We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 102 entries: 1-65 | 66-102 ]
[ showing 65 entries per page: fewer | more | all ]

Wed, 30 Nov 2022

[1]  arXiv:2211.16304 [pdf, other]
Title: Analysis of Anomalous Behavior in Network Systems Using Deep Reinforcement Learning with CNN Architecture
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2211.16235 [pdf]
Title: DCDetector: An IoT terminal vulnerability mining system based on distributed deep ensemble learning under source code representation
Authors: Wen Zhou
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[3]  arXiv:2211.16212 [pdf, other]
Title: Control-Flow Integrity at RISC: Attacking RISC-V by Jump-Oriented Programming
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2211.16128 [pdf, ps, other]
Title: Trustless unknown-order groups
Comments: this https URL
Journal-ref: Mathematical Cryptology, 2022, 1 (2), pp.25-39
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[5]  arXiv:2211.16082 [pdf, other]
Title: Data Privacy Protection in DeFi Protocols
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[6]  arXiv:2211.15993 [pdf, other]
Title: An Empirical Study on Snapshot DAOs
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2211.15929 [pdf, other]
Title: Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[8]  arXiv:2211.15926 [pdf, other]
Title: Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[9]  arXiv:2211.15918 [pdf, other]
Title: Similarity Distribution based Membership Inference Attack on Person Re-identification
Comments: 9 pages, 7 figures, Accepted by AAAI 2023
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2211.15804 [pdf, other]
Title: Towards faster settlement in HTLC-based Cross-Chain Atomic Swaps
Authors: Subhra Mazumdar
Comments: Invited Submission (Security and Privacy) to The Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, 2022, 11 pages
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[11]  arXiv:2211.15784 [pdf, other]
Title: A Survey of Relevant Text Mining Technology
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2211.15732 [pdf, other]
Title: Cache Me If You Can: Accuracy-Aware Inference Engine for Differentially Private Data Exploration
Comments: To appear in VLDB'23
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[13]  arXiv:2211.16495 (cross-list from cs.LG) [pdf, other]
Title: Graph Neural Networks: A Powerful and Versatile Tool for Advancing Design, Reliability, and Security of ICs
Comments: to appear at ASPDAC'23
Subjects: Machine Learning (cs.LG); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[14]  arXiv:2211.16192 (cross-list from cs.CV) [pdf, other]
Title: Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[15]  arXiv:2211.16044 (cross-list from cs.SD) [pdf, other]
Title: Model Extraction Attack against Self-supervised Speech Models
Comments: Submitted to ICASSP 2023
Subjects: Sound (cs.SD); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[16]  arXiv:2211.15893 (cross-list from cs.LG) [pdf, other]
Title: Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[17]  arXiv:2211.15875 (cross-list from cs.LG) [pdf, other]
Title: Training Time Adversarial Attack Aiming the Vulnerability of Continual Learning
Comments: Accepted at NeurIPS 2022 ML Safety Workshop
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)

