We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2023

[ total of 328 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 301-328 ]
[ showing 50 entries per page: fewer | more | all ]
[1]  arXiv:2301.00044 [pdf, ps, other]
Title: Detecting Forged Kerberos Tickets in an Active Directory Environment
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[2]  arXiv:2301.00045 [pdf, ps, other]
Title: An Analysis of Honeypots and their Impact as a Cyber Deception Tactic
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[3]  arXiv:2301.00104 [pdf, ps, other]
Title: Towards Separating Computational and Statistical Differential Privacy
Comments: To appear at Foundations of Computer Science (FOCS) 2023. Changes compared to previous version: (1) The lower bound for SDP is now stronger in that it holds also for a certain inverse-polynomially large delta as opposed to only non-negligible delta, and (2) the presentation is cleaned up
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[4]  arXiv:2301.00153 [pdf, other]
Title: Knowledge-Based Dataset for Training PE Malware Detection Models
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2301.00252 [pdf, other]
Title: A Comparative Study of Image Disguising Methods for Confidential Outsourced Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[6]  arXiv:2301.00442 [pdf, ps, other]
Title: An Overview of Limitations and Approaches in Identity Management
Comments: The 15th International Conference on Availability, Reliability and Security (ARES 2020), August 25--28, 2020, Virtual Event, Ireland
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE); Systems and Control (eess.SY)
[7]  arXiv:2301.00443 [pdf, other]
Title: TaxIdMA: Towards a Taxonomy for Attacks related to Identities
Comments: The 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23-26, 2022, Vienna, Austria
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2301.00444 [pdf, other]
Title: IMC: A Classification of Identity Management Approaches
Comments: ESORICS Workshop DETIPS 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Software Engineering (cs.SE)
[9]  arXiv:2301.00479 [pdf, other]
Title: The Design Principle of Blockchain: An Initiative for the SoK of SoKs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (stat.ML)
[10]  arXiv:2301.00710 [pdf, other]
Title: Honeypot Implementation in a Cloud Environment
Authors: Stefan Machmeier
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2301.00823 [pdf, other]
Title: Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2301.00888 [pdf, ps, other]
Title: SAFEMYRIDES: Application of Decentralized Control Edge-Computing to Ridesharing Monitoring Services
Comments: 18 pages, eight figures and it is under review in Information System Frontiers
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[13]  arXiv:2301.00920 [pdf, other]
Title: Five Common Misconceptions About Privacy-Preserving Internet of Things
Comments: 7 pages, 5 figures, accepted in IEEE Communications Magazine
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[14]  arXiv:2301.01044 [pdf, other]
Title: Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2301.01058 [pdf, ps, other]
Title: Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC Networks
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2301.01124 [pdf, other]
Title: Recent Trends on Privacy-Preserving Technologies under Standardization at the IETF
Comments: 9 pages, 5 figures, 1 table
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[17]  arXiv:2301.01197 [pdf, other]
Title: Backdoor Attacks Against Dataset Distillation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2301.01217 [pdf, other]
Title: Unlearnable Clusters: Towards Label-agnostic Unlearnable Examples
Comments: CVPR2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[19]  arXiv:2301.01218 [pdf, other]
Title: Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[20]  arXiv:2301.01221 [pdf, other]
Title: Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain
Comments: 21 pages, 4 figures, added references for section 3-A
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2301.01223 [pdf, other]
Title: ExploreADV: Towards exploratory attack for Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2301.01261 [pdf, ps, other]
Title: Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs
Comments: To be published in the proceedings of the 45th IEEE/ACM International Conference on Software Engineering (ICSE 2023)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[23]  arXiv:2301.01282 [pdf, ps, other]
Title: RSA+: An RSA variant
Comments: 11 pages, no figures; code on GitHub (this https URL)
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[24]  arXiv:2301.01321 [pdf, ps, other]
Title: Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[25]  arXiv:2301.01505 [pdf, other]
Title: Privacy Considerations for Risk-Based Authentication Systems
Comments: 8 pages, 2 figures. Open Access version of a paper published at 2021 International Workshop on Privacy Engineering (IWPE '21)
Journal-ref: 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 320-327
