We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 65 entries: 1-65 ]
[ showing up to 100 entries per page: fewer | more ]

Fri, 30 Sep 2022

[1]  arXiv:2209.14952 [pdf, other]
Title: CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software
Comments: The extended version of a paper to appear in the Proceedings of the 32nd USENIX Security Symposium, 2023, (USENIX Security '23), 22 pages
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2209.14921 [pdf, other]
Title: IvySyn: Automated Vulnerability Discovery for Deep Learning Frameworks
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2209.14879 [pdf]
Title: OpenDSU: Digital Sovereignty in PharmaLedger
Comments: 18 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Software Engineering (cs.SE); Social and Information Networks (cs.SI); Systems and Control (eess.SY)
[4]  arXiv:2209.14795 [pdf, other]
Title: ThreatPro: Multi-Layer Threat Analysis in the Cloud
Comments: 32 pages, 14 figures
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2209.14727 [pdf]
Title: FastPacket: Towards Pre-trained Packets Embedding based on FastText for next-generation NIDS
Authors: Khloud Al Jallad
Comments: arXiv admin note: text overlap with arXiv:2209.13961
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[6]  arXiv:2209.14673 [pdf, other]
Title: Chameleon Cache: Approximating Fully Associative Caches with Random Replacement to Prevent Contention-Based Cache Attacks
Comments: 12 pages, 9 figures, 6 algorithms, 1 table
Journal-ref: 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), page 13-24
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[7]  arXiv:2209.14603 [pdf, other]
Title: Dataset Distillation for Medical Dataset Sharing
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[8]  arXiv:2209.14547 [pdf, other]
Title: A Secure Federated Learning Framework for Residential Short Term Load Forecasting
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[9]  arXiv:2209.14517 [pdf]
Title: The Fungibility of Non-Fungible Tokens: A Quantitative Analysis of ERC-721 Metadata
Comments: 8 pages inc. appendix, 3 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[10]  arXiv:2209.14987 (cross-list from cs.LG) [pdf, other]
Title: No Free Lunch in "Privacy for Free: How does Dataset Condensation Help Privacy"
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[11]  arXiv:2209.14831 (cross-list from cs.CV) [pdf, other]
Title: Access Control with Encrypted Feature Maps for Object Detection Models
Comments: arXiv admin note: substantial text overlap with arXiv:2206.05422
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[12]  arXiv:2209.14826 (cross-list from cs.LG) [pdf, other]
Title: Towards Lightweight Black-Box Attacks against Deep Neural Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[13]  arXiv:2209.14692 (cross-list from cs.CV) [pdf, other]
Title: Digital and Physical Face Attacks: Reviewing and One Step Further
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[14]  arXiv:2209.14462 (cross-list from cs.GT) [pdf, ps, other]
Title: What Can Cryptography Do For Decentralized Mechanism Design
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[15]  arXiv:2209.14395 (cross-list from cs.IR) [pdf]
Title: The Role of Metadata in Non-Fungible Tokens: Marketplace Analysis and Collection Organization
Authors: Sarah Barrington
Comments: 7 pages, 5 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[16]  arXiv:2209.14385 (cross-list from cs.CV) [pdf, other]
Title: Feature Decoupling in Self-supervised Representation Learning for Open Set Recognition
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Thu, 29 Sep 2022

