safe Light Client
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2405.01446 [pdf, other]
Title: An Exploratory Case Study on Data Breach Journalism
Comments: Submitted
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[25]  arXiv:2405.01412 [pdf, other]
Title: Applying Transparent Shaping for Zero Trust Architecture Implementation in AWS: A Case Study
Comments: 8 pages, 2 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[26]  arXiv:2405.01411 [pdf, other]
Title: IDPFilter: Mitigating Interdependent Privacy Issues in Third-Party Apps
Comments: 36 pages 12 figures
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2405.01329 [pdf, other]
Title: Decentralization of Ethereum's Builder Market
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2405.01289 [pdf, other]
Title: Measuring the Exploitation of Weaknesses in the Wild
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2405.01144 [pdf, other]
Title: Boosting Communication Efficiency of Federated Learning's Secure Aggregation
Comments: 2 pages, 4 figures, The 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2405.01118 [pdf, other]
Title: A Survey of the Overlooked Dangers of Template Engines
Comments: 29 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2405.01111 [pdf, other]
Title: Mining REST APIs for Potential Mass Assignment Vulnerabilities
Comments: EASE 2024
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2405.01080 [pdf, other]
Title: KDPrint: Passive Authentication using Keystroke Dynamics-to-Image Encoding via Standardization
Comments: 12 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2405.01046 [pdf, ps, other]
Title: Development of Cybersecurity Simulator-Based Platform for the Protection of Critical Infrastructures
Comments: This manuscript was accepted for the Technology Research, Education, and Opinion (TREO) Forum at the 32nd European Conference on Information Systems (ECIS 2024) in Paphos, Cyprus
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2405.01030 [pdf, ps, other]
Title: Towards Trust Proof for Secure Confidential Virtual Machines
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[35]  arXiv:2405.00865 [pdf, other]
Title: Hiding Sensitive Information Using PDF Steganography
Authors: Ryan Klemm, Bo Chen
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2405.00844 [pdf, other]
Title: A Blockchain-Based Audit Mechanism for Trust and Integrity in IoT-Fog Environments
Comments: 14 pages, 10 figures TSC-2024-05-0329 submitted
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2405.00793 [pdf, ps, other]
Title: The Impact of IMSI Catcher Deployments on Cellular Network Security: Challenges and Countermeasures in 4G and 5G Networks
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2405.00742 [pdf, other]
Title: Federated Graph Learning for EV Charging Demand Forecasting with Personalization Against Cyberattacks
Comments: 11 pages,4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[39]  arXiv:2405.01495 (cross-list from cs.IT) [pdf, other]
Title: Error Correction Capabilities of Non-Linear Cryptographic Hash Functions
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[40]  arXiv:2405.01494 (cross-list from cs.CV) [pdf, other]
Title: Navigating Heterogeneity and Privacy in One-Shot Federated Learning with Diffusion Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41]  arXiv:2405.01349 (cross-list from cs.LG) [pdf, other]
Title: Position Paper: Beyond Robustness Against Single Attack Types
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[42]  arXiv:2405.01324 (cross-list from cs.NI) [pdf, other]
Title: A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[43]  arXiv:2405.01312 (cross-list from cs.DB) [pdf, other]
Title: Privacy-Enhanced Database Synthesis for Benchmark Publishing
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[44]  arXiv:2405.01229 (cross-list from cs.LG) [pdf, ps, other]
Title: Boosting Jailbreak Attack with Momentum
Comments: ICLR 2024 Workshop on Reliable and Responsible Foundation Models
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[45]  arXiv:2405.01207 (cross-list from cs.LG) [pdf, ps, other]
Title: Improving Membership Inference in ASR Model Auditing with Perturbed Loss Features
Comments: Trustworthy Speech Processing, Satellite Workshop at ICASSP 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[46]  arXiv:2405.01202 (cross-list from cs.SE) [pdf, other]
Title: DLAP: A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection
Comments: 15 pages, 8 figures
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[47]  arXiv:2405.01103 (cross-list from cs.SE) [pdf, other]
Title: LLM Security Guard for Code
Comments: SECUTE, EASE 2024
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[48]  arXiv:2405.01073 (cross-list from cs.LG) [pdf, other]
Title: Poisoning Attacks on Federated Learning for Autonomous Driving
Comments: Accepted to SCAI2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[49]  arXiv:2405.01031 (cross-list from cs.LG) [pdf, other]
Title: The Privacy Power of Correlated Noise in Decentralized Learning
Comments: Accepted as conference paper at ICML 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Optimization and Control (math.OC); Machine Learning (stat.ML)
[50]  arXiv:2405.00955 (cross-list from cs.LG) [pdf, other]
Title: Recovering Labels from Local Updates in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[51]  arXiv:2405.00725 (cross-list from eess.SP) [pdf, other]
