We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 77 entries: 1-77 ]
[ showing up to 91 entries per page: fewer | more ]

Fri, 1 Jul 2022

[1]  arXiv:2206.15139 [pdf, other]
Title: Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service
Comments: 35 pages, 18 figures, 7 tables
Journal-ref: ACM Transactions on Privacy and Security (2022)
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[2]  arXiv:2206.15089 [pdf, other]
Title: Fairness and Cost Constrained Privacy-Aware Record Linkage
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2206.15068 [pdf, ps, other]
Title: Accountable Private Set Cardinality for Distributed Measurement
Comments: Includes additional appendix over version published in ACM TOPS. 37 pages, 11 figures
Journal-ref: ACM Transactions on Privacy and Security, Vol. 25, No. 4, Article 25. Publication date: May 2022
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2206.15055 [pdf, other]
Title: Efficient Collective Action for Tackling Time-Critical Cybersecurity Threats
Comments: 23 pages, 3 figures. Presented at the 21st Workshop on the Economics of Information Security (WEIS), 2022, Tulsa, USA
Subjects: Cryptography and Security (cs.CR); Physics and Society (physics.soc-ph)
[5]  arXiv:2206.14980 [pdf, ps, other]
Title: On the image of an affine subspace under the inverse function within a finite field
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[6]  arXiv:2206.14977 [pdf, other]
Title: Multiple Targets Directed Greybox Fuzzing
Comments: 14 pages, 5 figures, 10 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[7]  arXiv:2206.14929 (cross-list from quant-ph) [pdf, ps, other]
Title: Succinct Classical Verification of Quantum Computation
Comments: CRYPTO 2022
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Thu, 30 Jun 2022

[8]  arXiv:2206.14782 [pdf, ps, other]
Title: Implementation of Ethereum Accounts and Transactions on Embedded IoT Devices
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2206.14567 [pdf, other]
Title: Contributions to Context-Aware Smart Healthcare: A Security and Privacy Perspective
Authors: Edgar Batista
Comments: Doctoral thesis
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[10]  arXiv:2206.14560 [pdf, ps, other]
Title: A note on a Code-Based Signature Scheme
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2206.14547 [pdf, ps, other]
Title: A Novel Attack to the Permuted Kernel Problem
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2206.14539 [pdf, other]
Title: Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
Comments: The 17th International Conference on Availability, Reliability and Security (ARES 2022), 8 pages
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2206.14519 [pdf, other]
Title: Effect of Auditory Stimuli on Electroencephalography-based Authentication
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2206.14346 [pdf, other]
Title: A Deep Learning Approach to Create DNS Amplification Attacks
Comments: 12 pages, 6 figures, Conference: to 2022 4th International Conference on Management Science and Industrial Engineering (MSIE) (MSIE 2022), DOI: this https URL, accepted to conference above, not yet published
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2206.14341 [pdf]
Title: CoAP-DoS: An IoT Network Intrusion Dataset
Comments: 6 pages, 8 figures, Publication Title: 2022 6th International Conference on Cryptography, Security and Privacy (CSP), eCF Paper Id: 1641864704381, accepted for publishing, not yet published
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[16]  arXiv:2206.14317 [pdf, ps, other]
Title: Quantitative Verification of Opacity Properties in Security Systems
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2206.14304 [pdf, other]
Title: Indistinguishability Obfuscation of Circuits and its Application in Security
Authors: Shilun Li, Zijing Di
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[18]  arXiv:2206.14772 (cross-list from cs.LG) [pdf, other]
Title: IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound
Comments: ICML 2022 Workshop on Formal Verification of Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[19]  arXiv:2206.14724 (cross-list from cs.LG) [pdf, other]
Title: Private Graph Extraction via Feature Explanations
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[20]  arXiv:2206.14527 (cross-list from cs.SE) [pdf, other]
Title: Challenges of mapping Vulnerabilities and Exposures to Open-Source Packages
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[21]  arXiv:2206.14477 (cross-list from cs.LG) [pdf, ps, other]
Title: Adversarial Ensemble Training by Jointly Learning Label Dependencies and Member Models
Authors: Lele Wang, Bin Liu
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[22]  arXiv:2206.14449 (cross-list from math.ST) [pdf, other]
Title: Hypothesis Testing for Differentially Private Linear Regression
Comments: 62 pages, 18 figures
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR)
[23]  arXiv:2206.14439 (cross-list from cs.LG) [pdf, other]
Title: Approximate Data Deletion in Generative Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[24]  arXiv:2206.14371 (cross-list from stat.ML) [pdf, other]
Title: Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
Comments: A preprint work
Subjects: Machine Learning (stat.ML); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2206.14356 (cross-list from cs.IT) [pdf, other]
Title: Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation
Comments: This paper is submitted to IEICE Trans. Fundamentals
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[26]  arXiv:2206.14201 (cross-list from cs.IT) [pdf, ps, other]
Title: $\mathbb{Z}_p\mathbb{Z}_{p^2}$-additive cyclic codes: kernel and rank
Authors: Xuan Wang, Minjia Shi
Comments: arXiv admin note: text overlap with arXiv:2206.13810
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)

