We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 77 entries: 1-50 | 51-77 ]
[ showing 50 entries per page: fewer | more | all ]

Fri, 1 Jul 2022

[1]  arXiv:2206.15139 [pdf, other]
Title: Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service
Comments: 35 pages, 18 figures, 7 tables
Journal-ref: ACM Transactions on Privacy and Security (2022)
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[2]  arXiv:2206.15089 [pdf, other]
Title: Fairness and Cost Constrained Privacy-Aware Record Linkage
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2206.15068 [pdf, ps, other]
Title: Accountable Private Set Cardinality for Distributed Measurement
Comments: Includes additional appendix over version published in ACM TOPS. 37 pages, 11 figures
Journal-ref: ACM Transactions on Privacy and Security, Vol. 25, No. 4, Article 25. Publication date: May 2022
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2206.15055 [pdf, other]
Title: Efficient Collective Action for Tackling Time-Critical Cybersecurity Threats
Comments: 23 pages, 3 figures. Presented at the 21st Workshop on the Economics of Information Security (WEIS), 2022, Tulsa, USA
Subjects: Cryptography and Security (cs.CR); Physics and Society (physics.soc-ph)
[5]  arXiv:2206.14980 [pdf, ps, other]
Title: On the image of an affine subspace under the inverse function within a finite field
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[6]  arXiv:2206.14977 [pdf, other]
Title: Multiple Targets Directed Greybox Fuzzing
Comments: 14 pages, 5 figures, 10 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[7]  arXiv:2206.14929 (cross-list from quant-ph) [pdf, ps, other]
Title: Succinct Classical Verification of Quantum Computation
Comments: CRYPTO 2022
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Thu, 30 Jun 2022

[8]  arXiv:2206.14782 [pdf, ps, other]
Title: Implementation of Ethereum Accounts and Transactions on Embedded IoT Devices
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2206.14567 [pdf, other]
Title: Contributions to Context-Aware Smart Healthcare: A Security and Privacy Perspective
Authors: Edgar Batista
Comments: Doctoral thesis
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[10]  arXiv:2206.14560 [pdf, ps, other]
Title: A note on a Code-Based Signature Scheme
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2206.14547 [pdf, ps, other]
Title: A Novel Attack to the Permuted Kernel Problem
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2206.14539 [pdf, other]
Title: Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
Comments: The 17th International Conference on Availability, Reliability and Security (ARES 2022), 8 pages
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2206.14519 [pdf, other]
Title: Effect of Auditory Stimuli on Electroencephalography-based Authentication
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2206.14346 [pdf, other]
Title: A Deep Learning Approach to Create DNS Amplification Attacks
Comments: 12 pages, 6 figures, Conference: to 2022 4th International Conference on Management Science and Industrial Engineering (MSIE) (MSIE 2022), DOI: this https URL, accepted to conference above, not yet published
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2206.14341 [pdf]
Title: CoAP-DoS: An IoT Network Intrusion Dataset
Comments: 6 pages, 8 figures, Publication Title: 2022 6th International Conference on Cryptography, Security and Privacy (CSP), eCF Paper Id: 1641864704381, accepted for publishing, not yet published
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[16]  arXiv:2206.14317 [pdf, ps, other]
Title: Quantitative Verification of Opacity Properties in Security Systems
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2206.14304 [pdf, other]
Title: Indistinguishability Obfuscation of Circuits and its Application in Security
Authors: Shilun Li, Zijing Di
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[18]  arXiv:2206.14772 (cross-list from cs.LG) [pdf, other]
Title: IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound
Comments: ICML 2022 Workshop on Formal Verification of Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[19]  arXiv:2206.14724 (cross-list from cs.LG) [pdf, other]
Title: Private Graph Extraction via Feature Explanations
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[20]  arXiv:2206.14527 (cross-list from cs.SE) [pdf, other]
Title: Challenges of mapping Vulnerabilities and Exposures to Open-Source Packages
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[21]  arXiv:2206.14477 (cross-list from cs.LG) [pdf, ps, other]
Title: Adversarial Ensemble Training by Jointly Learning Label Dependencies and Member Models
Authors: Lele Wang, Bin Liu
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[22]  arXiv:2206.14449 (cross-list from math.ST) [pdf, other]
Title: Hypothesis Testing for Differentially Private Linear Regression
Comments: 62 pages, 18 figures
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR)
[23]  arXiv:2206.14439 (cross-list from cs.LG) [pdf, other]
Title: Approximate Data Deletion in Generative Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[24]  arXiv:2206.14371 (cross-list from stat.ML) [pdf, other]
Title: Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
Comments: A preprint work
Subjects: Machine Learning (stat.ML); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2206.14356 (cross-list from cs.IT) [pdf, other]
Title: Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation
Comments: This paper is submitted to IEICE Trans. Fundamentals
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[26]  arXiv:2206.14201 (cross-list from cs.IT) [pdf, ps, other]
Title: $\mathbb{Z}_p\mathbb{Z}_{p^2}$-additive cyclic codes: kernel and rank
Authors: Xuan Wang, Minjia Shi
Comments: arXiv admin note: text overlap with arXiv:2206.13810
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)

