We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2022, skipping first 100

[ total of 333 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | 301-333 ]
[ showing 50 entries per page: fewer | more | all ]
[101]  arXiv:2201.06100 [pdf]
Title: Improving Privacy and Security in Unmanned Aerial Vehicles Network using Blockchain
Comments: 18 Pages; 14 Figures; 2 Tables
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[102]  arXiv:2201.06235 [pdf, other]
Title: Characterizing Sensor Leaks in Android Apps
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[103]  arXiv:2201.06335 [pdf, other]
Title: End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates
Comments: 22 pages, 9 figures Main changes from the previous version: - The introduction and Sections 5 and 6 are better written now. - State of the Art references update when necessary. - Design Requirements names have been changed to better ones. - Section 4 has been reordered. - Section 4.1 is better explained now. - Algorithms in Section 5 are better explained now, step-by-step
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2201.06354 [pdf, other]
Title: Improving the Security of the IEEE 802.15.6 Standard for Medical BANs
Comments: Published in IEEE Access
Journal-ref: IEEE Access, 2022
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2201.06362 [pdf, other]
Title: Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2201.06394 [pdf, other]
Title: Improved Degree Evaluation and Superpoly Recovery methods with Application to Trivium
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2201.06446 [pdf, other]
Title: Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange
Comments: This is the extended version of the paper that appeared in the 12th ACM Conference on Data and Application Security and Privacy (CODASPY'22), April 24-26, 2022, Baltimore-Washington DC Area, United States, this https URL
Journal-ref: 12th ACM Conference on Data and Application Security and Privacy 2022 (CODASPY'22)
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2201.06680 [pdf, other]
Title: Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2201.06699 [pdf, other]
Title: AESPA: Accuracy Preserving Low-degree Polynomial Activation for Fast Private Inference
Comments: 11 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[110]  arXiv:2201.06785 [pdf, ps, other]
Title: Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2201.06811 [pdf, other]
Title: Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado Cash
Comments: 10 pages content, 2 pages appendix
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2201.06971 [pdf]
Title: Identification for Accountability vs Privacy
Comments: 4 pages plus appendix, 9 pages total
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[113]  arXiv:2201.07119 [pdf, ps, other]
Title: A Survey on Code-Based Cryptography
Comments: This book chapter is considered to be part of the Springer Lecture Notes in Mathematics: Coding Theory and Applications V, Applications of Coding Theory in Quantum Computing and Cryptography
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[114]  arXiv:2201.07188 [pdf, other]
Title: SoK: Blockchain Governance
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Computer Science and Game Theory (cs.GT)
[115]  arXiv:2201.07220 [pdf, other]
Title: Do not rug on me: Zero-dimensional Scam Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistical Finance (q-fin.ST)
[116]  arXiv:2201.07224 [pdf, other]
Title: NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree Search
Comments: Published as a conference paper in AAAI 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[117]  arXiv:2201.07323 [pdf]
Title: A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications
Journal-ref: IEEE Access, vol. 10, 2022
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2201.07359 [pdf, other]
Title: Sandbox Sample Classification Using Behavioral Indicators of Compromise
Authors: M. Andrecut
Comments: 10 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119]  arXiv:2201.07375 [pdf, other]
Title: A 333.9uW 0.158mm$^2$ Saber Learning with Rounding based Post-Quantum Crypto Accelerator
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[120]  arXiv:2201.07388 [pdf, other]
Title: Kantorovich Mechanism for Pufferfish Privacy
Authors: Ni Ding
Comments: 20 pages, incl. supplementary materials, 4 figures, to appear in proceeding of AISTATS 2022
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[121]  arXiv:2201.07391 [pdf, other]
Title: MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
Comments: To Appear in KDD'2022
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2201.07417 [pdf, other]
Title: Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[123]  arXiv:2201.07444 [pdf, other]
Title: Hiding Data in Colors: Secure and Lossless Deep Image Steganography via Conditional Invertible Neural Networks
Comments: under review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124]  arXiv:2201.07462 [pdf, other]
Title: Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits
Comments: Published in IEEE PerCom Workshops 2022,978-1-6654-1647-4/22/$31.00 pp.643-648 Copyright 2022 IEEE
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2201.07469 [pdf, other]
Title: Utility Analysis and Enhancement of LDP Mechanisms in High-Dimensional Space
Comments: This paper is accepted and will appear in ICDE 2022 as a regular research paper
