We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 122 entries: 1-93 | 94-122 ]
[ showing 93 entries per page: fewer | more | all ]

Fri, 19 Apr 2024

[1]  arXiv:2404.12300 [pdf, ps, other]
Title: Proactive Software Supply Chain Risk Management Framework (P-SSCRM) Version 1
Authors: Laurie Williams (North Carolina State University), Sammy Migues (Imbricate Security), Jamie Boote (Synopsys), Ben Hutchison (Synopsys)
Comments: 17 pages, 3 figures, 2 tables, will not be submitted to a conference
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2404.12208 [pdf, ps, other]
Title: The Explicit values of the UBCT, the LBCT and the DBCT of the inverse function
Comments: This manuscript was submitted to Finite Fields and Their Application on April 8, 2024. arXiv admin note: text overlap with arXiv:2309.01881
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[3]  arXiv:2404.12093 [pdf, ps, other]
Title: Evaluating the Security of Merkle Trees in the Internet of Things: An Analysis of Data Falsification Probabilities
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2404.12043 [pdf, other]
Title: Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report
Comments: 7 pages, 1 figure, to be published at ACM conference on Innovation and Technology in Computer Science Education (ITiCSE 2024)
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2404.12011 [pdf, other]
Title: Pseudo-random generators using linear feedback shift registers with output extraction
Authors: Holger Nobach
Comments: 18 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2404.11977 [pdf, other]
Title: Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed
Comments: Preprint of Submitted Paper
Subjects: Cryptography and Security (cs.CR); Digital Libraries (cs.DL)
[7]  arXiv:2404.11815 [pdf, other]
Title: AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2404.12369 (cross-list from cs.LG) [pdf, other]
Title: KDk: A Defense Mechanism Against Label Inference Attacks in Vertical Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[9]  arXiv:2404.12186 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving UCB Decision Process Verification via zk-SNARKs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[10]  arXiv:2404.12135 (cross-list from cs.MA) [pdf, other]
Title: mABC: multi-Agent Blockchain-Inspired Collaboration for root cause analysis in micro-services architecture
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[11]  arXiv:2404.12125 (cross-list from cs.CY) [pdf, other]
Title: Intelligence Education made in Europe
Comments: 16 pages, 2 figures. No potential conflict of interest was reported by the authors
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[12]  arXiv:2404.12086 (cross-list from cs.CY) [pdf, other]
Title: Preserving Nature's Ledger: Blockchains in Biodiversity Conservation
Subjects: Computers and Society (cs.CY); Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Emerging Technologies (cs.ET)
[13]  arXiv:2404.12075 (cross-list from cs.HC) [pdf, other]
Title: E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting
Comments: 23 pages, 2024 IEEE Symposium on Security and Privacy
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[14]  arXiv:2404.12014 (cross-list from cs.CL) [pdf, other]
Title: Enhance Robustness of Language Models Against Variation Attack through Graph Integration
Comments: 12 pages, 4 figures, accepted by COLING 2024
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[15]  arXiv:2404.11962 (cross-list from cs.AI) [pdf, other]
Title: ©Plug-in Authorization for Human Content Copyright Protection in Text-to-Image Model
Comments: 20 pages, 6 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[16]  arXiv:2404.11905 (cross-list from cs.LG) [pdf, other]
Title: FedMID: A Data-Free Method for Using Intermediate Outputs as a Defense Mechanism Against Poisoning Attacks in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[17]  arXiv:2404.11763 (cross-list from cs.SE) [pdf, other]
Title: The Code the World Depends On: A First Look at Technology Makers' Open Source Software Dependencies
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[18]  arXiv:2404.11665 (cross-list from cs.LG) [pdf, other]
Title: Exploring DNN Robustness Against Adversarial Attacks Using Approximate Multipliers
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Thu, 18 Apr 2024

[19]  arXiv:2404.11473 [pdf, ps, other]
Title: Assessing The Effectiveness Of Current Cybersecurity Regulations And Policies In The US
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[20]  arXiv:2404.11410 [pdf, other]
Title: SERENE: A Collusion Resilient Replication-based Verification Framework
