We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2020, skipping first 75

[ total of 308 entries: 1-50 | 26-75 | 76-125 | 126-175 | 176-225 | 226-275 | 276-308 ]
[ showing 50 entries per page: fewer | more | all ]
[76]  arXiv:2012.05434 [pdf, other]
Title: Composite Adversarial Attacks
Comments: To appear in AAAI 2021, code will be released later
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[77]  arXiv:2012.05471 [pdf, other]
Title: Securing the EDK II Image Loader
Comments: 10 pages, 2 tables
Journal-ref: 2020 Ivannikov Ispras Open Conference (ISPRAS), 2020, pp. 16-25
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[78]  arXiv:2012.05516 [pdf, other]
Title: Explainable Link Prediction for Privacy-Preserving Contact Tracing
Comments: 8 pages, 7 figures, SpicyFL 2020 Workshop at NeurIPS 2020
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[79]  arXiv:2012.05749 [pdf, other]
Title: Data Privacy in Trigger-Action Systems
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2012.05867 [pdf, other]
Title: Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2012.05948 [pdf, other]
Title: GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking
Comments: 6 pages, 4 figures, 6 tables, conference
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2012.06128 [pdf, other]
Title: SoK: Diving into DAG-based Blockchain Systems
Comments: Full version
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[83]  arXiv:2012.06150 [pdf, other]
Title: FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[84]  arXiv:2012.06300 [pdf, other]
Title: Towards Secure and Leak-Free Workflows Using Microservice Isolation
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2012.06330 [pdf, other]
Title: Detection of Adversarial Supports in Few-shot Classifiers Using Self-Similarity and Filtering
Comments: Accepted in the International Workshop on Safety and Security of Deep Learning 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[86]  arXiv:2012.06332 [pdf]
Title: An Empirical Review of Adversarial Defenses
Authors: Ayush Goel
Comments: 19 pages, 8 Figures, Report Reviewed by Vivek Menon
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[87]  arXiv:2012.06337 [pdf, other]
Title: Privacy and Robustness in Federated Learning: Attacks and Defenses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[88]  arXiv:2012.06340 [pdf, ps, other]
Title: Control Flow Obfuscation for FJ using Continuation Passing
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[89]  arXiv:2012.06354 [pdf, other]
Title: Privacy-preserving medical image analysis
Comments: Accepted at the workshop for Medical Imaging meets NeurIPS, 34th Conference on Neural Information Processing Systems (NeurIPS) December 11, 2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[90]  arXiv:2012.06502 [pdf, other]
Title: Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions
Journal-ref: Published at ACSAC 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[91]  arXiv:2012.06554 [pdf, other]
Title: TEEMon: A continuous performance monitoring framework for TEEs
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[92]  arXiv:2012.06609 [pdf, other]
Title: RegulaTor: A Straightforward Website Fingerprinting Defense
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2012.06658 [pdf, other]
Title: Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
Comments: Published in the proceedings of DSN'21 (51st IEEE/IFIP Int. Conf. on Dependable Systems and Networks). Code and BibTeX entry available at this https URL
Journal-ref: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[94]  arXiv:2012.06666 [pdf, other]
Title: Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones are not Enough
Comments: 19 pages, 15 Figures, IEEE Internet of Things Journal
Journal-ref: IEEE Internet of Things Journal, 2021
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2012.06761 [pdf, other]
Title: CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2012.06805 [pdf, other]
Title: Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2012.06810 [pdf]
Title: Achieving Security and Privacy in Federated Learning Systems: Survey, Research Challenges and Future Directions
Comments: 40 pages, 19 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[98]  arXiv:2012.06884 [pdf, other]
Title: AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers
Authors: Mordechai Guri
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2012.07006 [pdf, other]
Title: DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[100]  arXiv:2012.07173 [pdf, ps, other]
Title: Cover attacks for elliptic curves with prime order
Authors: Song Tian
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG)
[101]  arXiv:2012.07242 [pdf, other]
Title: Neighbors From Hell: Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAs
Comments: Published in the 2020 proceedings of the International Conference of Field-Programmable Technology (ICFPT)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[102]  arXiv:2012.07339 [pdf, other]
Title: Verifiable Observation of Permissioned Ledgers
Comments: Full report of ICBC'21 version
