We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2018

[ total of 251 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 251 ]
[ showing 50 entries per page: fewer | more | all ]
[1]  arXiv:1811.00121 [pdf, other]
Title: A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[2]  arXiv:1811.00125 [pdf]
Title: BlockReduce: Scaling Blockchain to Human Commerce
Comments: 9 pages, 2 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:1811.00142 [pdf, other]
Title: Improving ICS Cyber Resilience through Optimal Diversification of Network Resources
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:1811.00175 [pdf, other]
Title: Formally Verified Hardware/Software Co-Design for Remote Attestation
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:1811.00236 [pdf, ps, other]
Title: Encryption-then-Compression Systems using Grayscale-based Image Encryption for JPEG Images
Comments: Accepted in IEEE Transactions on Information Forensics & Security
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:1811.00513 [pdf, other]
Title: Auditing Data Provenance in Text-Generation Models
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG); Machine Learning (stat.ML)
[7]  arXiv:1811.00621 [pdf, ps, other]
Title: Improving Adversarial Robustness by Encouraging Discriminative Features
Comments: This article corresponds to the accepted version at IEEE ICIP 2019. We will link the DOI as soon as it is available
Journal-ref: 2019 26th IEEE International Conference on Image Processing (ICIP)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[8]  arXiv:1811.00634 [pdf, other]
Title: SDFW: SDN-based Stateful Distributed Firewall
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:1811.00635 [pdf, other]
Title: TRUFL: Distributed Trust Management framework in SDN
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:1811.00651 [pdf, other]
Title: Adaptive MTD Security using Markov Game Modeling
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:1811.00653 [pdf, other]
Title: SDN based Network Function Parallelism in Cloud
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:1811.00657 [pdf, other]
Title: SUPC: SDN enabled Universal Policy Checking in Cloud Network
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:1811.00701 [pdf, other]
Title: Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:1811.00778 [pdf, other]
Title: Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[15]  arXiv:1811.00830 [pdf, other]
Title: Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks
Journal-ref: ACM Computing Surveys, Vol. 52, No. 4, Article 78, 2019
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:1811.00917 [pdf, other]
Title: Large-Scale Analysis of Style Injection by Relative Path Overwrite
Comments: The Web Conference (WWW), Lyon, France, April 2018
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:1811.00918 [pdf, other]
Title: Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web
Comments: Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2017
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:1811.00919 [pdf, other]
Title: Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance
Comments: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Paris, France, September 2016
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:1811.00920 [pdf, other]
Title: Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
Comments: USENIX Security Symposium, Austin, TX, USA, August 2016
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:1811.00921 [pdf]
Title: Alert Correlation Algorithms: A Survey and Taxonomy
Comments: Symposium on Cyberspace Safety and Security (CSS), Lecture Notes in Computer Science, Springer International Publishing, vol 8300, pp 183-197, Zhangjiajie, China, November 2013
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:1811.00922 [pdf]
Title: A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers
Comments: IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, July 2013
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:1811.00923 [pdf]
Title: Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers
Comments: IEEE Conference for Internet Technology and Secured Transactions (ICITST), London, UK, December 2012
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:1811.00924 [pdf]
Title: Performance Evaluation of Shared Hosting Security Methods
Comments: IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, June 2012
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:1811.00925 [pdf]
Title: An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
Comments: IEEE Conference on Computer Applications and Industrial Electronics (ICCAIE), Penang, Malaysia, December 2011
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:1811.00926 [pdf, other]
Title: Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions
Comments: International Conference on Financial Cryptography and Data Security (FC), Barbados, February 2016
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:1811.01017 [pdf, other]
Title: An Adaptive Pruning Algorithm for Spoofing Localisation Based on Tropical Geometry
Comments: Under review for the International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[27]  arXiv:1811.01027 [pdf, other]
Title: AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection
Comments: The revised version will be published in IJCAI'2019 entitled "Out-of-sample Node Representation Learning for Heterogeneous Graph in Real-time Android Malware Detection"
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[28]  arXiv:1811.01134 [pdf, other]
Title: A Marauder's Map of Security and Privacy in Machine Learning
Authors: Nicolas Papernot
Comments: This report summarizes the keynote presented by the author in October 2018 at AISec (colocated with ACM CCS) on security and privacy in machine learning
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:1811.01190 [pdf, other]
Title: Malware Dynamic Analysis Evasion Techniques: A Survey
Comments: 33 pages, 1 figure, two tables
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:1811.01312 [pdf, other]
Title: Adversarial Black-Box Attacks on Automatic Speech Recognition Systems using Multi-Objective Evolutionary Optimization
Comments: Published in Interspeech 2019
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[31]  arXiv:1811.01388 [pdf, other]
Title: Web Security Investigation through Penetration Tests: A Case study of an Educational Institution Portal
Comments: 4 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:1811.01410 [pdf, other]
Title: Design of Anonymous Endorsement System in Hyperledger Fabric
Comments: 33 pages, 9 figures, Accepted in IEEE Transactions on Emerging Topics in Computing, Manuscript Type: Technical Track (Regular Paper)
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:1811.01431 [pdf]
Title: Genie: A Secure, Transparent Sharing and Services Platform for Genetic and Health Data
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[34]  arXiv:1811.01629 [pdf, ps, other]
Title: On the Transferability of Adversarial Examples Against CNN-Based Image Forensics
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:1811.01892 [pdf, other]
Title: Malware Epidemics Effects in a Lanchester Conflict Model
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:1811.02001 [pdf, other]
Title: Blockchain-based Charging Coordination Mechanism for Smart Grid Energy Storage Units
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:1811.02120 [pdf]
Title: Digital Signature Security in Data Communication
Comments: 6 pages, Paper presented at the International Conference on Education and Technology (ICEduTech2017), Novotel Hotel, Balikpapan, Indonesia
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:1811.02217 [pdf, other]
Title: A Scalable Algorithm for Privacy-Preserving Item-based Top-N Recommendation
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:1811.02276 [pdf]
Title: Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
Comments: Accepted to publish in proceeding of 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[40]  arXiv:1811.02293 [pdf, other]
Title: Defeating the Downgrade Attack on Identity Privacy in 5G
Journal-ref: SSR 2018: Security Standardisation Research
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:1811.02536 [pdf, other]
Title: A Bisimilarity Congruence for the Applied pi-Calculus Sufficiently Coarse to Verify Privacy Properties
Authors: Ross Horne
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[42]  arXiv:1811.02748 [pdf]
Title: A Method for Ontology-based Architecture Reconstruction of Computing Platforms
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:1811.03165 [pdf, other]
Title: Shining Light On Shadow Stacks
Comments: To Appear in IEEE Security and Privacy 2019
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:1811.03194 [pdf, other]
Title: AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
Comments: 17 pages, 14 figures
Journal-ref: In 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[45]  arXiv:1811.03197 [pdf, other]
Title: Private Continual Release of Real-Valued Data Streams
Comments: Accepted for publication at NDSS 2019
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[46]  arXiv:1811.03223 [pdf, ps, other]
Title: BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical Records
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:1811.03238 [pdf, ps, other]
Title: An Efficient Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing Network
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:1811.03239 [pdf, ps, other]
Title: An Efficient Anonymous Authentication Scheme for Internet of Vehicles
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:1811.03241 [pdf, other]
Title: Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms
Comments: This paper has been accepted by USENIX Security '19
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[50]  arXiv:1811.03243 [pdf, ps, other]
Title: vFAC: Fine-Grained Access Control with Versatility for Cloud Storage
Subjects: Cryptography and Security (cs.CR)
[ total of 251 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 251 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2208, contact, help  (Access key information)