Title: Federated Learning and Differential Privacy Techniques on Multi-hospital Population-scale Electrocardiogram Data
Comments: Accepted for ICMHI 2024
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[52]  arXiv:2405.00522 (cross-list from econ.GN) [pdf, other]
Title: DAM: A Universal Dual Attention Mechanism for Multimodal Timeseries Cryptocurrency Trend Forecasting
Subjects: General Economics (econ.GN); Computational Engineering, Finance, and Science (cs.CE); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computational Finance (q-fin.CP)

Thu, 2 May 2024

[53]  arXiv:2405.00596 [pdf, other]
Title: Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2405.00531 [pdf, other]
Title: Byzantine-Secure Relying Party for Resilient RPKI
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2405.00526 [pdf, other]
Title: JNI Global References Are Still Vulnerable: Attacks and Defenses
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2405.00482 [pdf, other]
Title: PackVFL: Efficient HE Packing for Vertical Federated Learning
Comments: 12 pages excluding references
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[57]  arXiv:2405.00441 [pdf, other]
Title: Modeling Linear and Non-linear Layers: An MILP Approach Towards Finding Differential and Impossible Differential Propagations
Comments: 42 pages, 2 figures, 21 tables, 7 algorithms
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2405.00426 [pdf, other]
Title: On the Potential of Re-configurable Intelligent Surface (RIS)-assisted Physical Layer Authentication (PLA)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Signal Processing (eess.SP)
[59]  arXiv:2405.00418 [pdf, other]
Title: Detection of ransomware attacks using federated learning based on the CNN model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[60]  arXiv:2405.00395 [pdf, other]
Title: Trust Driven On-Demand Scheme for Client Deployment in Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[61]  arXiv:2405.00393 [pdf, other]
Title: Inferring State Machine from the Protocol Implementation via Large Langeuage Model
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2405.00392 [pdf, other]
Title: Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[63]  arXiv:2405.00329 [pdf, ps, other]
Title: Metric geometry of the privacy-utility tradeoff
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Probability (math.PR)
[64]  arXiv:2405.00308 [pdf, ps, other]
Title: FPGA Digital Dice using Pseudo Random Number Generator
Comments: 15 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[65]  arXiv:2405.00298 [pdf, other]
Title: The Reversing Machine: Reconstructing Memory Assumptions
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2405.00267 [pdf, other]
Title: Differentially Private Release of Israel's National Registry of Live Births
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Data Structures and Algorithms (cs.DS)
[67]  arXiv:2405.00218 [pdf, other]
Title: Constrained Decoding for Secure Code Generation
Comments: 17 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Software Engineering (cs.SE)
[68]  arXiv:2405.00138 [pdf, other]
Title: Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2405.00078 [pdf, other]
Title: Mitigating Spectre-PHT using Speculation Barriers in Linux BPF
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[70]  arXiv:2405.00066 [pdf, other]
Title: Research and application of artificial intelligence based webshell detection model: A literature review
Comments: 21 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[71]  arXiv:2405.00663 (cross-list from quant-ph) [pdf, other]
Title: Quantum cryptographic protocols with dual messaging system via 2D alternate quantum walks and genuine single particle entangled states
Comments: 11 pages (including supplementary material), 2 figures and 1 table
Subjects: Quantum Physics (quant-ph); Disordered Systems and Neural Networks (cond-mat.dis-nn); Cryptography and Security (cs.CR); Quantum Algebra (math.QA); Optics (physics.optics)
[72]  arXiv:2405.00610 (cross-list from math.GR) [pdf, ps, other]
Title: Growth in products of matrices: fastest, average, and generic
Comments: 10 pages. Comments are welcome
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR); Combinatorics (math.CO); Dynamical Systems (math.DS); Probability (math.PR)
[73]  arXiv:2405.00466 (cross-list from cs.CV) [pdf, other]
Title: Lazy Layers to Make Fine-Tuned Diffusion Models More Traceable
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[74]  arXiv:2405.00009 (cross-list from cs.DC) [pdf, other]
Title: Service Level Agreements and Security SLA: A Comprehensive Survey
Comments: 25 pages, 5 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)

Wed, 1 May 2024

[75]  arXiv:2404.19744 [pdf, other]
Title: PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[76]  arXiv:2404.19715 [pdf, other]
Title: Assessing LLMs in Malicious Code Deobfuscation of Real-world Malware Campaigns
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2404.19677 [pdf, ps, other]
Title: A Comprehensive Analysis of Pegasus Spyware and Its Implications for Digital Privacy and Security
Authors: Karwan Kareem
Comments: 13 Pages
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2404.19480 [pdf, other]
Title: Mitigating and Analysis of Memory Usage Attack in IoE System