Tue, 29 Nov 2022

[18]  arXiv:2211.15417 [pdf, other]
Title: Proof-of-randomness protocol for blockchain consensus: the white paper version 1.0
Comments: 7 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[19]  arXiv:2211.15405 [pdf]
Title: Malware and Exploits on the Dark Web
Authors: Jonah Burgess
Comments: 5 pages, 0 figures
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2211.15404 [pdf]
Title: Modern DDoS Attacks and Defences -- Survey
Authors: Jonah Burgess
Comments: 6 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2211.15323 [pdf, other]
Title: Security Analysis of the Consumer Remote SIM Provisioning Protocol
Comments: 33 pages, 8 figures, Associated ProVerif model files located at this https URL
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2211.15013 [pdf, other]
Title: Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks
Comments: 12 Pages 16 Figures 3 Tables
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2211.14985 [pdf, other]
Title: CoMMA Protocol: Towards Complete Mitigation of Maximal Extractable Value (MEV) Attacks
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[24]  arXiv:2211.14952 [pdf, other]
Title: Federated Learning Attacks and Defenses: A Survey
Comments: IEEE BigData. 10 pages, 2 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[25]  arXiv:2211.14948 [pdf, other]
Title: Metaverse Security and Privacy: An Overview
Comments: IEEE BigData 2022. 10 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[26]  arXiv:2211.14790 [pdf, other]
Title: Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders
Comments: 10 pages, 5 figures, ICC 2023. arXiv admin note: text overlap with arXiv:2206.00385
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2211.14779 [pdf, other]
Title: Who is Gambling? Finding Cryptocurrency Gamblers Using Multi-modal Retrieval Methods
Journal-ref: International Journal of Multimedia Information Retrieval (2022): 1-13
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistical Finance (q-fin.ST)
[28]  arXiv:2211.14667 [pdf, other]
Title: Deep Fake Detection, Deterrence and Response: Challenges and Opportunities
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[29]  arXiv:2211.14647 [pdf, other]
Title: Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers
Comments: This paper is accepted at ASPLOS 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[30]  arXiv:2211.14642 [pdf, other]
Title: SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical
Comments: IEEE Security and Privacy 2023
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2211.14582 [pdf, other]
Title: Demystifying Bitcoin Address Behavior via Graph Neural Networks
Comments: This paper has been accepted by IEEE International Conference on Data Engineering 2023 (Second Research Round)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[32]  arXiv:2211.14444 [pdf]
Title: MiftyCoin (MFT): A Cryptocurrency Mined with Proof of Human Work
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2211.14442 [pdf, other]
Title: Contract-Backed Digital Cash
Comments: Editor: Fritz Henglein. Authors: Fritz Henglein (Chapters 1, 2, 3, 5), Fritz Henglein and Christian Olesen (Chapter 4), Gert Sylvest (Chapter 6), S{\o}ren Debois (Chapter 7), Morten C. Nielsen and Christian Olesen (Chapter 8)
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2211.14440 [pdf, other]
Title: Don't Watch Me: A Spatio-Temporal Trojan Attack on Deep-Reinforcement-Learning-Augment Autonomous Driving
Authors: Yinbo Yu, Jiajia Liu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[35]  arXiv:2211.14437 [pdf, other]
Title: Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture Models
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[36]  arXiv:2211.15557 (cross-list from cs.LG) [pdf, other]
Title: Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies
Comments: NeurIPS 2022 Workshop: Reinforcement Learning for Real Life
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[37]  arXiv:2211.15410 (cross-list from cs.LG) [pdf, other]
Title: Private Multi-Winner Voting for Machine Learning
Comments: Accepted at PoPETS 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[38]  arXiv:2211.15363 (cross-list from cs.CL) [pdf, other]
Title: On the Security Vulnerabilities of Text-to-SQL Models
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG); Software Engineering (cs.SE)
[39]  arXiv:2211.15356 (cross-list from cs.DS) [pdf, other]
Title: A quantum algorithm to estimate the closeness to the Strict Avalanche criterion in Boolean functions
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[40]  arXiv:2211.14886 (cross-list from cs.CY) [pdf, other]
Title: Managing Controlled Unclassified Information in Research Institutions
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[41]  arXiv:2211.14769 (cross-list from cs.AI) [pdf, other]
Title: Navigation as the Attacker Wishes? Towards Building Byzantine-Robust Embodied Agents under Federated Learning
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[42]  arXiv:2211.14428 (cross-list from cs.LG) [pdf, other]
Title: Utility Assessment of Synthetic Data Generation Methods
Comments: Published in Privacy in Statistical Databases Conference 2022 USB Proceedings
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Mon, 28 Nov 2022 (showing first 23 of 30 entries)

