We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2023, skipping first 45

[ total of 328 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-120 | 121-145 | ... | 321-328 ]
[ showing 25 entries per page: fewer | more | all ]
[46]  arXiv:2301.02915 [pdf, other]
Title: SFP: Providing System Call Flow Protection against Software and Fault Attacks
Comments: Published at HASP22
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[47]  arXiv:2301.03008 [pdf, ps, other]
Title: A Continent-Wide Assessment of Cyber Vulnerability Across Africa
Comments: 10 pages, 5 figures, submitted to the initiative Digital Technologies in Emerging Countries: Impacts and Responses by The Program on Democracy and the Internet (PDI) at Stanford University Cyber Policy Center
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[48]  arXiv:2301.03064 [pdf, other]
Title: Deepfake CAPTCHA: A Method for Preventing Fake Calls
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[49]  arXiv:2301.03118 [pdf, other]
Title: Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[50]  arXiv:2301.03207 [pdf, other]
Title: Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection
Comments: 30th IEEE International Conference on Software Analysis, Evolution and Reengineering, RENE track
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[51]  arXiv:2301.03368 [pdf, other]
Title: DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[52]  arXiv:2301.03445 [pdf, ps, other]
Title: A Cyber Threat Intelligence Management Platform for Industrial Environments
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2301.03532 [pdf, ps, other]
Title: Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning
Journal-ref: International Journal of Computer Science and Information Technology, vol. 14, no. 6, 2022, pp. 47-64
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[54]  arXiv:2301.03551 [pdf, other]
Title: A Lightweight Blockchain and Fog-enabled Secure Remote Patient Monitoring System
Comments: 32 pages, 13 figures, 5 tables, accepted by Elsevier "Internet of Things; Engineering Cyber Physical Human Systems" journal on January 9, 2023
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[55]  arXiv:2301.03584 [pdf, other]
Title: Network Message Field Type Classification and Recognition for Unknown Binary Protocols
Journal-ref: Proceedings of the DSN Workshop on Data-Centric Dependability and Security. DCDS 2022. Baltimore, Maryland, USA
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[56]  arXiv:2301.03585 [pdf, other]
Title: Refining Network Message Segmentation with Principal Component Analysis
Journal-ref: Proceedings of the Tenth Annual IEEE Conference on Communications and Network Security 2022. CNS. Austin, TX, USA
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[57]  arXiv:2301.03593 [pdf, other]
Title: Fast, Cheap and Good: Lightweight Methods Are Undervalued
Authors: Adam Shostack
Comments: 9 pages, one figure
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2301.03594 [pdf, other]
Title: RingAuth: Wearable Authentication using a Smart Ring
Comments: arXiv admin note: text overlap with arXiv:2202.01736
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2301.03595 [pdf, ps, other]
Title: White-box Inference Attacks against Centralized Machine Learning and Federated Learning
Authors: Jingyi Ge
Comments: 17 papers, 3 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[60]  arXiv:2301.03596 [pdf, ps, other]
Title: Membership Inference Attacks Against Latent Factor Model
Authors: Dazhi Hu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[61]  arXiv:2301.03690 [pdf, ps, other]
Title: Quantifying User Password Exposure to Third-Party CDNs
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[62]  arXiv:2301.03724 [pdf, other]
Title: SoK: Hardware Defenses Against Speculative Execution Attacks
Comments: Accepted to 2021 International Symposium on Secure and Private Execution Environment Design (SEED)
Journal-ref: 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021, pp. 108-120
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[63]  arXiv:2301.03760 [pdf, other]
Title: Over-The-Air Adversarial Attacks on Deep Learning Wi-Fi Fingerprinting
Comments: To appear in the IEEE Internet of Things Journal
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2301.03771 [pdf, ps, other]
Title: Chatbots in a Honeypot World
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[65]  arXiv:2301.03790 [pdf, other]
Title: A Practical Runtime Security Policy Transformation Framework for Software Defined Networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[66]  arXiv:2301.03852 [pdf, ps, other]
Title: BLE Protocol in IoT Devices and Smart Wearable Devices: Security and Privacy Threats
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Networking and Internet Architecture (cs.NI)
[67]  arXiv:2301.03889 [pdf, other]
Title: Earn While You Reveal: Private Set Intersection that Rewards Participants
Authors: Aydin Abadi
Comments: 54 pages
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2301.03943 [pdf, other]
Title: Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting
Comments: This paper has been accepted by IEEE Transactions On Information Forensics And Security (TIFS 2022)
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[69]  arXiv:2301.03998 [pdf, other]
Title: Deep learning approach for interruption attacks detection in LEO satellite networks
Comments: 32 pages, 19 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70]  arXiv:2301.04000 [pdf, other]
Title: Privacy-Preserving Record Linkage for Cardinality Counting
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 328 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-120 | 121-145 | ... | 321-328 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2406, contact, help  (Access key information)