We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2020, skipping first 100

[ total of 308 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | ... | 301-308 ]
[ showing 25 entries per page: fewer | more | all ]
[101]  arXiv:2012.07242 [pdf, other]
Title: Neighbors From Hell: Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAs
Comments: Published in the 2020 proceedings of the International Conference of Field-Programmable Technology (ICFPT)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[102]  arXiv:2012.07339 [pdf, other]
Title: Verifiable Observation of Permissioned Ledgers
Comments: Full report of ICBC'21 version
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[103]  arXiv:2012.07432 [pdf, other]
Title: Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Authors: Amit Klein
Comments: To be published in 2021 IEEE Symposium on Security and Privacy (SP)
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2012.07626 [pdf, ps, other]
Title: On Lightweight Privacy-Preserving Collaborative Learning for Internet of Things by Independent Random Projections
Comments: arXiv admin note: substantial text overlap with arXiv:1902.05197
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[105]  arXiv:2012.07634 [pdf, other]
Title: SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection
Comments: Associated code available at: this https URL
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2012.07805 [pdf, other]
Title: Extracting Training Data from Large Language Models
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[107]  arXiv:2012.07916 [pdf, other]
Title: When Physical Unclonable Function Meets Biometrics
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[108]  arXiv:2012.07917 [pdf, other]
Title: The Design and Implementation of a Verified File System with End-to-End Data Integrity
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[109]  arXiv:2012.07944 [pdf, other]
Title: Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services
Comments: To appear at: Rahel A. Fainchtein, Adam A. Aviv, Micah Sherr, Stephen Ribaudo, and Armaan Khullar. Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. Proceedings on Privacy Enhancing Technologies (PoPETS), July 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[110]  arXiv:2012.07989 [pdf]
Title: The Emerging Threats of Deepfake Attacks and Countermeasures
Comments: 5
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[111]  arXiv:2012.07994 [pdf, other]
Title: Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model
Comments: Accepted in 35th AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML)
Journal-ref: AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML), February 2-9, 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2012.08003 [pdf, other]
Title: Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies
Comments: 21 pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[113]  arXiv:2012.08042 [pdf]
Title: Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach
Comments: 9 pages, 1 figure, 1 table, conference
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2012.08318 [pdf]
Title: Application of deep learning to enhance the accuracy of intrusion detection in modern computer networks
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2012.08347 [pdf]
Title: Beyond Privacy Trade-offs with Structured Transparency
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[116]  arXiv:2012.08356 [pdf]
Title: Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection
Comments: 5 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[117]  arXiv:2012.08460 [pdf]
Title: Review and Test of Steganography Techniques
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2012.08487 [pdf, other]
Title: Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation
Comments: 11 pages, 10 figures
Journal-ref: Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2012.08559 [pdf]
Title: Intrusion detection in computer systems by using artificial neural networks with Deep Learning approaches
Journal-ref: 10th International Conference on Advances in Computing and Information Technology (ACITY 2020), November 28~29, 2020, London, United Kingdom Volume Editors : David C. Wyld, Dhinaharan Nagamalai (Eds) ISBN : 978-1-925953-29-9
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[120]  arXiv:2012.08680 [pdf, other]
Title: Trex: Learning Execution Semantics from Micro-Traces for Binary Similarity
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[121]  arXiv:2012.08726 [pdf, other]
Title: Responsible Disclosure of Generative Models Using Scalable Fingerprinting
Comments: Accepted to ICLR'22 as Spotlight
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Graphics (cs.GR); Machine Learning (cs.LG)
[122]  arXiv:2012.08782 [pdf, other]
Title: A novel Two-Factor HoneyToken Authentication Mechanism
Comments: 7 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2012.08811 [pdf, other]
Title: Investigating the Ecosystem of Offensive Information Security Tools
Comments: Six pages, one figure, this work is a preprint of a paper accepted at the 1st Workshop on Next Generation Networks and Applications (NGNA-2020)
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2012.08835 [pdf, other]
Title: A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities
Comments: A poster version of this paper appeared as this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[125]  arXiv:2012.08968 [pdf]
Title: The Impact of Cyber Security Threats on the 2020 US Elections
Authors: Nicholas Stedmon
Comments: 3 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[ total of 308 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | ... | 301-308 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2206, contact, help  (Access key information)