[43]  arXiv:2211.14233 [pdf, ps, other]
Title: strategFTO: Untimed control for timed opacity
Comments: This work is partially supported by the ANR-NRF French-Singaporean research program ProMiS (ANR-19-CE25-0015 / 2019 ANR NRF 0092) and the ANR research program BisoUS. Experiments presented in this paper were carried out using the Grid'5000 testbed, supported by a scientific interest group hosted by Inria and including CNRS, RENATER and several universities as well as other organizations
Journal-ref: Proceedings of the 8th International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS 2022)
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[44]  arXiv:2211.14206 [pdf, ps, other]
Title: McEliece cryptosystem based on Plotkin construction with QC-MDPC and QC-LDPC codes
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2211.14196 [pdf, other]
Title: Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2211.14062 [pdf, other]
Title: M$^2$M: A general method to perform various data analysis tasks from a differentially private sketch
Comments: Published at the 18th International Workshop on Security and Trust Management (STM 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[47]  arXiv:2211.13964 [pdf, other]
Title: Generating 2D and 3D Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution
Comments: accepted for publication in IEEE Transactions on Biometrics, Behavior, and Identity Science (TBIOM). This paper extends arXiv:2108.01077 that was accepted to IEEE FG 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[48]  arXiv:2211.13958 [pdf, other]
Title: Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2211.13955 [pdf, other]
Title: MPCViT: Searching for MPC-friendly Vision Transformer with Heterogeneous Attention
Comments: 6 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[50]  arXiv:2211.13907 [pdf, other]
Title: Blockchain based solution design for Energy Exchange Platform
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2211.13860 [pdf, other]
Title: Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning
Comments: Accepted for presentation and publication at the 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2211.13780 [pdf, other]
Title: CryptoLight: An Electro-Optical Accelerator for Fully Homomorphic Encryption
Comments: 6 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[53]  arXiv:2211.13737 [pdf, other]
Title: CycleGANWM: A CycleGAN watermarking method for ownership verification
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2211.13696 [pdf, other]
Title: FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[55]  arXiv:2211.13670 [pdf, other]
Title: SmartIntentNN: Towards Smart Contract Intent Detection
Comments: 4 pages, 3 figures, conference tool track. arXiv admin note: substantial text overlap with arXiv:2211.10724
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[56]  arXiv:2211.13554 [pdf]
Title: Quality-Based Conditional Processing in Multi-Biometrics: Application to Sensor Interoperability
Comments: Published at IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[57]  arXiv:2211.13546 [pdf, other]
Title: Number Theoretic Transform and Its Applications in Lattice-based Cryptosystems: A Survey
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2211.13542 [pdf, other]
Title: A Privacy-Preserving Outsourced Data Model in Cloud Environment
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[59]  arXiv:2211.13535 [pdf, other]
Title: Tracking Dataset IP Use in Deep Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[60]  arXiv:2211.13526 [pdf, other]
Title: Specognitor: Identifying Spectre Vulnerabilities via Prediction-Aware Symbolic Execution
Authors: Ali Sahraee
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Symbolic Computation (cs.SC); Software Engineering (cs.SE)
[61]  arXiv:2211.13498 [pdf, other]
Title: GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences
Comments: Accepted at QRS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[62]  arXiv:2211.13419 [pdf, other]
Title: Network Security Modelling with Distributional Data
Comments: Accepted and presented in CAMLIS 2022, this https URL arXiv admin note: text overlap with arXiv:2108.08924
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP)
[63]  arXiv:2211.13389 [pdf, other]
Title: FedCut: A Spectral Analysis Framework for Reliable Detection of Byzantine Colluders
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[64]  arXiv:2211.13345 [pdf, other]
Title: Principled Data-Driven Decision Support for Cyber-Forensic Investigations
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[65]  arXiv:2211.13335 [pdf, other]
Title: Ping-Pong Swaps
Comments: 7 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[ total of 102 entries: 1-65 | 66-102 ]
[ showing 65 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2211, contact, help  (Access key information)