We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 59

[ total of 143 entries: 1-100 | 60-143 ]
[ showing 100 entries per page: fewer | more | all ]

Thu, 9 May 2024 (continued, showing last 5 of 26 entries)

[60]  arXiv:2405.04691 [pdf, other]
Title: Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and Fast Search
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[61]  arXiv:2405.04561 [pdf, other]
Title: Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums
Comments: 6 pages
Journal-ref: 2023 14th International Conference on Information and Communication Technology Convergence (ICTC)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[62]  arXiv:2405.04554 [pdf, other]
Title: Differentially Private Synthetic Data with Private Density Estimation
Comments: Accepted to ISIT 2024
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Statistics Theory (math.ST); Machine Learning (stat.ML)
[63]  arXiv:2405.04551 [pdf, other]
Title: Differentially Private Federated Learning without Noise Addition: When is it Possible?
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2405.04762 (cross-list from cs.DC) [pdf, ps, other]
Title: Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why is a Lot of Randomness is Needed?
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)

Wed, 8 May 2024

[65]  arXiv:2405.04528 [pdf, other]
Title: Implementing ISO/IEC TS 27560:2023 Consent Records and Receipts for GDPR and DGA
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2405.04526 [pdf, ps, other]
Title: PoW Security-Latency under Random Delays and the Effect of Transaction Fees
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Discrete Mathematics (cs.DM); Information Theory (cs.IT)
[67]  arXiv:2405.04463 [pdf, other]
Title: Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2405.04420 [pdf, other]
Title: Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2405.04373 [pdf, other]
Title: Leveraging LSTM and GAN for Modern Malware Detection
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[70]  arXiv:2405.04355 [pdf, other]
Title: SmmPack: Obfuscation for SMM Modules with TPM Sealed Key
Comments: 21 pages, 7 figures, 4 tables. Accepted at the 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2024)
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2405.04332 [pdf, other]
Title: WALLETRADAR: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets
Comments: Just accepted by the Automated Software Engineering Journal
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2405.04198 [pdf, other]
Title: Enhancing Physical Layer Communication Security through Generative AI with Mixture of Experts
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2405.04168 [pdf, other]
Title: Three variations of Heads or Tails Game for Bitcoin
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Probability (math.PR)
[74]  arXiv:2405.04152 [pdf, other]
Title: CAKE: Sharing Slices of Confidential Data on Blockchain
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2405.04138 [pdf, ps, other]
Title: GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective Awareness
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[76]  arXiv:2405.04115 [pdf, other]
Title: A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning
Comments: Accepted to CVPR 2024
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2405.04109 [pdf, other]
Title: The Malware as a Service ecosystem
Comments: To appear in D Gritzalis, KKR Choo, C Patsakis, "Malware - Handbook of Prevention and Detection", Springer (Advances in Information Security)
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2405.04108 [pdf, other]
Title: A2-DIDM: Privacy-preserving Accumulator-enabled Auditing for Distributed Identity of DNN Model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[79]  arXiv:2405.04095 [pdf, other]
Title: Going Proactive and Explanatory Against Malware Concept Drift
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[80]  arXiv:2405.04068 [pdf, other]
Title: An Improved Reversible Data Hiding Algorithm Based on Reconstructed Mapping for PVO-k
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2405.04049 [pdf, other]
Title: Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks
Comments: 7 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[82]  arXiv:2405.04046 [pdf, ps, other]
Title: MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2405.04032 [pdf, other]
Title: Locally Differentially Private In-Context Learning
Comments: This paper was published at LREC-Coling 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[84]  arXiv:2405.04029 [pdf, other]
Title: Enabling Privacy-Preserving and Publicly Auditable Federated Learning
Authors: Huang Zeng (1), Anjia Yang (1), Jian Weng (1), Min-Rong Chen (2), Fengjun Xiao (3 and 4), Yi Liu (1), Ye Yao (4)
Comments: ICC 2024 - 2024 IEEE International Conference on Communications Conference Program
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2405.04021 [pdf, other]
Title: Robust and Reusable Fuzzy Extractors for Low-entropy Rate Randomness Sources
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2405.04010 [pdf, other]
Title: Explainability-Informed Targeted Malware Misclassification
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2405.03991 [pdf, other]
Title: Assemblage: Automatic Binary Dataset Construction for Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[88]  arXiv:2405.03974 [pdf, other]
Title: TBNet: A Neural Architectural Defense Framework Facilitating DNN Model Protection in Trusted Execution Environments
Journal-ref: DAC2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[89]  arXiv:2405.03891 [pdf, other]
Title: Enhancing O-RAN Security: Evasion Attacks and Robust Defenses for Graph Reinforcement Learning-based Connection Management
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[90]  arXiv:2405.03830 [pdf, other]
Title: Cloud Storage Integrity at Scale: A Case for Dynamic Hash Trees
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2405.03828 [pdf, ps, other]
Title: The Trajectory of Romance Scams in the U.S
Comments: 6 pages, 3 figures, 12th International Symposium on Digital Forensics and Security
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[92]  arXiv:2405.03775 [pdf, other]
Title: Secure Inference for Vertically Partitioned Data Using Multiparty Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2405.04344 (cross-list from cs.AI) [pdf, other]
Title: Enhancing Scalability of Metric Differential Privacy via Secret Dataset Partitioning and Benders Decomposition
Authors: Chenxi Qiu
Comments: To be published in IJCAI 2024
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[94]  arXiv:2405.04072 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum Unpredictability
Comments: 38 pages, 1 figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[95]  arXiv:2405.04034 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Post-Processing for Fair Regression
Comments: ICML 2024. Code is at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[96]  arXiv:2312.12105 (cross-list from cs.DC) [pdf, other]
Title: Trusted Execution Environment for Decentralized Process Mining
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)