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[26]  arXiv:2301.01586 [pdf, ps, other]
Title: Post-Quantum Key Agreement Protocol based on Non-Square Integer Matrices
Comments: 12 pages, 2 tables, 29 references
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2301.01657 [pdf, ps, other]
Title: Cryptographic Group and Semigroup Actions
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2301.01701 [pdf, other]
Title: Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries
Comments: SANER 2023 Technical Track Camera Ready
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Software Engineering (cs.SE)
[29]  arXiv:2301.01770 [pdf, other]
Title: MetaSecure: A Passwordless Authentication for the Metaverse
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2301.01809 [pdf, other]
Title: Significant Digits: Using Large-Scale Blockchain Data to Predict Fraudulent Addresses
Comments: Accepted at the IEEE Big Data 2022 Conference
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2301.01889 [pdf, other]
Title: FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7
Comments: ECAI 2022
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2301.01998 [pdf, other]
Title: DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2301.02102 [pdf, other]
Title: Linking Souls to Humans with ZKBID: Accountable Anonymous Blockchain Accounts for Web 3.0 Decentralized Identity
Comments: 16 pages, 13 figures, 8 tables
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2301.02344 [pdf, other]
Title: TrojanPuzzle: Covertly Poisoning Code-Suggestion Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[35]  arXiv:2301.02412 [pdf, other]
Title: Code Difference Guided Adversarial Example Generation for Deep Code Models
Comments: Accepted by ASE 2023
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[36]  arXiv:2301.02487 [pdf, other]
Title: Watching your call: Breaking VoLTE Privacy in LTE/5G Networks
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2301.02490 [pdf, other]
Title: Fuzzers for stateful systems: Survey and Research Directions
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2301.02496 [pdf, other]
Title: Stealthy Backdoor Attack for Code Models
Comments: 18 pages, Under review of IEEE Transactions on Software Engineering
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[39]  arXiv:2301.02505 [pdf, other]
Title: Nested Dirichlet models for unsupervised attack pattern detection in honeypot data
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[40]  arXiv:2301.02549 [pdf, other]
Title: Linear and non-linear machine learning attacks on physical unclonable functions
Authors: Michael Lachner
Comments: 77 pages, 23 figures, 4 tables, bachelor's thesis at Ludwig Maximilian University of Munich (September 2021). Advisors: Steffen Illium, Markus Friedrich, Prof. Dr. Dr. Ulrich R\"uhrmair, Supervisor: Prof. Dr. Claudia Linnhoff-Popien
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2301.02615 [pdf, other]
Title: Silent Killer: A Stealthy, Clean-Label, Black-Box Backdoor Attack
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[42]  arXiv:2301.02619 [pdf, ps, other]
Title: Review of Cookie Synchronization Detection Methods
Authors: Jake Smith
Comments: 9 pages, 0 figures
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2301.02620 [pdf, other]
Title: Information Flow Tracking Methods for Protecting Cyber-Physical Systems against Hardware Trojans -- a Survey
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2301.02621 [pdf, ps, other]
Title: Deep leakage from gradients
Authors: Yaqiong Mu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[45]  arXiv:2301.02905 [pdf, other]
Title: REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service
Comments: To appear in Network and Distributed System Security (NDSS) Symposium, 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[46]  arXiv:2301.02915 [pdf, other]
Title: SFP: Providing System Call Flow Protection against Software and Fault Attacks
Comments: Published at HASP22
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[47]  arXiv:2301.03008 [pdf, ps, other]
Title: A Continent-Wide Assessment of Cyber Vulnerability Across Africa
Comments: 10 pages, 5 figures, submitted to the initiative Digital Technologies in Emerging Countries: Impacts and Responses by The Program on Democracy and the Internet (PDI) at Stanford University Cyber Policy Center
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[48]  arXiv:2301.03064 [pdf, other]
Title: Deepfake CAPTCHA: A Method for Preventing Fake Calls
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[49]  arXiv:2301.03118 [pdf, other]
Title: Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[50]  arXiv:2301.03207 [pdf, other]
Title: Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection
Comments: 30th IEEE International Conference on Software Analysis, Evolution and Reengineering, RENE track
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[ total of 328 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 301-328 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)