Cryptography and Security
Authors and titles for cs.CR in Dec 2020, skipping first 100
[ total of 308 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | 301-308 ][ showing 50 entries per page: fewer | more | all ]
- [101] arXiv:2012.07242 [pdf, other]
-
Title: Neighbors From Hell: Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAsComments: Published in the 2020 proceedings of the International Conference of Field-Programmable Technology (ICFPT)Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
- [102] arXiv:2012.07339 [pdf, other]
-
Title: Verifiable Observation of Permissioned LedgersAuthors: Ermyas Abebe, Yining Hu, Allison Irvin, Dileban Karunamoorthy, Vinayaka Pandit, Venkatraman Ramakrishna, Jiangshan YuComments: Full report of ICBC'21 versionSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [103] arXiv:2012.07432 [pdf, other]
-
Title: Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)Authors: Amit KleinComments: To be published in 2021 IEEE Symposium on Security and Privacy (SP)Subjects: Cryptography and Security (cs.CR)
- [104] arXiv:2012.07626 [pdf, ps, other]
-
Title: On Lightweight Privacy-Preserving Collaborative Learning for Internet of Things by Independent Random ProjectionsComments: arXiv admin note: substantial text overlap with arXiv:1902.05197Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
- [105] arXiv:2012.07634 [pdf, other]
-
Title: SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE DetectionComments: Associated code available at: this https URLSubjects: Cryptography and Security (cs.CR)
- [106] arXiv:2012.07805 [pdf, other]
-
Title: Extracting Training Data from Large Language ModelsAuthors: Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, Alina Oprea, Colin RaffelSubjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
- [107] arXiv:2012.07916 [pdf, other]
-
Title: When Physical Unclonable Function Meets BiometricsSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
- [108] arXiv:2012.07917 [pdf, other]
-
Title: The Design and Implementation of a Verified File System with End-to-End Data IntegritySubjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
- [109] arXiv:2012.07944 [pdf, other]
-
Title: Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS ServicesComments: To appear at: Rahel A. Fainchtein, Adam A. Aviv, Micah Sherr, Stephen Ribaudo, and Armaan Khullar. Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. Proceedings on Privacy Enhancing Technologies (PoPETS), July 2021Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [110] arXiv:2012.07989 [pdf]
-
Title: The Emerging Threats of Deepfake Attacks and CountermeasuresAuthors: Shadrack Awah BuoComments: 5Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [111] arXiv:2012.07994 [pdf, other]
-
Title: Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language ModelComments: Accepted in 35th AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML)Journal-ref: AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML), February 2-9, 2021Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [112] arXiv:2012.08003 [pdf, other]
-
Title: Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital CurrenciesAuthors: Mihai Christodorescu, Wanyun Catherine Gu, Ranjit Kumaresan, Mohsen Minaei, Mustafa Ozdayi, Benjamin Price, Srinivasan Raghuraman, Muhammad Saad, Cuy Sheffield, Minghua Xu, Mahdi ZamaniComments: 21 pagesSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [113] arXiv:2012.08042 [pdf]
-
Title: Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel ApproachComments: 9 pages, 1 figure, 1 table, conferenceSubjects: Cryptography and Security (cs.CR)
- [114] arXiv:2012.08318 [pdf]
-
Title: Application of deep learning to enhance the accuracy of intrusion detection in modern computer networksComments: 12 pagesSubjects: Cryptography and Security (cs.CR)
- [115] arXiv:2012.08347 [pdf]
-
Title: Beyond Privacy Trade-offs with Structured TransparencySubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [116] arXiv:2012.08356 [pdf]
-
Title: Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic DetectionComments: 5 pages, 4 figures, 2 tablesSubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [117] arXiv:2012.08460 [pdf]