Journal-ref: Industrial Networks and Intelligent Systems,2023
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2404.19434 [pdf, other]
Title: Detection of Energy Consumption Cyber Attacks on Smart Devices
Journal-ref: Springer Nature Switzerland,2023
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2404.19418 [pdf, other]
Title: Energy Cyber Attacks to Smart Healthcare Devices: A Testbed
Journal-ref: Bio-inspired Information and Communications Technologies, 2023
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2404.19246 [pdf, ps, other]
Title: Logistic Map Pseudo Random Number Generator in FPGA
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[82]  arXiv:2404.19121 [pdf, ps, other]
Title: Characterising Payload Entropy in Packet Flows
Comments: 14 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2404.19114 [pdf, other]
Title: Enhancing IoT Security: A Novel Feature Engineering Approach for ML-Based Intrusion Detection Systems
Comments: This paper has been accepted by DCOSS-IoT 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[84]  arXiv:2404.19064 [pdf, other]
Title: Zero Knowledge Proof for Multiple Sequence Alignment
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2404.19754 (cross-list from quant-ph) [pdf, other]
Title: Succinct arguments for QMA from standard assumptions via compiled nonlocal games
Comments: 57 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[86]  arXiv:2404.19631 (cross-list from cs.LG) [pdf, other]
Title: On Training a Neural Network to Explain Binaries
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[87]  arXiv:2404.19597 (cross-list from cs.CL) [pdf, other]
Title: Transferring Troubles: Cross-Lingual Transferability of Backdoor Attacks in LLMs with Instruction Tuning
Comments: work in progress
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[88]  arXiv:2404.19582 (cross-list from cs.LG) [pdf, other]
Title: Leveraging Label Information for Stealthy Data Stealing in Vertical Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[89]  arXiv:2404.19548 (cross-list from cs.ET) [pdf, ps, other]
Title: An Extensive Survey of Digital Image Steganography: State of the Art
Subjects: Emerging Technologies (cs.ET); Cryptography and Security (cs.CR)
[90]  arXiv:2404.19460 (cross-list from cs.LG) [pdf, other]
Title: AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples
Comments: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[91]  arXiv:2404.19420 (cross-list from cs.LG) [pdf, other]
Title: Let's Focus: Focused Backdoor Attack against Federated Transfer Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[92]  arXiv:2404.19307 (cross-list from cs.SE) [pdf, other]
Title: Enhancing GUI Exploration Coverage of Android Apps with Deep Link-Integrated Monkey
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[93]  arXiv:2404.19227 (cross-list from cs.CV) [pdf, other]
Title: Espresso: Robust Concept Filtering in Text-to-Image Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[94]  arXiv:2404.19186 (cross-list from cs.IT) [pdf, ps, other]
Title: The Mathematical Foundation of Post-Quantum Cryptography
Authors: Chuanming Zong
Comments: 23 pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Metric Geometry (math.MG); Number Theory (math.NT)
[95]  arXiv:2404.19025 (cross-list from cs.SE) [pdf, ps, other]
Title: Unsupervised Binary Code Translation with Application to Code Similarity Detection and Vulnerability Discovery
Comments: conference
Journal-ref: The 2023 Conference on Empirical Methods in Natural Language Processing. 2023
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)

Tue, 30 Apr 2024

[96]  arXiv:2404.18817 [pdf, ps, other]
Title: Hiding from Facebook: An Encryption Protocol resistant to Correlation Attacks
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[97]  arXiv:2404.18816 [pdf, other]
Title: AppPoet: Large Language Model based Android malware detection via multi-view prompt engineering
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[98]  arXiv:2404.18814 [pdf, ps, other]
Title: Belt and Brace: When Federated Learning Meets Differential Privacy
Comments: 10 pages, 4 figures, accepted by and to appear in Communications of the ACM (CACM)
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2404.18694 [pdf, other]
Title: Beyond Gaze Points: Augmenting Eye Movement with Brainwave Data for Multimodal User Authentication in Extended Reality
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2404.18567 [pdf, other]
Title: Assessing Cybersecurity Vulnerabilities in Code Large Language Models
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2404.18541 [pdf, other]
Title: Machine Learning for Windows Malware Detection and Classification: Methods, Challenges and Ongoing Research
Authors: Daniel Gibert
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[102]  arXiv:2404.18453 [pdf, other]
Title: Fostering Trust in Smart Inverters: A Framework for Firmware Update Management and Tracking in VPP Context
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[103]  arXiv:2404.18407 [pdf, other]
Title: ICMarks: A Robust Watermarking Framework for Integrated Circuit Physical Design IP Protection
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[104]  arXiv:2404.18396 [pdf, other]
Title: DRAM-Profiler: An Experimental DRAM RowHammer Vulnerability Profiling Mechanism
Comments: 6 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[105]  arXiv:2404.18388 [pdf, other]