Tue, 7 May 2024

[97]  arXiv:2405.03672 [pdf, other]
Title: Cutting through buggy adversarial example defenses: fixing 1 line of code breaks Sabre
Authors: Nicholas Carlini
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[98]  arXiv:2405.03654 [pdf, other]
Title: Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[99]  arXiv:2405.03644 [pdf, other]
Title: When LLMs Meet Cybersecurity: A Systematic Literature Review
Comments: 36 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[100]  arXiv:2405.03636 [pdf, other]
Title: Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey
Comments: Submitted to ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[101]  arXiv:2405.03632 [pdf, other]
Title: LaserEscape: Detecting and Mitigating Optical Probing Attacks
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2405.03620 [pdf, other]
Title: Detecting Android Malware: From Neural Embeddings to Hands-On Validation with BERTroid
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[103]  arXiv:2405.03544 [pdf, ps, other]
Title: A Formal Model of Security Controls' Capabilities and Its Applications to Policy Refinement and Incident Management
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2405.03513 [pdf, other]
Title: QBER: Quantifying Cyber Risks for Strategic Decisions
Comments: 10 pages, 9 equations, 3 tables, 2 figures
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE)
[105]  arXiv:2405.03486 [pdf, other]
Title: UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Social and Information Networks (cs.SI)
[106]  arXiv:2405.03478 [pdf, other]
Title: Synthetic Datasets for Program Similarity Research
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2405.03446 [pdf, other]
Title: SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2405.03299 [pdf, other]
Title: DarkFed: A Data-Free Backdoor Attack in Federated Learning
Comments: This paper has been accepted by IJCAI 2024
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[109]  arXiv:2405.03298 [pdf, other]
Title: Online Clustering of Known and Emerging Malware Families
Comments: arXiv admin note: text overlap with arXiv:2305.00605
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[110]  arXiv:2405.03217 [pdf, other]
Title: PCG: Mitigating Conflict-based Cache Side-channel Attacks with Prefetching
Comments: 12 pages, 9 figures, submitting to a journal
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[111]  arXiv:2405.03166 [pdf, other]
Title: An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization
Authors: Elijah Pelofske
Subjects: Cryptography and Security (cs.CR)
[112]  arXiv:2405.03136 [pdf, other]
Title: FOBNN: Fast Oblivious Binarized Neural Network Inference
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2405.03065 [pdf, ps, other]
Title: Powering the Future of IoT: Federated Learning for Optimized Power Consumption and Enhanced Privacy
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2405.03045 [pdf, other]
Title: Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing
Authors: Yaqi He (1), Kai Zeng (1), Long Jiao (2), Brian L. Mark (1), Khaled N. Khasawneh (1) ((1) George Mason University, (2) University of Massachusetts Dartmouth)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[115]  arXiv:2405.03038 [pdf, other]
Title: On the use of dynamical systems in cryptography
Authors: Samuel Everett
Comments: 16 pages, 1 figure, to appear in Chaos, Solitons and Fractals
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2405.03009 [pdf, other]
Title: Explainable Malware Detection with Tailored Logic Explained Networks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2405.02989 [pdf, other]
Title: Defense against Joint Poison and Evasion Attacks: A Case Study of DERMS
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[118]  arXiv:2405.02973 [pdf, other]
Title: FairRelay: Fair and Cost-Efficient Peer-to-Peer Content Delivery through Payment Channel Networks
Comments: 27 pages, 21 figures
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2405.02963 [pdf, ps, other]
Title: Preventive Audits for Data Applications Before Data Sharing in the Power IoT
Comments: 19 pages, 18 figures
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[120]  arXiv:2405.02875 [pdf, ps, other]
Title: Insights Gained after a Decade of Cellular Automata-based Cryptography
Authors: Luca Mariot
Comments: 20 pages, 2 figures. Invited paper at AUTOMATA 2024
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2405.02826 [pdf, other]
Title: Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2405.02790 [pdf, other]
Title: Confidential and Protected Disease Classifier using Fully Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[123]  arXiv:2405.02696 [pdf, other]