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[126]  arXiv:2201.07496 [pdf, other]
Title: A Low-Power BLS12-381 Pairing Crypto-Processor for Internet-of-Things Security Applications
Comments: Published in IEEE Solid-State Circuits Letters (SSCL)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[127]  arXiv:2201.07513 [pdf, other]
Title: Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[128]  arXiv:2201.07537 [pdf, other]
Title: Graph Neural Network-based Android Malware Classification with Jumping Knowledge
Comments: will be appeared in IEEE Conference on Dependable and Secure Computing 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[129]  arXiv:2201.07597 [pdf, other]
Title: Device Identification in Multimedia Systems Based on DRAM Fingerprinting
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2201.07649 [pdf, other]
Title: Malware Classification Using Static Disassembly and Machine Learning
Comments: To be published in 29th AIAI Irish Conference on Artificial Intelligence and Cognitive Science
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[131]  arXiv:2201.07651 [pdf, other]
Title: Enhancing CryptoGuards Deployability for Continuous Software Security Scanning
Authors: Miles Frantz
Comments: Masters thesis
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2201.07654 [pdf, other]
Title: Comprehensive Efficiency Analysis of Machine Learning Algorithms for Developing Hardware-Based Cybersecurity Countermeasures
Authors: Darren Cobian
Comments: 54 pages, 17 figures/tables, 43 citations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[133]  arXiv:2201.07711 [pdf, other]
Title: Enhancing the Security & Privacy of Wearable Brain-Computer Interfaces
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Operating Systems (cs.OS)
[134]  arXiv:2201.07730 [pdf, other]
Title: SCOTCH: An Efficient Secure Computation Framework for Secure Aggregation
Comments: Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), Third AAAI Privacy-Preserving Artificial Intelligence (PPAI-22) Workshop
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[135]  arXiv:2201.07740 [pdf, other]
Title: More is Merrier in Collusion Mitigation
Comments: 20 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[136]  arXiv:2201.07746 [pdf, other]
Title: A Centrality Analysis of the Lightning Network
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2201.07765 [pdf, other]
Title: Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital Twins
Comments: 39 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2201.07793 [pdf]
Title: On Using Blockchains for Beyond Visual Line of Sight (BVLOS) Drones Operation: An Architectural Study
Comments: 10 pages, 4 figures, HiPEAC'22
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Software Engineering (cs.SE)
[139]  arXiv:2201.07920 [pdf, other]
Title: Shades of Finality and Layer 2 Scaling
Authors: Bennet Yee (1), Dawn Song (1), Patrick McCorry (2), Chris Buckland (2) ((1) Oasis Labs, (2) Infura)
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2201.07946 [pdf, other]
Title: Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security
Comments: 26 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:2201.07954 [pdf, other]
Title: Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[142]  arXiv:2201.07959 [pdf, other]
Title: APIRO: A Framework for Automated Security Tools API Recommendation
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[143]  arXiv:2201.07964 [pdf]
Title: A Systematic Literature Review of Blockchain Technology Adoption in Bangladesh
Journal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-30, Vol. 6, No. 1, 1st January 2022, Published by International Association of Educators and Researchers (IAER)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[144]  arXiv:2201.08052 [pdf, other]
Title: Adversarial Jamming for a More Effective Constellation Attack
Comments: 3 pages, 2 figures, published in The 13th International Symposium on Antennas, Propagation and EM Theory (ISAPE 2021)
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[145]  arXiv:2201.08120 [pdf, other]
Title: Survey on Privacy-Preserving Techniques for Data Publishing
Comments: 35 pages, 3 figures, 5 tables
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:2201.08126 [pdf]
Title: Reversible Data Hiding in Encrypted Images by Lossless Pixel Conversion
Comments: Submitted to IEEE TDSC
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2201.08133 [pdf, other]
Title: CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[148]  arXiv:2201.08135 [pdf, other]
Title: Survey on Federated Learning Threats: concepts, taxonomy on attacks and defences, experimental study and challenges
Journal-ref: Information Fusion (2022)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[149]  arXiv:2201.08154 [pdf, other]
Title: NapierOne: A modern mixed file data set alternative to Govdocs1
Journal-ref: Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2201.08441 [pdf, other]
Title: VUDENC: Vulnerability Detection with Deep Learning on a Natural Codebase for Python
Comments: Accepted Manuscript
Journal-ref: Information and Software Technology, Volume 144, April 2022, 106809
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[ total of 333 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | 301-333 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2210, contact, help  (Access key information)