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[21]  arXiv:2404.11388 [pdf, ps, other]
Title: Enhancing Data Privacy In Wireless Sensor Networks: Investigating Techniques And Protocols To Protect Privacy Of Data Transmitted Over Wireless Sensor Networks In Critical Applications Of Healthcare And National Security
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[22]  arXiv:2404.11372 [pdf, other]
Title: S3PHER: Secure and Searchable System for Patient-driven HEalth data shaRing
Comments: 20 pages, 1 figure, 2 tables in the appendix
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2404.11338 [pdf, other]
Title: LLMs for Cyber Security: New Opportunities
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[24]  arXiv:2404.11325 [pdf, ps, other]
Title: On Learning Parities with Dependent Noise
Comments: This note draws heavily from arXiv:2404.03774
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[25]  arXiv:2404.11284 [pdf, other]
Title: Amplifying Main Memory-Based Timing Covert and Side Channels using Processing-in-Memory Operations
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[26]  arXiv:2404.11281 [pdf, other]
Title: SoK: Decentralized Finance (DeFi) -- Fundamentals, Taxonomy and Risks
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2404.11189 [pdf, other]
Title: The Writing is on the Wall: Analyzing the Boom of Inscriptions and its Impact on Rollup Performance and Cost Efficiency
Comments: Work in progress, exploring zkSync Era. More EVM chains will be added in the final version
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2404.11121 [pdf, other]
Title: TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment
Comments: arXiv admin note: text overlap with arXiv:2310.07152 by other authors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[29]  arXiv:2404.11107 [pdf, other]
Title: KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[30]  arXiv:2404.10800 [pdf, other]
Title: Advancing Network Intrusion Detection: Integrating Graph Neural Networks with Scattering Transform and Node2Vec for Enhanced Anomaly Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[31]  arXiv:2404.10796 [pdf, ps, other]
Title: Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective
Comments: Submitted to Computer & Security (Elsevier)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[32]  arXiv:2404.10792 [pdf, other]
Title: Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach
Comments: 15 pages, 4 figures, conference (ARC24)
Journal-ref: Applied Reconfigurable Computing. Architectures, Tools, and Applications. ARC 2024. Lecture Notes in Computer Science, vol 14553. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[33]  arXiv:2404.10790 [pdf, other]
Title: Multimodal Attack Detection for Action Recognition Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[34]  arXiv:2404.10789 [pdf, other]
Title: PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis
Comments: 9th IEEE European Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[35]  arXiv:2404.10788 [pdf, other]
Title: The Path To Autonomous Cyber Defense
Comments: 9 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[36]  arXiv:2404.10782 [pdf, ps, other]
Title: Quantifying AI Vulnerabilities: A Synthesis of Complexity, Dynamical Systems, and Game Theory
Authors: B Kereopa-Yorke
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[37]  arXiv:2404.10781 [pdf, ps, other]
Title: Authenticity in Authorship: The Writer's Integrity Framework for Verifying Human-Generated Text
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2404.10780 [pdf, ps, other]
Title: Phishing Website Detection Using a Combined Model of ANN and LSTM
Comments: Pages 9, Figures 5
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[39]  arXiv:2404.11467 (cross-list from cs.SE) [pdf, other]
Title: A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[40]  arXiv:2404.11450 (cross-list from cs.DB) [pdf, other]
Title: Real-Time Trajectory Synthesis with Local Differential Privacy
Comments: Accepted by ICDE 2024. Code is available at: this https URL
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[41]  arXiv:2404.11056 (cross-list from cs.LG) [pdf, other]
Title: LMEraser: Large Model Unlearning through Adaptive Prompt Tuning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[42]  arXiv:2404.10995 (cross-list from math.OC) [pdf, other]
Title: Clipped SGD Algorithms for Privacy Preserving Performative Prediction: Bias Amplification and Remedies
Comments: 22 pages, 11 figures
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[43]  arXiv:2404.10988 (cross-list from cs.CY) [pdf, other]
Title: From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises
