Cryptography and Security
Authors and titles for cs.CR in Dec 2020, skipping first 75
[ total of 308 entries: 1-50 | 26-75 | 76-125 | 126-175 | 176-225 | 226-275 | 276-308 ][ showing 50 entries per page: fewer | more | all ]
- [76] arXiv:2012.05434 [pdf, other]
-
Title: Composite Adversarial AttacksComments: To appear in AAAI 2021, code will be released laterSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
- [77] arXiv:2012.05471 [pdf, other]
-
Title: Securing the EDK II Image LoaderComments: 10 pages, 2 tablesJournal-ref: 2020 Ivannikov Ispras Open Conference (ISPRAS), 2020, pp. 16-25Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [78] arXiv:2012.05516 [pdf, other]
-
Title: Explainable Link Prediction for Privacy-Preserving Contact TracingComments: 8 pages, 7 figures, SpicyFL 2020 Workshop at NeurIPS 2020Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
- [79] arXiv:2012.05749 [pdf, other]
-
Title: Data Privacy in Trigger-Action SystemsAuthors: Yunang Chen, Amrita Roy Chowdhury, Ruizhe Wang, Andrei Sabelfeld, Rahul Chatterjee, Earlence FernandesSubjects: Cryptography and Security (cs.CR)
- [80] arXiv:2012.05867 [pdf, other]
-
Title: Virtual Classrooms and Real Harms: Remote Learning at U.S. UniversitiesAuthors: Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, Madelyn SanfilippoSubjects: Cryptography and Security (cs.CR)
- [81] arXiv:2012.05948 [pdf, other]
-
Title: GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic LockingAuthors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur SinanogluComments: 6 pages, 4 figures, 6 tables, conferenceSubjects: Cryptography and Security (cs.CR)
- [82] arXiv:2012.06128 [pdf, other]
-
Title: SoK: Diving into DAG-based Blockchain SystemsComments: Full versionSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
- [83] arXiv:2012.06150 [pdf, other]
- [84] arXiv:2012.06300 [pdf, other]
-
Title: Towards Secure and Leak-Free Workflows Using Microservice IsolationSubjects: Cryptography and Security (cs.CR)
- [85] arXiv:2012.06330 [pdf, other]
-
Title: Detection of Adversarial Supports in Few-shot Classifiers Using Self-Similarity and FilteringAuthors: Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-Man Cheung, Yuval Elovici, Alexander BinderComments: Accepted in the International Workshop on Safety and Security of Deep Learning 2021Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [86] arXiv:2012.06332 [pdf]
-
Title: An Empirical Review of Adversarial DefensesAuthors: Ayush GoelComments: 19 pages, 8 Figures, Report Reviewed by Vivek MenonSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [87] arXiv:2012.06337 [pdf, other]
-
Title: Privacy and Robustness in Federated Learning: Attacks and DefensesAuthors: Lingjuan Lyu, Han Yu, Xingjun Ma, Chen Chen, Lichao Sun, Jun Zhao, Qiang Yang, Philip S. YuSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [88] arXiv:2012.06340 [pdf, ps, other]
-
Title: Control Flow Obfuscation for FJ using Continuation PassingAuthors: Kenny Zhuo Ming LuSubjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
- [89] arXiv:2012.06354 [pdf, other]
-
Title: Privacy-preserving medical image analysisAuthors: Alexander Ziller, Jonathan Passerat-Palmbach, Théo Ryffel, Dmitrii Usynin, Andrew Trask, Ionésio Da Lima Costa Junior, Jason Mancuso, Marcus Makowski, Daniel Rueckert, Rickmer Braren, Georgios KaissisComments: Accepted at the workshop for Medical Imaging meets NeurIPS, 34th Conference on Neural Information Processing Systems (NeurIPS) December 11, 2020Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
- [90] arXiv:2012.06502 [pdf, other]
-
Title: Betrayed by the Guardian: Security and Privacy Risks of Parental Control SolutionsJournal-ref: Published at ACSAC 2020Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [91] arXiv:2012.06554 [pdf, other]
-
Title: TEEMon: A continuous performance monitoring framework for TEEsAuthors: Robert Krahn, Donald Dragoti, Franz Gregor, Do Le Quoc, Valerio Schiavoni, Pascal Felber, Clenimar Souza, Andrey Brito, Christof FetzerSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
- [92] arXiv:2012.06609 [pdf, other]
-
