We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 76 entries: 1-76 ]
[ showing up to 96 entries per page: fewer | more ]

Mon, 26 Sep 2022

[1]  arXiv:2209.11715 [pdf, other]
Title: The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
Comments: 19 pages, 23 figures. Code availability: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[2]  arXiv:2209.11650 [pdf, ps, other]
Title: An Algebraic-Geometry Approach to Prime Factorization
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Algebraic Geometry (math.AG); Number Theory (math.NT); Quantum Physics (quant-ph)
[3]  arXiv:2209.11647 [pdf, other]
Title: Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2209.11545 [pdf, other]
Title: Analysis on Blockchain Consensus Mechanism Based on Proof of Work and Proof of Stake
Authors: Shi Yan
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2209.11274 [pdf, other]
Title: Trusted IP solution in multi-tenant cloud FPGA platform
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[6]  arXiv:2209.11739 (cross-list from cs.CV) [pdf]
Title: Catoptric Light can be Dangerous: Effective Physical-World Attack by Natural Phenomenon
Comments: arXiv admin note: substantial text overlap with arXiv:2209.09652, arXiv:2209.02430
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[7]  arXiv:2209.11595 (cross-list from cs.LG) [pdf, other]
Title: Differentially private partitioned variational inference
Comments: 30 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[8]  arXiv:2209.11531 (cross-list from eess.IV) [pdf, other]
Title: Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Fri, 23 Sep 2022

[9]  arXiv:2209.11198 [pdf, other]
Title: A Dive into WhatsApp's End-to-End Encryption
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2209.11197 [pdf]
Title: An Overview of Phishing Victimization: Human Factors, Training and the Role of Emotions
Authors: Mousa Jari
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); General Literature (cs.GL); Human-Computer Interaction (cs.HC)
[11]  arXiv:2209.11196 [pdf]
Title: Perceived Security of E-Learning Portal
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2209.11194 [pdf, ps, other]
Title: On the Heritage of Crypto Assets -- Tales From the Crypt Protocol
Authors: Frédéric Prost (LIG, UGA)
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2209.11158 [pdf, other]
Title: Multi-Tenant Cloud FPGA: A Survey on Security
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[14]  arXiv:2209.11108 [pdf, other]
Title: Linking Contexts from Distinct Data Sources in Zero Trust Federation
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2209.11103 [pdf, other]
Title: To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild
Comments: 8 pages, to be published in the proceedings of The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2021), October 28-30, 2022, Wuhan, China
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[16]  arXiv:2209.11032 [pdf, other]
Title: DeepThought: a Reputation and Voting-based Blockchain Oracle
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[17]  arXiv:2209.11025 [pdf, other]
Title: Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2209.10908 [pdf, other]
Title: Improving Utility for Privacy-Preserving Analysis of Correlated Columns using Pufferfish Privacy
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2209.10717 [pdf, other]
Title: Talking Trojan: Analyzing an Industry-Wide Disclosure
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2209.11020 (cross-list from cs.CV) [pdf, other]
Title: Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models
Comments: This is a major revision of a paper titled "Inverting Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models" by the same authors that appears at IJCB 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[21]  arXiv:2209.10849 (cross-list from cs.HC) [pdf, other]
Title: You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[22]  arXiv:2209.10732 (cross-list from cs.LG) [pdf, other]
Title: In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Comments: To appear at NeurIPS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Thu, 22 Sep 2022