Wed, 29 Jun 2022

[27]  arXiv:2206.14136 [pdf, other]
Title: Gender Bias in Password Managers
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[28]  arXiv:2206.14107 [pdf, ps, other]
Title: Special subsets of addresses for blockchains using the secp256k1 curve
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2206.14076 [pdf, other]
Title: Reasoning about Moving Target Defense in Attack Modeling Formalisms
Subjects: Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[30]  arXiv:2206.13889 [pdf, other]
Title: Parallel Instance Filtering for Malware Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2206.13660 [pdf, other]
Title: DF-SCA: Dynamic Frequency Side Channel Attacks are Practical
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2206.13614 [pdf, other]
Title: Measuring and Clustering Network Attackers using Medium-Interaction Honeypots
Comments: In Proceedings of the 7th IEEE EuroS&P Workshop on Traffic Measurements for Cybersecurity (WTMC 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[33]  arXiv:2206.13599 [pdf, other]
Title: Nowhere to Hide: Detecting Obfuscated Fingerprinting Scripts
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2206.13594 [pdf, other]
Title: Cyber Network Resilience against Self-Propagating Malware Attacks
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR); Dynamical Systems (math.DS); Spectral Theory (math.SP); Applications (stat.AP)
[35]  arXiv:2206.14157 (cross-list from cs.LG) [pdf, other]
Title: How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection
Comments: ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[36]  arXiv:2206.14004 (cross-list from cs.LG) [pdf, other]
Title: On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Comments: 9 pages, appendix: 2 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[37]  arXiv:2206.13991 (cross-list from cs.LG) [pdf, other]
Title: Increasing Confidence in Adversarial Robustness Evaluations
Comments: Oral at CVPR 2022 Workshop (Art of Robustness). Project website this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[38]  arXiv:2206.13810 (cross-list from cs.IT) [pdf, ps, other]
Title: Gray Images of Cyclic Codes over $\mathbb{Z}_{p^2}$ and $\mathbb{Z}_p\mathbb{Z}_{p^2}
Authors: Minjia Shi, Xuan Wang
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[39]  arXiv:2206.13787 (cross-list from cs.LG) [pdf, other]
Title: Improving Correlation Capture in Generating Imbalanced Data using Differentially Private Conditional GANs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)

Tue, 28 Jun 2022 (showing first 11 of 25 entries)

[40]  arXiv:2206.13358 [pdf, other]
Title: FIDO2 With Two Displays$\unicode{x2013}$Or How to Protect Security-Critical Web Transactions Against Malware Attacks
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2206.13350 [pdf, ps, other]
Title: Intractable Group-theoretic Problems Around Zero-knowledge Proofs
Authors: Cansu Betin Onur
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[42]  arXiv:2206.13172 [pdf, ps, other]
Title: Comment on "Provably secure biometric-based client-server secure communication over unreliable networks"
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2206.13144 [pdf]
Title: An Indirect Social Trust Model for Vehicular Social Networks Using Evolving Graph Theory
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2206.13104 [pdf, other]
Title: Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Graphs
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2206.13055 [pdf, other]
Title: Decentralized Identifier-based Privacy-preserving Authenticated Key Exchange Protocol for Electric Vehicle Charging in Smart Grid
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2206.13050 [pdf, other]
Title: Libra: High-Utility Anonymization of Event Logs for Process Mining via Subsampling
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2206.13046 [pdf, other]
Title: DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[48]  arXiv:2206.12970 [pdf, ps, other]
Title: Cost-Asymmetric Memory Hard Password Hashing
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2206.12944 [pdf, other]
Title: Don't Look Up: Ubiquitous Data Exfiltration Pathways in Commercial Spaces
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2206.12864 [pdf, ps, other]
Title: A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications
Subjects: Cryptography and Security (cs.CR)
[ total of 77 entries: 1-50 | 51-77 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2207, contact, help  (Access key information)