Title: RegulaTor: A Straightforward Website Fingerprinting DefenseSubjects: Cryptography and Security (cs.CR)
- [93] arXiv:2012.06658 [pdf, other]
-
Title: Hiding in the Particles: When Return-Oriented Programming Meets Program ObfuscationComments: Published in the proceedings of DSN'21 (51st IEEE/IFIP Int. Conf. on Dependable Systems and Networks). Code and BibTeX entry available at this https URLJournal-ref: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [94] arXiv:2012.06666 [pdf, other]
-
Title: Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones are not EnoughComments: 19 pages, 15 Figures, IEEE Internet of Things JournalJournal-ref: IEEE Internet of Things Journal, 2021Subjects: Cryptography and Security (cs.CR)
- [95] arXiv:2012.06761 [pdf, other]
-
Title: CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored MemoryAuthors: Pascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan MangardSubjects: Cryptography and Security (cs.CR)
- [96] arXiv:2012.06805 [pdf, other]
-
Title: Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep LearningSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [97] arXiv:2012.06810 [pdf]
-
Title: Achieving Security and Privacy in Federated Learning Systems: Survey, Research Challenges and Future DirectionsAuthors: Alberto Blanco-Justicia, Josep Domingo-Ferrer, Sergio Martínez, David Sánchez, Adrian Flanagan, Kuan Eeik TanComments: 40 pages, 19 figuresSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [98] arXiv:2012.06884 [pdf, other]
-
Title: AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped ComputersAuthors: Mordechai GuriSubjects: Cryptography and Security (cs.CR)
- [99] arXiv:2012.07006 [pdf, other]
-
Title: DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data AugmentationSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [100] arXiv:2012.07173 [pdf, ps, other]
-
Title: Cover attacks for elliptic curves with prime orderAuthors: Song TianComments: 19 pagesSubjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG)
- [101] arXiv:2012.07242 [pdf, other]
-
Title: Neighbors From Hell: Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAsComments: Published in the 2020 proceedings of the International Conference of Field-Programmable Technology (ICFPT)Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
- [102] arXiv:2012.07339 [pdf, other]
-
Title: Verifiable Observation of Permissioned LedgersAuthors: Ermyas Abebe, Yining Hu, Allison Irvin, Dileban Karunamoorthy, Vinayaka Pandit, Venkatraman Ramakrishna, Jiangshan YuComments: Full report of ICBC'21 versionSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [103] arXiv:2012.07432 [pdf, other]
-
Title: Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)Authors: Amit KleinComments: To be published in 2021 IEEE Symposium on Security and Privacy (SP)Subjects: Cryptography and Security (cs.CR)
- [104] arXiv:2012.07626 [pdf, ps, other]
-
Title: On Lightweight Privacy-Preserving Collaborative Learning for Internet of Things by Independent Random ProjectionsComments: arXiv admin note: substantial text overlap with arXiv:1902.05197Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
- [105] arXiv:2012.07634 [pdf, other]
-
Title: SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE DetectionComments: Associated code available at: this https URLSubjects: Cryptography and Security (cs.CR)
- [106] arXiv:2012.07805 [pdf, other]
-
Title: Extracting Training Data from Large Language ModelsAuthors: Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, Alina Oprea, Colin RaffelSubjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
- [107] arXiv:2012.07916 [pdf, other]
-
Title: When Physical Unclonable Function Meets BiometricsSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
- [108] arXiv:2012.07917 [pdf, other]
-
Title: The Design and Implementation of a Verified File System with End-to-End Data IntegritySubjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
- [109] arXiv:2012.07944 [pdf, other]
-
Title: Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS ServicesComments: To appear at: Rahel A. Fainchtein, Adam A. Aviv, Micah Sherr, Stephen Ribaudo, and Armaan Khullar. Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. Proceedings on Privacy Enhancing Technologies (PoPETS), July 2021Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [110] arXiv:2012.07989 [pdf]