[23]  arXiv:2209.10457 [pdf, other]
Title: Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[24]  arXiv:2209.10414 [pdf, other]
Title: An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[25]  arXiv:2209.10412 [pdf, other]
Title: Scalable Discovery and Continuous Inventory of Personal Data at Rest in Cloud Native Systems
Comments: Preprint of 2022-09-09 before final copy-editing of an accepted peer-reviewed paper to appear in the Proceedings of the 20th International Conference on Service-Oriented Computing ICSOC 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Software Engineering (cs.SE)
[26]  arXiv:2209.10410 [pdf]
Title: Cold Supply Chain Planning including Smart Contracts: An Intelligent Blockchain-based approach
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2209.10407 [pdf]
Title: Adopting the Cybersecurity Concepts into Curriculum The Potential Effects on Students Cybersecurity Knowledge
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2209.10406 [pdf, other]
Title: Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[29]  arXiv:2209.10317 [pdf, other]
Title: Android Private Compute Core Architecture
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[30]  arXiv:2209.10240 [pdf, other]
Title: Fingerprinting Robot Movements via Acoustic Side Channel
Comments: 11 pages, 4 figures, 7 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[31]  arXiv:2209.10224 [pdf, other]
Title: Identifying Emerging Technologies and Leading Companies using Network Dynamics of Patent Clusters: a Cybersecurity Case Study
Comments: 24 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[32]  arXiv:2209.10179 [pdf, other]
Title: Reconstructing Robot Operations via Radio-Frequency Side-Channel
Comments: 10 pages, 7 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[33]  arXiv:2209.10125 [pdf, other]
Title: Interlude: Balancing Chaos And Harmony For Fair and Fast Blockchains
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT)
[34]  arXiv:2209.10119 [pdf, other]
Title: Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[35]  arXiv:2209.10083 [pdf, other]
Title: Federated Learning from Pre-Trained Models: A Contrastive Learning Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[36]  arXiv:2209.10321 (cross-list from cs.LO) [pdf, other]
Title: CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms
Authors: Dalton Chichester (University of Mary Washington), Wei Du (University at Albany-SUNY), Raymond Kauffman (University of Mary Washington), Hai Lin (Clarkson University), Christopher Lynch (Clarkson University), Andrew M. Marshall (University of Mary Washington), Catherine A. Meadows (Naval Research Laboratory), Paliath Narendran (University at Albany-SUNY), Veena Ravishankar (University of Mary Washington), Luis Rovira (University of Mary Washington), Brandon Rozek (Rensselaer Polytechnic Institute)
Comments: In Proceedings GandALF 2022, arXiv:2209.09333
Journal-ref: EPTCS 370, 2022, pp. 147-161
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[37]  arXiv:2209.10198 (cross-list from cs.AR) [pdf, other]
Title: HiRA: Hidden Row Activation for Reducing Refresh Latency of Off-the-Shelf DRAM Chips
Comments: To appear in the 55th IEEE/ACM International Symposium on Microarchitecture (MICRO), 2022
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[38]  arXiv:2209.10146 (cross-list from quant-ph) [pdf, other]
Title: Creating quantum-resistant classical-classical OWFs from quantum-classical OWFs
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[39]  arXiv:2209.10117 (cross-list from cs.IR) [pdf, other]
Title: A Comprehensive Survey on Trustworthy Recommender Systems
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40]  arXiv:2209.09996 (cross-list from cs.LG) [pdf, other]
Title: Audit and Improve Robustness of Private Neural Networks on Encrypted Data
Comments: 10 pages, 10 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[41]  arXiv:2209.09984 (cross-list from cs.LG) [pdf, other]
Title: Learning the Propagation of Worms in Wireless Sensor Networks
Comments: EAI WiCON 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Wed, 21 Sep 2022

[42]  arXiv:2209.09855 [pdf, other]
Title: Toward Identification and Characterization of IoT Software Update Practices
Comments: 11 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE)
[43]  arXiv:2209.09835 [pdf, other]
Title: EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware
Comments: This is the authors' version of the article accepted for publication at IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE 2022)
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2209.09769 [pdf, other]
Title: Peer-group Behaviour Analytics of Windows Authentications Events Using Hierarchical Bayesian Modelling
Comments: 6 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[45]  arXiv:2209.09653 [pdf, other]
Title: A Framework for Preserving Privacy and Cybersecurity in Brain-Computer Interfacing Applications
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2209.09652 [pdf]
Title: Adversarial Color Projection: A Projector-Based Physical Attack to DNNs
Comments: arXiv admin note: substantial text overlap with arXiv:2209.02430
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[47]  arXiv:2209.09631 [pdf, other]
Title: De-Identification of French Unstructured Clinical Notes for Machine Learning Tasks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[48]  arXiv:2209.09630 [pdf]
Title: Detection of Malicious Websites Using Machine Learning Techniques
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[49]  arXiv:2209.09624 [pdf, other]
Title: Robust Online and Distributed Mean Estimation Under Adversarial Data Corruption
Comments: 8 pages, 5 figures, 61st IEEE Conference on Decision and Control (CDC)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multiagent Systems (cs.MA); Systems and Control (eess.SY)
[50]  arXiv:2209.09584 [pdf, other]
Title: Non-Disclosing Credential On-chaining for Blockchain-based Decentralized Applications
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2209.09577 [pdf, other]
Title: Understanding Real-world Threats to Deep Learning Models in Android Apps
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2209.09557 [pdf, other]
Title: CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks
Comments: To appear in CCS'22
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2209.09424 [pdf, other]
Title: PolyMPCNet: Towards ReLU-free Neural Architecture Search in Two-party Computation Based Private Inference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[54]  arXiv:2209.09388 [pdf]
Title: An Owner-managed Indirect-Permission Social Authentication Method for Private Key Recovery
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2209.09688 (cross-list from cs.LG) [pdf, other]
Title: Sparse Vicious Attacks on Graph Neural Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[56]  arXiv:2209.09642 (cross-list from cs.LG) [pdf]
Title: A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique
Comments: 20 pages, 6 tables, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Tue, 20 Sep 2022