Wed, 29 Jun 2022

[27]  arXiv:2206.14136 [pdf, other]
Title: Gender Bias in Password Managers
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[28]  arXiv:2206.14107 [pdf, ps, other]
Title: Special subsets of addresses for blockchains using the secp256k1 curve
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2206.14076 [pdf, other]
Title: Reasoning about Moving Target Defense in Attack Modeling Formalisms
Subjects: Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[30]  arXiv:2206.13889 [pdf, other]
Title: Parallel Instance Filtering for Malware Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2206.13660 [pdf, other]
Title: DF-SCA: Dynamic Frequency Side Channel Attacks are Practical
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2206.13614 [pdf, other]
Title: Measuring and Clustering Network Attackers using Medium-Interaction Honeypots
Comments: In Proceedings of the 7th IEEE EuroS&P Workshop on Traffic Measurements for Cybersecurity (WTMC 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[33]  arXiv:2206.13599 [pdf, other]
Title: Nowhere to Hide: Detecting Obfuscated Fingerprinting Scripts
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2206.13594 [pdf, other]
Title: Cyber Network Resilience against Self-Propagating Malware Attacks
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR); Dynamical Systems (math.DS); Spectral Theory (math.SP); Applications (stat.AP)
[35]  arXiv:2206.14157 (cross-list from cs.LG) [pdf, other]
Title: How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection
Comments: ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[36]  arXiv:2206.14004 (cross-list from cs.LG) [pdf, other]
Title: On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Comments: 9 pages, appendix: 2 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[37]  arXiv:2206.13991 (cross-list from cs.LG) [pdf, other]
Title: Increasing Confidence in Adversarial Robustness Evaluations
Comments: Oral at CVPR 2022 Workshop (Art of Robustness). Project website this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[38]  arXiv:2206.13810 (cross-list from cs.IT) [pdf, ps, other]
Title: Gray Images of Cyclic Codes over $\mathbb{Z}_{p^2}$ and $\mathbb{Z}_p\mathbb{Z}_{p^2}
Authors: Minjia Shi, Xuan Wang
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[39]  arXiv:2206.13787 (cross-list from cs.LG) [pdf, other]
Title: Improving Correlation Capture in Generating Imbalanced Data using Differentially Private Conditional GANs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)