Comments: Published in ACM ITiCSE 2024 conference proceedings, see this https URL
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[44]  arXiv:2404.10957 (cross-list from cs.LG) [pdf, other]
Title: Personalized Federated Learning via Stacking
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

Wed, 17 Apr 2024

[45]  arXiv:2404.10764 [pdf, other]
Title: Confidential Federated Computations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[46]  arXiv:2404.10715 [pdf, other]
Title: Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[47]  arXiv:2404.10659 [pdf, other]
Title: Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2404.10610 [pdf, other]
Title: Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2404.10602 [pdf, other]
Title: Exploring Post Quantum Cryptography with Quantum Key Distribution for Sustainable Mobile Network Architecture Design
Comments: This paper has been accepted for publication by the 33rd International Symposium on High-Performance Parallel and Distributed Computing (HPDC) 2024. The copyright is with the ACM and the final version will be published by the ACM
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[50]  arXiv:2404.10543 [pdf, other]
Title: Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2404.10491 [pdf, other]
Title: BoLD: Fast and Cheap Dispute Resolution
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[52]  arXiv:2404.10404 [pdf, other]
Title: Sisu: Decentralized Trustless Bridge For Full Ethereum Node
Authors: Billy Pham, Huy Le
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2404.10187 [pdf, other]
Title: SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
Comments: 20 pages, 1 figure, 8 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[54]  arXiv:2404.10092 [pdf, other]
Title: Integration of Federated Learning and Blockchain in Healthcare: A Tutorial
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2404.10012 [pdf, other]
Title: Optimizing Malware Detection in IoT Networks: Leveraging Resource-Aware Distributed Computing for Enhanced Security
Comments: arXiv admin note: substantial text overlap with arXiv:2404.08808
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[56]  arXiv:2404.10255 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Training-as-a-Service for On-Device Intelligence: Concept, Architectural Scheme, and Open Problems
Comments: 7 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[57]  arXiv:2404.10201 (cross-list from cs.DS) [pdf, other]
Title: Private Vector Mean Estimation in the Shuffle Model: Optimal Rates Require Many Messages
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[58]  arXiv:2404.10095 (cross-list from cs.CY) [pdf, other]
Title: Synthetic Census Data Generation via Multidimensional Multiset Sum
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[59]  arXiv:2404.10029 (cross-list from math.OC) [pdf, ps, other]
Title: Federated Learning on Riemannian Manifolds with Differential Privacy
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[60]  arXiv:2404.10026 (cross-list from eess.IV) [pdf, ps, other]
Title: Distributed Federated Learning-Based Deep Learning Model for Privacy MRI Brain Tumor Detection
Journal-ref: Journal of Information, Technology and Policy (2023): 1-12
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Tue, 16 Apr 2024 (showing first 33 of 46 entries)

[61]  arXiv:2404.09895 [pdf, other]
Title: Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security
Comments: IEEE Symposium on Security and Privacy (IEEE SP), 2024
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2404.09802 [pdf, other]
Title: The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[63]  arXiv:2404.09724 [pdf, other]
Title: Privacy-Preserving Federated Unlearning with Certified Client Removal
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2404.09681 [pdf, other]
Title: An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2404.09625 [pdf, other]
Title: Privacy-Preserving Intrusion Detection using Convolutional Neural Networks
Comments: Accepted at IEEE Conference on Artificial Intelligence (CAI) 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[66]  arXiv:2404.09599 [pdf, other]
Title: Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2404.09518 [pdf, ps, other]
Title: Bridging the Gap: Automated Analysis of Sancus
Comments: To appear at IEEE CSF 2024
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2404.09481 [pdf, other]
Title: SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[69]  arXiv:2404.09450 [pdf, ps, other]
Title: Crooked indifferentiability of the Feistel Construction
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2404.09442 [pdf, other]