-
Title: Review and Test of Steganography TechniquesSubjects: Cryptography and Security (cs.CR)
- [118] arXiv:2012.08487 [pdf, other]
-
Title: Evaluation of Live Forensic Techniques in Ransomware Attack MitigationComments: 11 pages, 10 figuresJournal-ref: Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979Subjects: Cryptography and Security (cs.CR)
- [119] arXiv:2012.08559 [pdf]
-
Title: Intrusion detection in computer systems by using artificial neural networks with Deep Learning approachesJournal-ref: 10th International Conference on Advances in Computing and Information Technology (ACITY 2020), November 28~29, 2020, London, United Kingdom Volume Editors : David C. Wyld, Dhinaharan Nagamalai (Eds) ISBN : 978-1-925953-29-9Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [120] arXiv:2012.08680 [pdf, other]
-
Title: Trex: Learning Execution Semantics from Micro-Traces for Binary SimilaritySubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
- [121] arXiv:2012.08726 [pdf, other]
-
Title: Responsible Disclosure of Generative Models Using Scalable FingerprintingComments: Accepted to ICLR'22 as SpotlightSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Graphics (cs.GR); Machine Learning (cs.LG)
- [122] arXiv:2012.08782 [pdf, other]
-
Title: A novel Two-Factor HoneyToken Authentication MechanismAuthors: Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos DouligerisComments: 7 pages, 6 figuresSubjects: Cryptography and Security (cs.CR)
- [123] arXiv:2012.08811 [pdf, other]
-
Title: Investigating the Ecosystem of Offensive Information Security ToolsComments: Six pages, one figure, this work is a preprint of a paper accepted at the 1st Workshop on Next Generation Networks and Applications (NGNA-2020)Subjects: Cryptography and Security (cs.CR)
- [124] arXiv:2012.08835 [pdf, other]
-
Title: A Hybrid Graph Neural Network Approach for Detecting PHP VulnerabilitiesComments: A poster version of this paper appeared as this https URLSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [125] arXiv:2012.08968 [pdf]
-
Title: The Impact of Cyber Security Threats on the 2020 US ElectionsAuthors: Nicholas StedmonComments: 3 pagesSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [126] arXiv:2012.09163 [pdf, other]
-
Title: Intertwining ROP Gadgets and Opaque Predicates for Robust ObfuscationSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [127] arXiv:2012.09214 [pdf, other]
-
Title: Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware DetectionAuthors: Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M.T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. TallComments: Includes Actionable Takeaways for SOCsSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [128] arXiv:2012.09221 [pdf, other]
-
Title: Group Handover for Drone Base StationsComments: Published in IEEE Internet of Things Journal 2021Journal-ref: IEEE Internet of Things Journal 2021Subjects: Cryptography and Security (cs.CR)
- [129] arXiv:2012.09292 [pdf, other]
-
Title: ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native DetectionJournal-ref: Pervasive & Mobile Computing, Vol 76, September 2021Subjects: Cryptography and Security (cs.CR)
- [130] arXiv:2012.09344 [pdf, other]
-
Title: Machine Learning for Detecting Data Exfiltration: A ReviewSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [131] arXiv:2012.09375 [pdf, other]
-
Title: KHOVID: Interoperable Privacy Preserving Digital Contact TracingComments: 14 pages, 7 figures. Submitted to a conferenceSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [132] arXiv:2012.09593 [pdf, other]
-
Title: Concurrent Encryption and Authentication for Wireless Networks using Compressed SensingAuthors: Chaoqing TangSubjects: Cryptography and Security (cs.CR)
- [133] arXiv:2012.09707 [pdf]
-
Title: Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA NetworksComments: 24 single-column, double-spaced pages; 1 Figure; and 21 TablesSubjects: Cryptography and Security (cs.CR)
- [134] arXiv:2012.09919 [pdf, ps, other]
-
