We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2022, skipping first 75

[ total of 435 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | ... | 426-435 ]
[ showing 25 entries per page: fewer | more | all ]
[76]  arXiv:2210.05217 [pdf, ps, other]
Title: Abstract interpretation of Michelson smart-contracts
Journal-ref: SOAP '22: 11th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, Jun 2022, San Diego, CA, United States. pp.36-43
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[77]  arXiv:2210.05226 [pdf, other]
Title: Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2210.05343 [pdf, other]
Title: Printing variability of copy detection patterns
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[79]  arXiv:2210.05433 [pdf, other]
Title: On the Feasibility of Profiling Electric Vehicles through Charging Data
Comments: This is an extended version of our paper in VehicleSec 2023 (co-located with NDSS Symposium 2023), San Diego, CA
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2210.05476 [pdf, other]
Title: Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Comments: This paper will appear at IACR Transactions on Cryptographic Hardware and Embedded Systems 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[81]  arXiv:2210.05560 [pdf, other]
Title: Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption
Comments: 33 pages, 12 figures, submitted to Annual Reviews in Control
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[82]  arXiv:2210.05623 [pdf, ps, other]
Title: A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[83]  arXiv:2210.06139 [pdf, other]
Title: Zero-Knowledge Optimal Monetary Policy under Stochastic Dominance
Comments: Implementation available at: this https URL
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE); General Economics (econ.GN)
[84]  arXiv:2210.06163 [pdf, ps, other]
Title: Privacy of federated QR decomposition using additive secure multiparty computation
Comments: 10 pages, 2 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[85]  arXiv:2210.06186 [pdf, other]
Title: GOTCHA: Real-Time Video Deepfake Detection via Challenge-Response
Comments: 20 pages, 19 figures, Code and data released
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[86]  arXiv:2210.06428 [pdf, other]
Title: Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork
Comments: Accepted by NeurIPS 2022. Code is available at this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[87]  arXiv:2210.06509 [pdf, other]
Title: Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[88]  arXiv:2210.06516 [pdf, other]
Title: How to Sift Out a Clean Data Subset in the Presence of Data Poisoning?
Comments: 13 pages of the main text
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[89]  arXiv:2210.06540 [pdf, ps, other]
Title: Blockchain for Unmanned Underwater Drones: Research Issues, Challenges, Trends and Future Directions
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2210.06587 [pdf, ps, other]
Title: BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces
Authors: Adam Dorian Wong
Comments: 29 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91]  arXiv:2210.06654 [pdf, other]
Title: The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain
Authors: Yash Vekaria (1), Rishab Nithyanand (2), Zubair Shafiq (1) ((1) University of California, Davis, (2) University of Iowa)
Comments: To appear at IEEE Symposium on Security & Privacy (Oakland) 2024
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[92]  arXiv:2210.06676 [pdf, other]
Title: A Tagging Solution to Discover IoT Devices in Apartments
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2210.06738 [pdf, other]
Title: PUPoW: A framework for designing blockchains with practically-useful-proof-of-work & vanitycoin
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[94]  arXiv:2210.06746 [pdf, other]
Title: PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs
Comments: 24 pages, 15 figures (including subfigures), 9 tables. This is the extended version of the paper with the same title published at USENIX Security '23
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2210.06792 [pdf, other]
Title: SoK: How Not to Architect Your Next-Generation TEE Malware?
Comments: Kubilay Ahmet K\"u\c{c}\"uk, Steve Moyle, Andrew Martin, Alexandru Mereacre, and Nicholas Allott. 2022. SoK: How Not to Architect Your Next-Generation TEE Malware?. In Hardware and Architectural Support for Security and Privacy (HASP 22), October 1, 2022, Chicago, IL, USA. ACM, New York, NY, USA, 10 pages. this https URL
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2210.06840 [pdf, ps, other]
Title: Forensic-Ready Risk Management Concepts
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[97]  arXiv:2210.06856 [pdf, other]
Title: Federated Learning for Tabular Data: Exploring Potential Risk to Privacy
Comments: In the proceedings of The 33rd IEEE International Symposium on Software Reliability Engineering (ISSRE), November 2022
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2210.06889 [pdf, other]
Title: Multi-recipient and threshold encryption based on hidden multipliers
Authors: Vitaly Roman'kov
Comments: 12 pages. Published in journal of Groups, Complexity, Cryptology. arXiv admin note: substantial text overlap with arXiv:2108.06967
Journal-ref: journal of Groups, complexity, cryptology, Volume 14, Issue 2 (March 21, 2023) gcc:10150
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[99]  arXiv:2210.06998 [pdf, other]
Title: DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[100]  arXiv:2210.07110 [pdf, other]
Title: POSE: Practical Off-chain Smart Contract Execution
Journal-ref: Annual Network and Distributed System Security Symposium, NDSS, 2023
Subjects: Cryptography and Security (cs.CR)
[ total of 435 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | ... | 426-435 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)