-
Title: The Emerging Threats of Deepfake Attacks and CountermeasuresAuthors: Shadrack Awah BuoComments: 5Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [111] arXiv:2012.07994 [pdf, other]
-
Title: Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language ModelComments: Accepted in 35th AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML)Journal-ref: AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML), February 2-9, 2021Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [112] arXiv:2012.08003 [pdf, other]
-
Title: Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital CurrenciesAuthors: Mihai Christodorescu, Wanyun Catherine Gu, Ranjit Kumaresan, Mohsen Minaei, Mustafa Ozdayi, Benjamin Price, Srinivasan Raghuraman, Muhammad Saad, Cuy Sheffield, Minghua Xu, Mahdi ZamaniComments: 21 pagesSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [113] arXiv:2012.08042 [pdf]
-
Title: Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel ApproachComments: 9 pages, 1 figure, 1 table, conferenceSubjects: Cryptography and Security (cs.CR)
- [114] arXiv:2012.08318 [pdf]
-
Title: Application of deep learning to enhance the accuracy of intrusion detection in modern computer networksComments: 12 pagesSubjects: Cryptography and Security (cs.CR)
- [115] arXiv:2012.08347 [pdf]
-
Title: Beyond Privacy Trade-offs with Structured TransparencySubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [116] arXiv:2012.08356 [pdf]
-
Title: Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic DetectionComments: 5 pages, 4 figures, 2 tablesSubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [117] arXiv:2012.08460 [pdf]
-
Title: Review and Test of Steganography TechniquesSubjects: Cryptography and Security (cs.CR)
- [118] arXiv:2012.08487 [pdf, other]
-
Title: Evaluation of Live Forensic Techniques in Ransomware Attack MitigationComments: 11 pages, 10 figuresJournal-ref: Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979Subjects: Cryptography and Security (cs.CR)
- [119] arXiv:2012.08559 [pdf]
-
Title: Intrusion detection in computer systems by using artificial neural networks with Deep Learning approachesJournal-ref: 10th International Conference on Advances in Computing and Information Technology (ACITY 2020), November 28~29, 2020, London, United Kingdom Volume Editors : David C. Wyld, Dhinaharan Nagamalai (Eds) ISBN : 978-1-925953-29-9Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [120] arXiv:2012.08680 [pdf, other]
-
Title: Trex: Learning Execution Semantics from Micro-Traces for Binary SimilaritySubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
- [121] arXiv:2012.08726 [pdf, other]
-
Title: Responsible Disclosure of Generative Models Using Scalable FingerprintingComments: Accepted to ICLR'22 as SpotlightSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Graphics (cs.GR); Machine Learning (cs.LG)
- [122] arXiv:2012.08782 [pdf, other]
-
Title: A novel Two-Factor HoneyToken Authentication MechanismAuthors: Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos DouligerisComments: 7 pages, 6 figuresSubjects: Cryptography and Security (cs.CR)
- [123] arXiv:2012.08811 [pdf, other]
-
Title: Investigating the Ecosystem of Offensive Information Security ToolsComments: Six pages, one figure, this work is a preprint of a paper accepted at the 1st Workshop on Next Generation Networks and Applications (NGNA-2020)Subjects: Cryptography and Security (cs.CR)
- [124] arXiv:2012.08835 [pdf, other]
-
Title: A Hybrid Graph Neural Network Approach for Detecting PHP VulnerabilitiesComments: A poster version of this paper appeared as this https URLSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [125] arXiv:2012.08968 [pdf]
-
Title: The Impact of Cyber Security Threats on the 2020 US ElectionsAuthors: Nicholas StedmonComments: 3 pagesSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[ showing 50 entries per page: fewer | more | all ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, 2206, contact, help (Access key information)