[57]  arXiv:2209.09033 [pdf, other]
Title: A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[58]  arXiv:2209.08936 [pdf, other]
Title: Automated Implementation of Windows-related Security-Configuration Guides
Journal-ref: Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE '20), September 21--25, 2020, Virtual Event, Australia
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[59]  arXiv:2209.08921 [pdf, other]
Title: Towards Standardized Mobility Reports with User-Level Privacy
Subjects: Cryptography and Security (cs.CR); Other Computer Science (cs.OH)
[60]  arXiv:2209.08893 [pdf, other]
Title: A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse
Comments: 12 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2209.08853 [pdf, other]
Title: Automated Identification of Security-Relevant Configuration Settings Using NLP
Comments: Peer-reviewed version accepted for publication in the Industry Showcase track at the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE '22), October 10--14, 2022, Rochester, MI, USA
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[62]  arXiv:2209.08824 [pdf, other]
Title: Hardening with Scapolite: a DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations
Comments: We submitted this article as a full-length paper. Unfortunately, the CODASPY Program Committee decided that our paper can only be accepted in the tool track. Thus, the published version only consists of 6 pages
Journal-ref: Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY '22), April 24--27, 2022, Baltimore, MD, USA
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[63]  arXiv:2209.08773 [pdf, other]
Title: CATER: Intellectual Property Protection on Text Generation APIs via Conditional Watermarks
Comments: accepted to NeurIPS 2022
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2209.08673 [pdf, other]
Title: Proofs of Proof-of-Stake with Sublinear Complexity
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2209.08541 [pdf, other]
Title: Distribution inference risks: Identifying and mitigating sources of leakage
Comments: 14 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2209.08463 [pdf, other]
Title: Active Defense Analysis of Blockchain Forking through the Spatial-Temporal Lens
Comments: 10 pages,10 figures
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2209.08370 [pdf, other]
Title: Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens
Comments: 2022 Engineering Graduate Research Symposium (EGRS)
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2209.08356 [pdf, other]
Title: Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering
Comments: 14th annual Graduate Academic Conference (GAC). arXiv admin note: text overlap with arXiv:2105.00132
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2209.09197 (cross-list from cs.AR) [pdf, other]
Title: Exploiting Nanoelectronic Properties of Memory Chips for Prevention of IC Counterfeiting
Comments: 5 pages, 5 figures, accepted in IEEE NANO 2022
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70]  arXiv:2209.09117 (cross-list from cs.CV) [pdf, other]
Title: Part-Based Models Improve Adversarial Robustness
Comments: Code can be found at this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[71]  arXiv:2209.09024 (cross-list from cs.LG) [pdf, other]
Title: Dataset Inference for Self-Supervised Models
Comments: Accepted at NeurIPS 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[72]  arXiv:2209.09008 (cross-list from cs.IT) [pdf, other]
Title: Encrypted Semantic Communication Using Adversarial Training for Privacy Preserving
Comments: submitted to IEEE Wireless Communications Letters
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[73]  arXiv:2209.08744 (cross-list from cs.LG) [pdf, other]
Title: AdvDO: Realistic Adversarial Attacks for Trajectory Prediction
Comments: To appear in ECCV 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[74]  arXiv:2209.08615 (cross-list from cs.LG) [pdf, other]
Title: Membership Inference Attacks and Generalization: A Causal Perspective
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[75]  arXiv:2209.08467 (cross-list from cs.LG) [pdf, other]
Title: Hierarchical fuzzy neural networks with privacy preservation for heterogeneous big data
Journal-ref: IEEE Transactions on Fuzzy Systems, vol. 29, no. 1, pp. 46-58, Jan. 2021
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[76]  arXiv:2209.08412 (cross-list from cs.LG) [pdf, other]
Title: pFedDef: Defending Grey-Box Attacks for Personalized Federated Learning
Comments: 16 pages, 5 figures (11 images if counting sub-figures separately), longer version of paper submitted to CrossFL 2022 poster workshop, code available at (this https URL)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 76 entries: 1-76 ]
[ showing up to 96 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2209, contact, help  (Access key information)