We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2020, skipping first 100

[ total of 308 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | 301-308 ]
[ showing 50 entries per page: fewer | more | all ]
[101]  arXiv:2012.07242 [pdf, other]
Title: Neighbors From Hell: Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAs
Comments: Published in the 2020 proceedings of the International Conference of Field-Programmable Technology (ICFPT)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[102]  arXiv:2012.07339 [pdf, other]
Title: Verifiable Observation of Permissioned Ledgers
Comments: Full report of ICBC'21 version
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[103]  arXiv:2012.07432 [pdf, other]
Title: Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Authors: Amit Klein
Comments: To be published in 2021 IEEE Symposium on Security and Privacy (SP)
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2012.07626 [pdf, ps, other]
Title: On Lightweight Privacy-Preserving Collaborative Learning for Internet of Things by Independent Random Projections
Comments: arXiv admin note: substantial text overlap with arXiv:1902.05197
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[105]  arXiv:2012.07634 [pdf, other]
Title: SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection
Comments: Associated code available at: this https URL
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2012.07805 [pdf, other]
Title: Extracting Training Data from Large Language Models
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[107]  arXiv:2012.07916 [pdf, other]
Title: When Physical Unclonable Function Meets Biometrics
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[108]  arXiv:2012.07917 [pdf, other]
Title: The Design and Implementation of a Verified File System with End-to-End Data Integrity
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[109]  arXiv:2012.07944 [pdf, other]
Title: Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services
Comments: To appear at: Rahel A. Fainchtein, Adam A. Aviv, Micah Sherr, Stephen Ribaudo, and Armaan Khullar. Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. Proceedings on Privacy Enhancing Technologies (PoPETS), July 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[110]  arXiv:2012.07989 [pdf]
Title: The Emerging Threats of Deepfake Attacks and Countermeasures
Comments: 5
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[111]  arXiv:2012.07994 [pdf, other]
Title: Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model
Comments: Accepted in 35th AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML)
Journal-ref: AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML), February 2-9, 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2012.08003 [pdf, other]
Title: Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies
Comments: 21 pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[113]  arXiv:2012.08042 [pdf]
Title: Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach
Comments: 9 pages, 1 figure, 1 table, conference
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2012.08318 [pdf]
Title: Application of deep learning to enhance the accuracy of intrusion detection in modern computer networks
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2012.08347 [pdf]
Title: Beyond Privacy Trade-offs with Structured Transparency
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[116]  arXiv:2012.08356 [pdf]
Title: Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection
Comments: 5 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[117]  arXiv:2012.08460 [pdf]
Title: Review and Test of Steganography Techniques
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2012.08487 [pdf, other]
Title: Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation
Comments: 11 pages, 10 figures
Journal-ref: Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2012.08559 [pdf]
Title: Intrusion detection in computer systems by using artificial neural networks with Deep Learning approaches
Journal-ref: 10th International Conference on Advances in Computing and Information Technology (ACITY 2020), November 28~29, 2020, London, United Kingdom Volume Editors : David C. Wyld, Dhinaharan Nagamalai (Eds) ISBN : 978-1-925953-29-9
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[120]  arXiv:2012.08680 [pdf, other]
Title: Trex: Learning Execution Semantics from Micro-Traces for Binary Similarity
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[121]  arXiv:2012.08726 [pdf, other]
Title: Responsible Disclosure of Generative Models Using Scalable Fingerprinting
Comments: Accepted to ICLR'22 as Spotlight
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Graphics (cs.GR); Machine Learning (cs.LG)
[122]  arXiv:2012.08782 [pdf, other]
Title: A novel Two-Factor HoneyToken Authentication Mechanism
Comments: 7 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2012.08811 [pdf, other]
Title: Investigating the Ecosystem of Offensive Information Security Tools
Comments: Six pages, one figure, this work is a preprint of a paper accepted at the 1st Workshop on Next Generation Networks and Applications (NGNA-2020)
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2012.08835 [pdf, other]
Title: A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities
Comments: A poster version of this paper appeared as this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[125]  arXiv:2012.08968 [pdf]
