We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2022

[ total of 391 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 351-391 ]
[ showing 50 entries per page: fewer | more | all ]
[1]  arXiv:2211.00111 [pdf, other]
Title: Unsafe's Betrayal: Abusing Unsafe Rust in Binary Reverse Engineering via Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[2]  arXiv:2211.00306 [pdf, other]
Title: Empowering Data Centers for Next Generation Trusted Computing
Comments: 23 pages, 12 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[3]  arXiv:2211.00441 [pdf, other]
Title: Zero Day Threat Detection Using Metric Learning Autoencoders
Comments: 8 pages, accepted to ICMLA 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[4]  arXiv:2211.00453 [pdf, other]
Title: The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2211.00463 [pdf, other]
Title: Amplifying Membership Exposure via Data Poisoning
Comments: To Appear in the 36th Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[6]  arXiv:2211.01000 [pdf, other]
Title: SoK: Play-to-Earn Projects
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2211.01109 [pdf, other]
Title: The Impostor Among US(B): Off-Path Injection Attacks on USB Communications
Comments: To appear in USENIX Security 2023
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2211.01112 [pdf, other]
Title: Adversarial Attack on Radar-based Environment Perception Systems
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2211.01138 [pdf, other]
Title: Local Differentially Private Frequency Estimation based on Learned Sketches
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[10]  arXiv:2211.01141 [pdf, other]
Title: User-Entity Differential Privacy in Learning Natural Language Models
Comments: Accepted at IEEE BigData 2022
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[11]  arXiv:2211.01143 [pdf, other]
Title: Proof of User Similarity: the Spatial Measurer of Blockchain
Comments: 12 pages,10 figures
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2211.01144 [pdf, ps, other]
Title: UniASM: Binary Code Similarity Detection without Fine-tuning
Authors: Yeming Gu, Hui Shu, Fan Hu
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[13]  arXiv:2211.01147 [pdf, other]
Title: An Easy-to-use and Robust Approach for the Differentially Private De-Identification of Clinical Textual Documents
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[14]  arXiv:2211.01182 [pdf, other]
Title: Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks
Comments: arXiv admin note: substantial text overlap with arXiv:2006.07700
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2211.01270 [pdf, other]
Title: Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring Network
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2211.01291 [pdf, other]
Title: SoK: A Stratified Approach to Blockchain Decentralization
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2211.01508 [pdf, other]
Title: Partially-Observable Security Games for Automating Attack-Defense Analysis
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL)
[18]  arXiv:2211.01535 [pdf, other]
Title: Reliable Malware Analysis and Detection using Topology Data Analysis
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[19]  arXiv:2211.01580 [pdf, other]
Title: AdaChain: A Learned Adaptive Blockchain
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[20]  arXiv:2211.01592 [pdf, other]
Title: Try to Avoid Attacks: A Federated Data Sanitization Defense for Healthcare IoMT Systems
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[21]  arXiv:2211.01658 [pdf, other]
Title: Secret Sharing for Generic Theoretic Cryptography
Authors: James Smith
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[22]  arXiv:2211.01753 [pdf, other]
Title: Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[23]  arXiv:2211.01806 [pdf, other]
Title: BATT: Backdoor Attack with Transformation-based Triggers
Comments: This paper is accepted by ICASSP 2023. 5 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[24]  arXiv:2211.01808 [pdf, ps, other]
Title: Dormant Neural Trojans
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2211.01845 [pdf, ps, other]
Title: Reinforcement Learning based Cyberattack Model for Adaptive Traffic Signal Controller in Connected Transportation Systems
Comments: 18 pages, 12 figures, submitted to the Transportation Research Board 102nd Annual Meeting
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[26]  arXiv:2211.01875 [pdf, other]
Title: M-to-N Backdoor Paradigm: A Stealthy and Fuzzy Attack to Deep Learning Models
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2211.02003 [pdf, other]
Title: Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[28]  arXiv:2211.02161 [pdf, ps, other]
Title: Privacy-preserving Deep Learning based Record Linkage
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Data Structures and Algorithms (cs.DS); Information Retrieval (cs.IR); Machine Learning (cs.LG)
[29]  arXiv:2211.02179 [pdf, other]
Title: Verifying RISC-V Physical Memory Protection
Comments: SECRISC-V 2019 Workshop
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2211.02245 [pdf, other]