Tue, 28 Jun 2022

[40]  arXiv:2206.13358 [pdf, other]
Title: FIDO2 With Two Displays$\unicode{x2013}$Or How to Protect Security-Critical Web Transactions Against Malware Attacks
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2206.13350 [pdf, ps, other]
Title: Intractable Group-theoretic Problems Around Zero-knowledge Proofs
Authors: Cansu Betin Onur
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[42]  arXiv:2206.13172 [pdf, ps, other]
Title: Comment on "Provably secure biometric-based client-server secure communication over unreliable networks"
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2206.13144 [pdf]
Title: An Indirect Social Trust Model for Vehicular Social Networks Using Evolving Graph Theory
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2206.13104 [pdf, other]
Title: Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Graphs
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2206.13055 [pdf, other]
Title: Decentralized Identifier-based Privacy-preserving Authenticated Key Exchange Protocol for Electric Vehicle Charging in Smart Grid
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2206.13050 [pdf, other]
Title: Libra: High-Utility Anonymization of Event Logs for Process Mining via Subsampling
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2206.13046 [pdf, other]
Title: DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[48]  arXiv:2206.12970 [pdf, ps, other]
Title: Cost-Asymmetric Memory Hard Password Hashing
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2206.12944 [pdf, other]
Title: Don't Look Up: Ubiquitous Data Exfiltration Pathways in Commercial Spaces
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2206.12864 [pdf, ps, other]
Title: A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2206.12790 [pdf, other]
Title: APPFLChain: A Privacy Protection Distributed Artificial-Intelligence Architecture Based on Federated Learning and Consortium Blockchain
Comments: 16 pages, 16 figures, 5 tables, journal paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB); Machine Learning (cs.LG)
[52]  arXiv:2206.12770 [pdf]
Title: Malware Detection and Prevention using Artificial Intelligence Techniques
Journal-ref: 2021 IEEE International Conference on Big Data (Big Data)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[53]  arXiv:2206.12447 [pdf, other]
Title: XMD: An Expansive Hardware-telemetry based Malware Detector to enhance Endpoint Detection
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2206.13330 (cross-list from quant-ph) [pdf, other]
Title: Multi-agent blind quantum computation without universal cluster state
Authors: Shuxiang Cao
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[55]  arXiv:2206.13230 (cross-list from cs.NI) [pdf, other]
Title: Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale
Comments: this https URL
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[56]  arXiv:2206.13083 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Example Detection in Deployed Tree Ensembles
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[57]  arXiv:2206.12888 (cross-list from cs.DC) [pdf, other]
Title: WebAssembly as a Common Layer for the Cloud-edge Continuum
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Journal-ref: FRAME'22: Proceedings of the 2nd Workshop on Flexible Resource and Application Management on the Edge, co-located with HPDC'22, July 2022, pp. 3-8
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[58]  arXiv:2206.12766 (cross-list from cs.DB) [pdf]
Title: Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Journal-ref: 2021 IEEE International Conference on Digital Health (ICDH)
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[59]  arXiv:2206.12749 (cross-list from cs.LG) [pdf, ps, other]
Title: Design and Analysis of Robust Resilient Diffusion over Multi-Task Networks Against Byzantine Attacks
Comments: 16 pages, 22 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[60]  arXiv:2206.12714 (cross-list from cs.CV) [pdf, other]
Title: Defending Multimodal Fusion Models against Single-Source Adversaries
Comments: CVPR 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[61]  arXiv:2206.12685 (cross-list from cs.CV) [pdf]
Title: Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising
Journal-ref: IAES International Journal of Artificial Intelligence, Vol. 11, No. 3, September 2022, pp. 961~968, ISSN: 2252-8938
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[62]  arXiv:2206.12669 (cross-list from cs.IT) [pdf, other]
Title: Crypto Makes AI Evolve
Authors: Behrouz Zolfaghari (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Elnaz Rabieinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Abbas Yazdinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Reza M. Parizi (College of Computing and Software Engineering, Kennesaw State University, GA, USA), Ali Dehghantanha (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[63]  arXiv:2206.12654 (cross-list from cs.LG) [pdf, other]
Title: BackdoorBench: A Comprehensive Benchmark of Backdoor Learning
Comments: 30 pages, 14 figures, 10 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[64]  arXiv:2206.12527 (cross-list from eess.SP) [pdf, other]
Title: Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids
Comments: 5 pages, 5 figures
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)

Mon, 27 Jun 2022

[65]  arXiv:2206.12251 [pdf]
Title: Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[66]  arXiv:2206.12236 [pdf, other]
Title: Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison
Comments: Accepted by EAI SecureComm 2022, 20 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2206.12227 [pdf, other]
Title: Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[68]  arXiv:2206.12224 [pdf, other]
Title: MPClan: Protocol Suite for Privacy-Conscious Computations
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (cs.LG)
[69]  arXiv:2206.12093 [pdf, ps, other]
Title: An Improved Lattice-Based Ring Signature with Unclaimable Anonymity in the Standard Model
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2206.11974 [pdf, other]
Title: Keep Your Transactions On Short Leashes
Authors: Bennet Yee
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2206.11961 [pdf, ps, other]
Title: LRPC codes with multiple syndromes: near ideal-size KEMs without ideals
Comments: 31 pages
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2206.12401 (cross-list from cs.IR) [pdf, other]
Title: Debiasing Learning for Membership Inference Attacks Against Recommender Systems
Comments: Accepted by KDD 2022
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[73]  arXiv:2206.12395 (cross-list from cs.LG) [pdf, other]
Title: Data Leakage in Federated Averaging
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[74]  arXiv:2206.12270 (cross-list from cs.LG) [pdf, other]
Title: Using Autoencoders on Differentially Private Federated Learning GANs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[75]  arXiv:2206.12183 (cross-list from cs.LG) [pdf, other]
Title: "You Can't Fix What You Can't Measure": Privately Measuring Demographic Performance Disparities in Federated Learning
Comments: 14 pages, 6 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[76]  arXiv:2206.12100 (cross-list from cs.LG) [pdf, other]
Title: zPROBE: Zero Peek Robustness Checks for Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[77]  arXiv:2206.11973 (cross-list from q-fin.RM) [pdf]
Title: Liquidity Risks in Lending Protocols (LPs): Evidence from Aave Protocol
Authors: Xiaotong Sun
Subjects: Risk Management (q-fin.RM); Cryptography and Security (cs.CR); Computational Finance (q-fin.CP); Trading and Market Microstructure (q-fin.TR)
[ total of 77 entries: 1-77 ]
[ showing up to 91 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2206, contact, help  (Access key information)