Title: Efficient Verification of Optimized Code: Correct High-speed X25519Comments: 19 pages, 5 figures. accepted at NFM 2021 (without appendix)Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
- [135] arXiv:2012.09950 [pdf, other]
-
Title: Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait AuthenticationComments: 17 pagesJournal-ref: ACM Journal of Digital Threats: Research and Practice, June 2021Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Human-Computer Interaction (cs.HC)
- [136] arXiv:2012.09960 [pdf]
-
Title: Understanding The Top 10 OWASP VulnerabilitiesAuthors: Matthew Bach-NutmanSubjects: Cryptography and Security (cs.CR)
- [137] arXiv:2012.09987 [pdf]
-
Title: DistB-Condo: Distributed Blockchain-based IoT-SDN Model for Smart CondominiumAuthors: Anichur Rahman, Md. Jahidul Islam, Ziaur Rahman, Md. Mahfuz Reza, Adnan Anwar, M. A. Parvez Mahmud, Mostofa Kamal Nasir, Rafidah Md NoorComments: 17 Pages, 12 Tables, 17 FiguresJournal-ref: EEE Access, vol. 8, pp. 209594-209609, 2020Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [138] arXiv:2012.10011 [pdf]
-
Title: DistB-SDoIndustry: Enhancing Security in Industry 4.0 Services based on Distributed Blockchain through Software Defined Networking-IoT Enabled ArchitectureAuthors: Anichur Rahman, Umme Sara, Dipanjali Kundu, Saiful Islam, Md. Jahidul Islam, Mahedi Hasan, Ziaur Rahman, Mostofa Kamal NasirComments: 8 Pages, 6 FiguresJournal-ref: IJACSA, 11(9), 2020Subjects: Cryptography and Security (cs.CR)
- [139] arXiv:2012.10049 [pdf, ps, other]
-
Title: Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based EncryptionSubjects: Cryptography and Security (cs.CR)
- [140] arXiv:2012.10253 [pdf]
-
Title: Data Storage in the Decentralized World: Blockchain and DerivativesComments: 33 pages, 10 figuresJournal-ref: In Gulsecen S., Sharma S., Akadal E.(Eds.), Who Runs The World: DATA (pp. 37-69). Istanbul, Istanbul University Press (2020)Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [141] arXiv:2012.10313 [pdf, other]
-
Title: Towards Formally Verified Compilation of Tag-Based Policy EnforcementSubjects: Cryptography and Security (cs.CR)
- [142] arXiv:2012.10376 [pdf, other]
-
Title: Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and InvariantsSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Numerical Analysis (math.NA)
- [143] arXiv:2012.10452 [pdf, other]
-
Title: Experimental relativistic zero-knowledge proofsAuthors: Pouriya Alikhani, Nicolas Brunner, Claude Crépeau, Sébastien Designolle, Raphaël Houlmann, Weixu Shi, Nan Yang, Hugo ZbindenComments: 8 pages, 3 figuresJournal-ref: Nature 599, 47-50 (2021)Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
- [144] arXiv:2012.10511 [pdf, ps, other]
-
Title: An Infrastructure for Faithful Execution of Remote Attestation ProtocolsSubjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO); Programming Languages (cs.PL)
- [145] arXiv:2012.10523 [pdf, other]
-
Title: A closed form scale bound for the $(ε, δ)$-differentially private Gaussian Mechanism valid for all privacy regimesAuthors: Staal A. VinterboComments: 11 pages. Version 2 improves on the boundSubjects: Cryptography and Security (cs.CR); Machine Learning (stat.ML)
- [146] arXiv:2012.10534 [pdf, other]
-
Title: PAARS: Privacy Aware Access Regulation SystemComments: Published in 11th IEEE UEMCON 2020, NY, USASubjects: Cryptography and Security (cs.CR)
- [147] arXiv:2012.10563 [pdf, other]
-
Title: Privacy Analysis and Evaluation Policy of Blockchain-based Anonymous CryptocurrenciesComments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibleSubjects: Cryptography and Security (cs.CR)
- [148] arXiv:2012.10566 [pdf, other]
-
Title: FedServing: A Federated Prediction Serving Framework Based on Incentive MechanismSubjects: Cryptography and Security (cs.CR)
- [149] arXiv:2012.10576 [pdf, other]
-
Title: Enabling Micro-payments on IoT Devices using Bitcoin Lightning NetworkComments: To be published at 2021 IEEE ICBC in Poster TrackSubjects: Cryptography and Security (cs.CR)
- [150] arXiv:2012.10681 [pdf, ps, other]
[ showing 50 entries per page: fewer | more | all ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, 2208, contact, help (Access key information)