Title: DiffuseTrace: A Transparent and Flexible Watermarking Scheme for Latent Diffusion Model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124]  arXiv:2405.02665 [pdf, ps, other]
Title: Metric Differential Privacy at the User-Level
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2405.02646 [pdf, other]
Title: Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples
Comments: 11 pages, 3 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2405.02629 [pdf, other]
Title: SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time
Subjects: Cryptography and Security (cs.CR)
[127]  arXiv:2405.02615 [pdf, other]
Title: TetraBFT: Reducing Latency of Unauthenticated, Responsive BFT Consensus
Comments: The full version of the PODC 2024 paper
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2405.02548 [pdf, other]
Title: CNN-LSTM and Transfer Learning Models for Malware Classification based on Opcodes and API Calls
Journal-ref: Bensaoud, A., & Kalita, J. (2024). CNN-LSTM and transfer learning models for malware classification based on opcodes and API calls. Knowledge-Based Systems, 111543
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[129]  arXiv:2405.02544 [pdf, ps, other]
Title: A Novel Endorsement Protocol to Secure BFT-Based Consensus in Permissionless Blockchain
Comments: Accepted at IEEE Wireless Communications and Networking Conference (WCNC), 2024
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2405.02499 [pdf, other]
Title: DRAMScope: Uncovering DRAM Microarchitecture and Characteristics by Issuing Memory Commands
Comments: To appear at the 51st IEEE/ACM International Symposium on Computer Architecture (ISCA)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[131]  arXiv:2405.02466 [pdf, ps, other]
Title: ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models
Comments: This is the author's pre-print version of the work. It is posted here for your personal use. Not for redistribution
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[132]  arXiv:2405.02437 [pdf, other]
Title: FastLloyd: Federated, Accurate, Secure, and Tunable $k$-Means Clustering with Differential Privacy
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[133]  arXiv:2405.02435 [pdf, other]
Title: Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia
Comments: Accepted by IEEE/IFIP International Conference on Dependable Systems and Networks, Industry Track, 2024
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[134]  arXiv:2405.02365 [pdf, other]
Title: Adaptive and robust watermark against model extraction attack
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:2405.02346 [pdf, other]
Title: Temporal assessment of malicious behaviors: application to turnout field data monitoring
Comments: To be published in the International Conference on Control, Automation and Diagnosis (ICCAD24)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[136]  arXiv:2405.02344 [pdf, other]
Title: Backdoor-based Explainable AI Benchmark for High Fidelity Evaluation of Attribution Methods
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[137]  arXiv:2405.02341 [pdf, other]
Title: Improved Communication-Privacy Trade-offs in $L_2$ Mean Estimation under Streaming Differential Privacy
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[138]  arXiv:2405.02302 [pdf, other]
Title: The Democratization of Wealth Management: Hedged Mutual Fund Blockchain Protocol
Authors: Ravi Kashyap
Subjects: Cryptography and Security (cs.CR); Computational Finance (q-fin.CP); Portfolio Management (q-fin.PM); Risk Management (q-fin.RM); Trading and Market Microstructure (q-fin.TR)
[139]  arXiv:2405.03316 (cross-list from cs.LG) [pdf, other]
Title: Provably Unlearnable Examples
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[140]  arXiv:2405.03183 (cross-list from cs.DC) [pdf, other]
Title: Impact of EIP-4844 on Ethereum: Consensus Security, Ethereum Usage, Rollup Transaction Dynamics, and Blob Gas Fee Markets
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[141]  arXiv:2405.03064 (cross-list from cs.LG) [pdf, other]
Title: RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation
Comments: Accepted by ICML 2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[142]  arXiv:2405.02476 (cross-list from cs.ET) [pdf, other]
Title: SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity
Subjects: Emerging Technologies (cs.ET); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[143]  arXiv:2405.02431 (cross-list from cs.DC) [pdf, other]
Title: Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles
Comments: 14 pages, 8 figures, Accepted to DSN 2024
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[ total of 143 entries: 1-100 | 60-143 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)