Title: SPECIAL: Synopsis Assisted Secure Collaborative Analytics
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[106]  arXiv:2404.18365 [pdf, other]
Title: "What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2404.18353 [pdf, other]
Title: Do Neutral Prompts Produce Insecure Code? FormAI-v2 Dataset: Labelling Vulnerabilities in Code Generated by Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Programming Languages (cs.PL)
[108]  arXiv:2404.18350 [pdf, other]
Title: L-DIT: A dApp for Live Detectability, Identifiability and Trackability for ASOs on the Behavioral Dynamics Blockchain
Subjects: Cryptography and Security (cs.CR); Instrumentation and Methods for Astrophysics (astro-ph.IM)
[109]  arXiv:2404.18328 [pdf, ps, other]
Title: Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[110]  arXiv:2404.18308 [pdf, ps, other]
Title: Near-Term Enforcement of AI Chip Export Controls Using A Minimal Firmware-Based Design for Offline Licensing
Authors: James Petrie
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[111]  arXiv:2404.18251 [pdf, other]
Title: Machine Learning for Blockchain Data Analysis: Progress and Opportunities
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2404.18090 [pdf, other]
Title: A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2404.18082 [pdf, ps, other]
Title: Cyber Security in Containerization Platforms: A Comparative Study of Security Challenges, Measures and Best Practices
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2404.17989 [pdf, other]
Title: InfoSec.pptx: A Longitudinal Study of Speakers, Topics, and Sponsors at Security Conferences in Academia and Industry
Comments: Code and data can be found in the repository: this https URL
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[115]  arXiv:2404.17984 [pdf, other]
Title: Privacy-Preserving, Dropout-Resilient Aggregation in Decentralized Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116]  arXiv:2404.17970 [pdf, other]
Title: Privacy-Preserving Aggregation for Decentralized Learning with Byzantine-Robustness
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2404.17960 [pdf, other]
Title: PhishGuard: A Convolutional Neural Network Based Model for Detecting Phishing URLs with Explainability Analysis
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[118]  arXiv:2404.17864 [pdf, ps, other]
Title: Solvent: liquidity verification of smart contracts
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[119]  arXiv:2404.17839 [pdf, other]
Title: Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection
Journal-ref: 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE '24)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[120]  arXiv:2404.17787 [pdf, ps, other]
Title: Quantum resistant multi-signature scheme with optimal communication round: A Blockchain-based approach
Comments: This article has 18 pages, 6 figures, and 4 tables
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[121]  arXiv:2404.17617 [pdf, other]
Title: Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning
Journal-ref: Proceedings of the AAAI Conference on Artificial Intelligence. 2024, 38(19): 21359-21367
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[122]  arXiv:2404.18887 (cross-list from cs.SE) [pdf, other]
Title: PrescientFuzz: A more effective exploration approach for grey-box fuzzing
Comments: 20 pages, 12 figures
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[123]  arXiv:2404.18534 (cross-list from cs.CL) [pdf, other]
Title: Evaluating and Mitigating Linguistic Discrimination in Large Language Models
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[124]  arXiv:2404.18502 (cross-list from quant-ph) [pdf, other]
Title: Towards Classical Software Verification using Quantum Computers
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[125]  arXiv:2404.18191 (cross-list from cs.CL) [pdf, other]
Title: Exploring the Robustness of In-Context Learning with Noisy Labels
Comments: ICLR 2024 Workshop on Reliable and Responsible Foundation Models
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Optimization and Control (math.OC)
[126]  arXiv:2404.17947 (cross-list from cs.LG) [pdf, other]
Title: Bounding the Expected Robustness of Graph Neural Networks Subject to Node Feature Attacks
Comments: Accepted at ICLR 2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[127]  arXiv:2404.17721 (cross-list from cs.SD) [pdf, ps, other]
Title: An RFP dataset for Real, Fake, and Partially fake audio detection
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[128]  arXiv:2404.17714 (cross-list from cs.DS) [pdf, other]
Title: Lower Bounds for Private Estimation of Gaussian Covariance Matrices under All Reasonable Parameter Regimes
Comments: 27 pages, preprint
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[129]  arXiv:2404.17674 (cross-list from cs.LG) [pdf, other]
Title: Center-Based Relaxed Learning Against Membership Inference Attacks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[130]  arXiv:2404.17227 (cross-list from econ.GN) [pdf, other]
Title: Trust Dynamics and Market Behavior in Cryptocurrency: A Comparative Study of Centralized and Decentralized Exchanges
Subjects: General Economics (econ.GN); Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Risk Management (q-fin.RM)
[ total of 130 entries: 1-130 ]
[ showing 130 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)