Title: Unintended Memorization and Timing Attacks in Named Entity Recognition Models
Comments: This is the full version of the paper with the same title accepted for publication in the Proceedings of the 23rd Privacy Enhancing Technologies Symposium, PETS 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[31]  arXiv:2211.02246 [pdf, ps, other]
Title: DatChain -- Blockchain implementation in Data transfer for IoT Devices
Comments: Keywords - Blockchain, Internet of Things, IOTA, Tangle, Data transfer, IoT Data Analytics
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2211.02266 [pdf, other]
Title: Rescuing the End-user systems from Vulnerable Applications using Virtualization Techniques
Comments: 14 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[33]  arXiv:2211.02369 [pdf, ps, other]
Title: A Jigsaw Puzzle Solver-based Attack on Block-wise Image Encryption for Privacy-preserving DNNs
Comments: To be appeared in IWAIT2023
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2211.02579 [pdf, other]
Title: V2X Misbehavior in Maneuver Sharing and Coordination Service: Considerations for Standardization
Comments: 7 pages, 4 figures, 4 tables, IEEE CSCN 2022. arXiv admin note: text overlap with arXiv:2112.02184
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2211.02652 [pdf, other]
Title: AntFuzzer: A Grey-Box Fuzzing Framework for EOSIO Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2211.02696 [pdf, other]
Title: MalGrid: Visualization Of Binary Features In Large Malware Corpora
Comments: Submitted version - MILCOM 2022 IEEE Military Communications Conference. The high-quality images in this paper can be found on Github (this https URL)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Image and Video Processing (eess.IV); Signal Processing (eess.SP)
[37]  arXiv:2211.03015 [pdf, other]
Title: Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2211.03068 [pdf, other]
Title: MAIL: Malware Analysis Intermediate Language
Authors: Shahid Alam
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[39]  arXiv:2211.03117 [pdf, other]
Title: Going In Style: Audio Backdoors Through Stylistic Transformations
Comments: Accepted to ICASSP '23 and the first two authors contributed equally
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[40]  arXiv:2211.03138 [pdf, ps, other]
Title: Detection Of Insider Attacks In Block Chain Network Using The Trusted Two Way Intrusion Detection System
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2211.03225 [pdf, other]
Title: DeepSec: Deciding Equivalence Properties for Security Protocols -- Improved theory and practice
Comments: 136 pages
Journal-ref: TheoretiCS (March 13, 2024) theoretics:10298
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2211.03285 [pdf, other]
Title: SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing
Comments: To appear in Proceedings of the 2022 Annual Computer Security Applications Conference (ACSAC '22)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[43]  arXiv:2211.03490 [pdf, other]
Title: Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2211.03498 [pdf, ps, other]
Title: Developers' Privacy Education: A game framework to stimulate secure coding behaviour
Comments: 10
Journal-ref: The 2022 IEEE International Conference on Privacy Computing (IEEE PriComp 2022)
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2211.03526 [pdf, other]
Title: Hardware Security Primitives using Passive RRAM Crossbar Array: Novel TRNG and PUF Designs
Comments: To appear at ASP-DAC 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[46]  arXiv:2211.03613 [pdf, ps, other]
Title: Towards Devising A Fund Management System Using Blockchain
Comments: arXiv admin note: text overlap with arXiv:2203.03169 by other authors. arXiv admin note: substantial text overlap with arXiv:2203.03169 by other authors without attribution
Journal-ref: International Journal of Computer Science and Information Technology (IJCSIT), Volume 12(18), pp 225-238, 2022
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2211.03622 [pdf, other]
Title: Do Users Write More Insecure Code with AI Assistants?
Comments: 16 pages, 16 figures, update adds names of statistical tests and survey questions, full version of conference paper
Journal-ref: CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, November 2023, Pages 2785-2799
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2211.03662 [pdf, other]
Title: A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
Journal-ref: (2022) ACM Trans. Multimedia Comput. Commun. Appl
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2211.03690 [pdf, other]
Title: Scale Invariant Privacy Preserving Video via Wavelet Decomposition
Journal-ref: International Journal of Design, Analysis & Tools for Integrated Circuits & Systems 7.1 (2018)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[50]  arXiv:2211.03776 [pdf, other]
Title: Towards 5G Zero Trusted Air Interface Architecture
Subjects: Cryptography and Security (cs.CR)
[ total of 391 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 351-391 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)