[17]  arXiv:2209.14243 [pdf, other]
Title: A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks
Comments: Extended version from IEEE IOLTS'2022 short paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2209.14200 [pdf, ps, other]
Title: Building an Ethereum-Based Decentralized Vehicle Rental System
Journal-ref: Computational Intelligence in Security for Information Systems Conference, 45-53, 2019
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2209.14195 [pdf, other]
Title: Secure Indoor Location for Airport Environments
Journal-ref: 018 4th International Conference on Big Data Innovations and Applications (Innovate-Data) 2018
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2209.14130 [pdf, other]
Title: Video surveillance robot powered by raspberry pi
Journal-ref: Proceedings of the 1st International Conference on Internet of Things and Machine Learning 1-4, 2017
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2209.13961 [pdf]
Title: Big data analysis and distributed deep learning for next-generation intrusion detection system optimization
Journal-ref: J Big Data 6, 88 (2019)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[22]  arXiv:2209.13913 [pdf, other]
Title: Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2209.13793 [pdf]
Title: A Unified View of IoT And CPS Security and Privacy
Authors: Xinwen Fu
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2209.13697 [pdf, ps, other]
Title: On the Choice of Databases in Differential Privacy Composition
Comments: 14 pages, 0 figures
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2209.13643 [pdf, other]
Title: MPC-Pipe: an Efficient Pipeline Scheme for Secure Multi-party Machine Learning Inference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[26]  arXiv:2209.13965 (cross-list from cs.AI) [pdf]
Title: Anomaly detection optimization using big data and deep learning to reduce false-positive
Journal-ref: J Big Data 7, 68 (2020)
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Wed, 28 Sep 2022

[27]  arXiv:2209.13454 [pdf]
Title: Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation
Comments: Submitted to Springer
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Neural and Evolutionary Computing (cs.NE); Networking and Internet Architecture (cs.NI)
[28]  arXiv:2209.13431 [pdf]
Title: MTTBA- A Key Contributor for Sustainable Energy Consumption Time and Space Utility for Highly Secured Crypto Transactions in Blockchain Technology
Comments: 15 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2209.13288 [pdf, other]
Title: A Benchmark Comparison of Python Malware Detection Approaches
Comments: 12 pages, 3 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[30]  arXiv:2209.13073 [pdf]
Title: Preprint: Privacy-preserving IoT Data Sharing Scheme
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2209.12993 [pdf, other]
Title: Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version)
Comments: This is an extended version of a paper with the same name that will be presented in the 32nd Usenix Security Symposium (USENIX 2023)
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2209.12987 [pdf, other]
Title: TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[33]  arXiv:2209.12985 [pdf, other]
Title: A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2209.12984 [pdf, other]
Title: Characteristics and Main Threats about Multi-Factor Authentication: A Survey
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[35]  arXiv:2209.13523 (cross-list from cs.LG) [pdf, other]
Title: Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[36]  arXiv:2209.13113 (cross-list from cs.CV) [pdf, other]
Title: FG-UAP: Feature-Gathering Universal Adversarial Perturbation
Comments: 27 pages, 4 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[37]  arXiv:2209.13081 (cross-list from quant-ph) [pdf, ps, other]
Title: Functional Encryption with Secure Key Leasing
Journal-ref: In: Agrawal S., Lin D. (eds) Advances in Cryptology - Asiacrypt 2022 - LNCS
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[38]  arXiv:2209.13007 (cross-list from cs.NI) [pdf, other]
Title: Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Comments: IEEE GLOBECOM 2022 Publication
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[39]  arXiv:2209.12962 (cross-list from cs.CV) [pdf, other]
Title: FaRO 2: an Open Source, Configurable Smart City Framework for Real-Time Distributed Vision and Biometric Systems
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Tue, 27 Sep 2022

