We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2021, skipping first 80

[ total of 338 entries: 1-50 | 31-80 | 81-130 | 131-180 | 181-230 | 231-280 | ... | 331-338 ]
[ showing 50 entries per page: fewer | more | all ]
[81]  arXiv:2111.05190 [pdf, other]
Title: QUDOS: Quorum-Based Cloud-Edge Distributed DNNs for Security Enhanced Industry 4.0
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2111.05224 [pdf, other]
Title: Next2You: Robust Copresence Detection Based on Channel State Information
Comments: Added correct metadata from ACM Transactions on Internet of Things. Code and data are available at this https URL
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2111.05238 [pdf, other]
Title: Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2111.05259 [pdf, ps, other]
Title: Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[85]  arXiv:2111.05313 [pdf, other]
Title: Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
Authors: Patrick Leu (1), Giovanni Camurati (1), Alexander Heinrich (2), Marc Roeschlin (1), Claudio Anliker (1), Matthias Hollick (2), Srdjan Capkun (1), Jiska Classen (2) ((1) ETH Zurich, (2) TU Darmstadt)
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2111.05459 [pdf, other]
Title: Intrinsic PUF Instance on Non-Volatile NAND Flash Memory
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[87]  arXiv:2111.05523 [pdf, ps, other]
Title: Anonymous communication system provides a secure environment without leaking metadata, which has many application scenarios in IoT
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2111.05628 [pdf, ps, other]
Title: Machine Learning Models Disclosure from Trusted Research Environments (TRE), Challenges and Opportunities
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[89]  arXiv:2111.05764 [pdf, other]
Title: A framework for comprehensible multi-modal detection of cyber threats
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[90]  arXiv:2111.05770 [pdf, ps, other]
Title: Symbolic Security Predicates: Hunt Program Weaknesses
Journal-ref: 2021 Ivannikov ISPRAS Open Conference (ISPRAS), IEEE, 2021, pp. 76-85
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[91]  arXiv:2111.05781 [pdf, ps, other]
Title: MAJORCA: Multi-Architecture JOP and ROP Chain Assembler
Journal-ref: 2021 Ivannikov ISPRAS Open Conference (ISPRAS), IEEE, 2021, pp. 37-46
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[92]  arXiv:2111.05791 [pdf, other]
Title: Distribution-Invariant Differential Privacy
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Methodology (stat.ME)
[93]  arXiv:2111.05806 [pdf, other]
Title: On the efficiency of a general attack against the MOBS cryptosystem
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2111.05993 [pdf, ps, other]
Title: Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[95]  arXiv:2111.06002 [pdf, other]
Title: SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel
Comments: 17 pages, 9 figures; accepted to USENIX Security 2022
Journal-ref: 31st USENIX Security Symposium (USENIX Security 2022)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[96]  arXiv:2111.06102 [pdf, other]
Title: The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers
Journal-ref: IEEE Transactions on Quantum Engineering, vol. 3, pp. 1-21, 2022
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[97]  arXiv:2111.06158 [pdf, other]
Title: An End-to-End Authentication Mechanism for Wireless Body Area Networks
Journal-ref: Smart Health, 2023
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2111.06290 [pdf, other]
Title: Fairness, Integrity, and Privacy in a Scalable Blockchain-based Federated Learning System
Comments: This is the accepted version of a paper that will be published in the Special Issue "Federated Learning and Blockchain Supported Smart Networking in Beyond 5G (B5G) Wireless Communication" in Computer Networks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[99]  arXiv:2111.06544 [pdf, other]
Title: A lightweight blockchain-based access control scheme for integrated edge computing in the internet of things
Comments: 35 pages with 8 figures and 5 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[100]  arXiv:2111.06833 [pdf, other]
Title: Frequency Estimation in the Shuffle Model with Almost a Single Message
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2111.06867 [pdf, other]
Title: Flatee: Federated Learning Across Trusted Execution Environments
Comments: IEEE Euro S&P 2021 Poster; see this https URL
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2111.07005 [pdf, other]
Title: Understanding and Assessment of Mission-Centric Key Cyber Terrains for joint Military Operations
Comments: Preprint of an extended version of the conference "A novel automatic discovery system of critical assets in cyberspace-oriented military missions", in Proc. of the First Workshop on Recent Advances in Cyber Situational Awareness on Military Operations (CSA 2020) held by the 15th ARES International Conference in August 2020. this https URL
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:2111.07060 [pdf, other]
Title: PAMMELA: Policy Administration Methodology using Machine Learning
Comments: This work is under progress
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[104]  arXiv:2111.07062 [pdf, other]