Title: The Impact of Cyber Security Threats on the 2020 US Elections
Authors: Nicholas Stedmon
Comments: 3 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[126]  arXiv:2012.09163 [pdf, other]
Title: Intertwining ROP Gadgets and Opaque Predicates for Robust Obfuscation
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[127]  arXiv:2012.09214 [pdf, other]
Title: Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection
Comments: Includes Actionable Takeaways for SOCs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[128]  arXiv:2012.09221 [pdf, other]
Title: Group Handover for Drone Base Stations
Comments: Published in IEEE Internet of Things Journal 2021
Journal-ref: IEEE Internet of Things Journal 2021
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2012.09292 [pdf, other]
Title: ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection
Journal-ref: Pervasive & Mobile Computing, Vol 76, September 2021
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2012.09344 [pdf, other]
Title: Machine Learning for Detecting Data Exfiltration: A Review
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[131]  arXiv:2012.09375 [pdf, other]
Title: KHOVID: Interoperable Privacy Preserving Digital Contact Tracing
Comments: 14 pages, 7 figures. Submitted to a conference
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[132]  arXiv:2012.09593 [pdf, other]
Title: Concurrent Encryption and Authentication for Wireless Networks using Compressed Sensing
Authors: Chaoqing Tang
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2012.09707 [pdf]
Title: Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks
Comments: 24 single-column, double-spaced pages; 1 Figure; and 21 Tables
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2012.09919 [pdf, ps, other]
Title: Efficient Verification of Optimized Code: Correct High-speed X25519
Comments: 19 pages, 5 figures. accepted at NFM 2021 (without appendix)
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[135]  arXiv:2012.09950 [pdf, other]
Title: Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication
Comments: 17 pages
Journal-ref: ACM Journal of Digital Threats: Research and Practice, June 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Human-Computer Interaction (cs.HC)
[136]  arXiv:2012.09960 [pdf]
Title: Understanding The Top 10 OWASP Vulnerabilities
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2012.09987 [pdf]
Title: DistB-Condo: Distributed Blockchain-based IoT-SDN Model for Smart Condominium
Comments: 17 Pages, 12 Tables, 17 Figures
Journal-ref: EEE Access, vol. 8, pp. 209594-209609, 2020
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[138]  arXiv:2012.10011 [pdf]
Title: DistB-SDoIndustry: Enhancing Security in Industry 4.0 Services based on Distributed Blockchain through Software Defined Networking-IoT Enabled Architecture
Comments: 8 Pages, 6 Figures
Journal-ref: IJACSA, 11(9), 2020
Subjects: Cryptography and Security (cs.CR)
[139]  arXiv:2012.10049 [pdf, ps, other]
Title: Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2012.10253 [pdf]
Title: Data Storage in the Decentralized World: Blockchain and Derivatives
Comments: 33 pages, 10 figures
Journal-ref: In Gulsecen S., Sharma S., Akadal E.(Eds.), Who Runs The World: DATA (pp. 37-69). Istanbul, Istanbul University Press (2020)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[141]  arXiv:2012.10313 [pdf, other]
Title: Towards Formally Verified Compilation of Tag-Based Policy Enforcement
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2012.10376 [pdf, other]
Title: Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Numerical Analysis (math.NA)
[143]  arXiv:2012.10452 [pdf, other]
Title: Experimental relativistic zero-knowledge proofs
Comments: 8 pages, 3 figures
Journal-ref: Nature 599, 47-50 (2021)
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[144]  arXiv:2012.10511 [pdf, ps, other]
Title: An Infrastructure for Faithful Execution of Remote Attestation Protocols
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO); Programming Languages (cs.PL)
[145]  arXiv:2012.10523 [pdf, other]
Title: A closed form scale bound for the $(ε, δ)$-differentially private Gaussian Mechanism valid for all privacy regimes
Comments: 11 pages. Version 2 improves on the bound
Subjects: Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[146]  arXiv:2012.10534 [pdf, other]
Title: PAARS: Privacy Aware Access Regulation System
Comments: Published in 11th IEEE UEMCON 2020, NY, USA
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2012.10563 [pdf, other]
Title: Privacy Analysis and Evaluation Policy of Blockchain-based Anonymous Cryptocurrencies
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR)
[148]  arXiv:2012.10566 [pdf, other]
Title: FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism
Subjects: Cryptography and Security (cs.CR)
[149]  arXiv:2012.10576 [pdf, other]
Title: Enabling Micro-payments on IoT Devices using Bitcoin Lightning Network
Comments: To be published at 2021 IEEE ICBC in Poster Track
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2012.10681 [pdf, ps, other]
Title: Blockchain-Based Approach for Securing Spectrum Trading in Multibeam Satellite Systems
Subjects: Cryptography and Security (cs.CR)
[ total of 308 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | 301-308 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2208, contact, help  (Access key information)