[40]  arXiv:2209.12867 [pdf, other]
Title: Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[41]  arXiv:2209.12742 [pdf, other]
Title: Too Many Options: A Survey of ABE Libraries for Developers
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2209.12698 [pdf, other]
Title: QuantumSolver: A quantum tool-set for developers
Comments: 10 pages, 4 figures, sumited to CAITS, SAM, CSCE, Springer Nature, Indexed by Computing Research and Education (CORE) with ranking C, Indexed by CS Conference Rankings (0.83), Indexed by GII-GRIN in Class WiP
Journal-ref: CAITS, SAM, CSCE. The 2022 World Congress in Computer Science, Computer Engineering, and Applied Computing. CSCE 2022, pg. 149. ISBN # 1-60132-516-9; American Council on Science & Education Las Vegas, USA. July 25-28, 2022
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2209.12683 [pdf]
Title: Evaluating Malware Forensics Tools
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2209.12482 [pdf]
Title: Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity
Comments: Accepted by TrustCom-2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[45]  arXiv:2209.12195 [pdf, other]
Title: SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[46]  arXiv:2209.12145 [pdf, other]
Title: Secure Decentralized IoT Service Platform using Consortium Blockchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[47]  arXiv:2209.12077 [pdf]
Title: Impact of a non-deterministic rekey interval on the performance of arc4random
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2209.12041 [pdf]
Title: Blockchain technologies in the design of Industrial Control Systems for Smart Cities
Authors: Gabriela Ahmadi-Assalemi (1), Haider Al-Khateeb (1) ((1) Cyber Quarter - Midlands Centre for Cyber Security, University of Wolverhampton, UK)
Comments: 8 pages, 5 figures
Journal-ref: published in IEEE Blockchain Technical Briefs, 2022, https://blockchain.ieee.org/technicalbriefs
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2209.11962 [pdf, ps, other]
Title: Trace-based cryptoanalysis of cyclotomic PLWE for the non-split case
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2209.11957 [pdf, ps, other]
Title: Cooperative Resource Management in Quantum Key Distribution (QKD) Networks for Semantic Communication
Comments: 16 pages, 20 figures, journal paper. arXiv admin note: text overlap with arXiv:2208.11270
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2209.11904 [pdf, other]
Title: CryptoGCN: Fast and Scalable Homomorphically Encrypted Graph Convolutional Network Inference
Comments: Accepted in Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[52]  arXiv:2209.11878 [pdf, other]
Title: "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software
Comments: To appear in USENIX Security Symposium 2023
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[53]  arXiv:2209.11861 [pdf, other]
Title: Authentication and encryption for a robotic ad hoc network using identity-based cryptography
Journal-ref: 2018 4th International Conference on Big Data Innovations and Applications (Innovate-Data), 2018
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2209.11857 [pdf, other]
Title: Analysis of the new standard hash function
Journal-ref: International Conference on Computer Aided Systems Theory, 142-149, 2013
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2209.11802 [pdf]
Title: Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2209.12046 (cross-list from cs.LG) [pdf, other]
Title: Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[57]  arXiv:2209.11865 (cross-list from cs.NI) [pdf, other]
Title: Revocation management in vehicular ad-hoc networks
Comments: arXiv admin note: substantial text overlap with arXiv:2208.05343
Journal-ref: 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1210-1217, 2015
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

Mon, 26 Sep 2022

[58]  arXiv:2209.11715 [pdf, other]
Title: The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
Comments: 19 pages, 23 figures. Accepted to NDSS 2023. Code availability: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[59]  arXiv:2209.11650 [pdf, ps, other]
Title: An Algebraic-Geometry Approach to Prime Factorization
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Algebraic Geometry (math.AG); Number Theory (math.NT); Quantum Physics (quant-ph)
[60]  arXiv:2209.11647 [pdf, other]
Title: Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2209.11545 [pdf, other]
Title: Analysis on Blockchain Consensus Mechanism Based on Proof of Work and Proof of Stake
Authors: Shi Yan
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2209.11274 [pdf, other]
Title: Trusted IP solution in multi-tenant cloud FPGA platform
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[63]  arXiv:2209.11739 (cross-list from cs.CV) [pdf]
Title: Catoptric Light can be Dangerous: Effective Physical-World Attack by Natural Phenomenon
Comments: arXiv admin note: substantial text overlap with arXiv:2209.09652, arXiv:2209.02430
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2209.11595 (cross-list from cs.LG) [pdf, other]
Title: Differentially private partitioned variational inference
Comments: 30 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[65]  arXiv:2209.11531 (cross-list from eess.IV) [pdf, other]
Title: Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[ total of 65 entries: 1-65 ]
[ showing up to 100 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2209, contact, help  (Access key information)