Title: UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction
Comments: Published in 2021 International Conference On Computer-Aided Design (ICCAD)
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2111.07070 [pdf, ps, other]
Title: Sensitivity-Based Optimization for Blockchain Selfish Mining
Comments: 15 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO); Optimization and Control (math.OC); Probability (math.PR)
[106]  arXiv:2111.07093 [pdf, other]
Title: AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2111.07153 [pdf, other]
Title: Categorizing Service Worker Attacks and Mitigations
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2111.07201 [pdf, other]
Title: Evaluating the effectiveness of Phishing Reports on Twitter
Comments: This paper has been accepted at the 2021 APWG Symposium on Electronic Crime Research (eCrime). The camera ready version of this work was presented and will be published at this conference ( December 1st to 3rd, 2021)
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Social and Information Networks (cs.SI)
[109]  arXiv:2111.07608 [pdf, other]
Title: Property Inference Attacks Against GANs
Comments: To Appear in NDSS 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[110]  arXiv:2111.07805 [pdf, other]
Title: Resilience of IOTA Consensus
Authors: Hamed Mamache (SU), Gabin Mazué (SU), Osama Rashid (SU), Gewu Bu (LIMOS), Maria Potop-Butucaru (SU, LINCS)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[111]  arXiv:2111.07847 [pdf, other]
Title: Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
Comments: To be published in Proceedings of the 2021 Annual Computer Security Applications Conference (ACSAC '21)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[112]  arXiv:2111.07850 [pdf, other]
Title: Colored Noise Mechanism for Differentially Private Clustering
Comments: 5 pages, 3 figures, preprint
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[113]  arXiv:2111.07860 [pdf, other]
Title: Tracking in apps' privacy policies
Authors: Konrad Kollnig
Comments: Technical report from August 2019. Last revised in November 2021
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[114]  arXiv:2111.08146 [pdf, other]
Title: A note on averaging prediction accuracy, Green's functions and other kernels
Subjects: Cryptography and Security (cs.CR); Analysis of PDEs (math.AP); Classical Analysis and ODEs (math.CA)
[115]  arXiv:2111.08217 [pdf, other]
Title: NatiDroid: Cross-Language Android Permission Specification
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2111.08223 [pdf, other]
Title: A Survey on Adversarial Attacks for Malware Analysis
Comments: 48 Pages, 31 Figures, 11 Tables
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:2111.08404 [pdf, other]
Title: Practical Timing Side Channel Attacks on Memory Compression
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2111.08429 [pdf, other]
Title: An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[119]  arXiv:2111.08440 [pdf, other]
Title: On the Importance of Difficulty Calibration in Membership Inference Attacks
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[120]  arXiv:2111.08455 [pdf, ps, other]
Title: Integrating On-chain and Off-chain Governance for Supply Chain Transparency and Integrity
Comments: The 5th Symposium on Distributed Ledger Technology
Journal-ref: Proc. 5th Symp. Distributed Ledger Technology, Brisbane, Australia, 23 Nov 2021
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2111.08553 [pdf, other]
Title: Remote Memory-Deduplication Attacks
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2111.08662 [pdf, other]
Title: RemoteVote and SAFE Vote: Towards Usable End-to-End Verification for Vote-by-Mail
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2111.08665 [pdf, ps, other]
Title: Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2111.08784 [pdf, other]
Title: Improved Pan-Private Stream Density Estimation
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Data Structures and Algorithms (cs.DS)
[125]  arXiv:2111.08822 [pdf, other]
Title: BBS: A Blockchain Big-Data Sharing System
Comments: arXiv admin note: substantial text overlap with arXiv:2109.07626
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2111.08842 [pdf, other]
Title: Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE
Authors: Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol Fung, Moti Yung, Danfeng (Daphne)Yao
Comments: \{copyright} 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
Journal-ref: IEEE Computer 2021
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[127]  arXiv:2111.08893 [pdf, other]
Title: Understanding Security Issues in the NFT Ecosystem
Journal-ref: ACM Conference on Computer and Communications Security (CCS), 2022
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2111.09227 [pdf, other]
Title: A Discussion and Comparative Study on Security and Privacy of Smart Meter Data
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2111.09374 [pdf, other]
Title: BigFoot: Exploiting and Mitigating Leakage in Encrypted Write-Ahead Logs
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2111.09488 [pdf, other]
Title: Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 338 entries: 1-50 | 31-80 | 81-130 | 131-180 | 181-230 | 231-280 | ... | 331-338 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)