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[103]  arXiv:2012.07432 [pdf, other]
Title: Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Authors: Amit Klein
Comments: To be published in 2021 IEEE Symposium on Security and Privacy (SP)
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2012.07626 [pdf, ps, other]
Title: On Lightweight Privacy-Preserving Collaborative Learning for Internet of Things by Independent Random Projections
Comments: arXiv admin note: substantial text overlap with arXiv:1902.05197
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[105]  arXiv:2012.07634 [pdf, other]
Title: SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection
Comments: Associated code available at: this https URL
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2012.07805 [pdf, other]
Title: Extracting Training Data from Large Language Models
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[107]  arXiv:2012.07916 [pdf, other]
Title: When Physical Unclonable Function Meets Biometrics
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[108]  arXiv:2012.07917 [pdf, other]
Title: The Design and Implementation of a Verified File System with End-to-End Data Integrity
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[109]  arXiv:2012.07944 [pdf, other]
Title: Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services
Comments: To appear at: Rahel A. Fainchtein, Adam A. Aviv, Micah Sherr, Stephen Ribaudo, and Armaan Khullar. Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. Proceedings on Privacy Enhancing Technologies (PoPETS), July 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[110]  arXiv:2012.07989 [pdf]
Title: The Emerging Threats of Deepfake Attacks and Countermeasures
Comments: 5
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[111]  arXiv:2012.07994 [pdf, other]
Title: Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model
Comments: Accepted in 35th AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML)
Journal-ref: AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML), February 2-9, 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2012.08003 [pdf, other]
Title: Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies
Comments: 21 pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[113]  arXiv:2012.08042 [pdf]
Title: Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach
Comments: 9 pages, 1 figure, 1 table, conference
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2012.08318 [pdf]
Title: Application of deep learning to enhance the accuracy of intrusion detection in modern computer networks
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2012.08347 [pdf]
Title: Beyond Privacy Trade-offs with Structured Transparency
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[116]  arXiv:2012.08356 [pdf]
Title: Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection
Comments: 5 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[117]  arXiv:2012.08460 [pdf]
Title: Review and Test of Steganography Techniques
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2012.08487 [pdf, other]
Title: Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation
Comments: 11 pages, 10 figures
Journal-ref: Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2012.08559 [pdf]
Title: Intrusion detection in computer systems by using artificial neural networks with Deep Learning approaches
Journal-ref: 10th International Conference on Advances in Computing and Information Technology (ACITY 2020), November 28~29, 2020, London, United Kingdom Volume Editors : David C. Wyld, Dhinaharan Nagamalai (Eds) ISBN : 978-1-925953-29-9
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[120]  arXiv:2012.08680 [pdf, other]
Title: Trex: Learning Execution Semantics from Micro-Traces for Binary Similarity
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[121]  arXiv:2012.08726 [pdf, other]
Title: Responsible Disclosure of Generative Models Using Scalable Fingerprinting
Comments: Accepted to ICLR'22 as Spotlight
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Graphics (cs.GR); Machine Learning (cs.LG)
[122]  arXiv:2012.08782 [pdf, other]
Title: A novel Two-Factor HoneyToken Authentication Mechanism
Comments: 7 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2012.08811 [pdf, other]
Title: Investigating the Ecosystem of Offensive Information Security Tools
Comments: Six pages, one figure, this work is a preprint of a paper accepted at the 1st Workshop on Next Generation Networks and Applications (NGNA-2020)
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2012.08835 [pdf, other]
Title: A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities
Comments: A poster version of this paper appeared as this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[125]  arXiv:2012.08968 [pdf]
Title: The Impact of Cyber Security Threats on the 2020 US Elections
Authors: Nicholas Stedmon
Comments: 3 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[ total of 308 entries: 1-50 | 26-75 | 76-125 | 126-175 | 176-225 | 226-275 | 276-308 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2206, contact, help  (Access key information)