Title: Correcting Subverted Random Oracles
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2404.09430 [pdf, other]
Title: On the Efficiency of Privacy Attacks in Federated Learning
Comments: To appear on FedVision 2024. EPAFL (this https URL)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[72]  arXiv:2404.09404 [pdf, other]
Title: EQO: Exploring Ultra-Efficient Private Inference with Winograd-Based Protocol and Quantization Co-Optimization
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2404.09395 [pdf, ps, other]
Title: Data Analysis Methods Preliminaries for a Photon-based Hardware Random Number Generator
Comments: Presented at College of STEM SYmposium, Clayton State University
Subjects: Cryptography and Security (cs.CR); Instrumentation and Detectors (physics.ins-det)
[74]  arXiv:2404.09352 [pdf, other]
Title: Counteracting Concept Drift by Learning with Future Malware Predictions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[75]  arXiv:2404.09288 [pdf, ps, other]
Title: New Class of Ciphers Using Hardware Entropy Source
Comments: 8 pages, 4 figures; ancillary file with a cipher - for cracking it we offer $1000, cf. this https URL
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2404.09286 [pdf, ps, other]
Title: Artificial Intelligence enhanced Security Problems in Real-Time Scenario using Blowfish Algorithm
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Information Retrieval (cs.IR)
[77]  arXiv:2404.09265 [pdf, other]
Title: Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning
Comments: Accepted In Proceedings of the 29th ACM Symposium on Access Control Models and Technologies (SACMAT '24)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[78]  arXiv:2404.09214 [pdf, other]
Title: PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
Comments: in Proc. of NDSS, 2024
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2404.09095 [pdf, ps, other]
Title: Pirates: Anonymous Group Calls Over Fully Untrusted Infrastructure
Comments: To appear at ACIPS 2024
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2404.09093 [pdf, ps, other]
Title: Gophy: Novel Proof-of-Useful-Work blockchain architecture for High Energy Physics
Comments: This is just a draft. Might be subjected to changes in the future
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2404.09088 [pdf, other]
Title: Projective Systematic Authentication via Reed-Muller Codes
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2404.09066 [pdf, other]
Title: CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG); Programming Languages (cs.PL)
[83]  arXiv:2404.09058 [pdf, other]
Title: GView: A Versatile Assistant for Security Researchers
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[84]  arXiv:2404.09052 [pdf, other]
Title: Enhancing Security Awareness Through Gamified Approaches
Comments: 18 pages, 15 figures and 2 tables
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2404.09026 [pdf, ps, other]
Title: SQIAsignHD: SQIsignHD Adaptor Signature
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2404.09005 [pdf, other]
Title: Proof-of-Learning with Incentive Security
Comments: 22 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Emerging Technologies (cs.ET); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[87]  arXiv:2404.08987 [pdf, other]
Title: On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2404.08818 [pdf, other]
Title: Empowering Malware Detection Efficiency within Processing-in-Memory Architecture
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[89]  arXiv:2404.08808 [pdf, other]
Title: Enhancing IoT Malware Detection through Adaptive Model Parallelism and Resource Optimization
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[90]  arXiv:2404.08793 [pdf, other]
Title: JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models
Comments: Submitted to VIS 2024
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Human-Computer Interaction (cs.HC)
[91]  arXiv:2404.08723 [pdf, ps, other]
Title: Identification of a replicable optical security element using laser speckle
Comments: 9 pages, 6 figures
Journal-ref: Optics & Laser Technology, 175, 110725 (2024)
Subjects: Cryptography and Security (cs.CR); Optics (physics.optics)
[92]  arXiv:2404.08716 [pdf, other]
Title: Securing Monolithic Kernels using Compartmentalization
Comments: 24 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[93]  arXiv:2404.09836 (cross-list from cs.SE) [pdf, other]
Title: How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[ total of 122 entries: 1-93 | 94-122 ]
[ showing 93 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2404, contact, help  (Access key information)