We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021

[ total of 346 entries: 1-100 | 101-200 | 201-300 | 301-346 ]
[ showing 100 entries per page: fewer | more | all ]
[1]  arXiv:2110.00094 [pdf]
Title: RFID Exploitation and Countermeasures
Authors: Luciano Gavoni
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2110.00104 [pdf, other]
Title: LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables
Authors: Mordechai Guri
Comments: Modified version accepted to 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021
Journal-ref: 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021, pp. 745-754
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2110.00250 [pdf]
Title: A Step Towards On-Path Security Function Outsourcing
Comments: Proceedings of International Conference on Distributed Computing and Networking (ICDCN 2022)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[4]  arXiv:2110.00274 [pdf, other]
Title: Enhancing Cold Wallet Security with Native Multi-Signature schemes in Centralized Exchanges
Comments: Nobitex Crypto-Exchange: this https URL, Available Online at: this https URL
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2110.00301 [pdf, other]
Title: Cyber-physical risk modeling with imperfect cyber-attackers
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[6]  arXiv:2110.00407 [src]
Title: Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing
Comments: Major update has been made and will be published at a later point in time
Journal-ref: Network and Distributed Systems Security (NDSS) Symposium 2022
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2110.00555 [pdf, other]
Title: Design of multiplicative watermarking against covert attacks
Comments: 6 page conference paper accepted to the 60th IEEE Conference on Decision and Control
Journal-ref: 2021 60th IEEE Conference on Decision and Control (CDC), profs. of
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[8]  arXiv:2110.00719 [pdf, ps, other]
Title: One-Bit Matrix Completion with Differential Privacy
Comments: In this version, we have fixed some typos and updated references
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[9]  arXiv:2110.00773 [pdf, other]
Title: Emerging Trends of Recently Published Datasets for Intrusion Detection Systems (IDS): A Survey
Comments: 18 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2110.00909 [pdf, other]
Title: Design and Evaluate Recomposited OR-AND-XOR-PUF
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2110.00981 [pdf, other]
Title: SecFL: Confidential Federated Learning using TEEs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[12]  arXiv:2110.01005 [pdf, other]
Title: Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations
Comments: Accepted to appear in the Proc. of ACM Conference on Computer and Communications Security (CCS 2022)
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2110.01038 [pdf]
Title: Generating and Managing Strong Passwords using Hotel Mnemonic
Authors: Sumith Yesudasan
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2110.01058 [pdf]
Title: Architecture of Network Camera Photo Authentication Scheme using Steganography Approach
Comments: 6 Pages, 3 Figures. arXiv admin note: text overlap with arXiv:1401.5561 by other authors
Journal-ref: International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 ISSN 2229-5518
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2110.01065 [pdf]
Title: A New Approach for Image Authentication Framework for Media Forensics Purpose
Comments: 11 pages, 19 figures and one table
Journal-ref: Journal of Computer Engineering & Information Technology, 2017, 6:6
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[16]  arXiv:2110.01137 [pdf]
Title: From cold resistor to secure key exchanger
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2110.01195 [pdf, other]
Title: Virtual Private Mobile Network with Multiple Gateways for B5G Location Privacy
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[18]  arXiv:2110.01202 [pdf, other]
Title: Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters
Authors: Han Wang
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[19]  arXiv:2110.01229 [pdf, other]
Title: 3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs
Comments: Accepted to Privacy Enhancing Technologies Symposium (PETS) 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[20]  arXiv:2110.01315 [pdf, ps, other]
Title: Towards General-purpose Infrastructure for Protecting Scientific Data Under Study
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[21]  arXiv:2110.01362 [pdf, other]
Title: Automating Privilege Escalation with Deep Reinforcement Learning
Comments: To appear at AISec'21 (aisec.cc)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2110.01390 [pdf, ps, other]
Title: A Lightweight, Anonymous and Confidential Genomic Computing for Industrial Scale Deployment
Authors: Huafei Zhu
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2110.01495 [pdf, other]
Title: Realizing Forward Defense in the Cyber Domain
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2110.01740 [pdf, ps, other]
Title: Error Correction for FrodoKEM Using the Gosset Lattice
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2110.01757 [pdf, other]
Title: Detecting Timing Attack on PMU Data utilizing Unwrapped Phase Angle and Low-Rank Henkel Matrix Properties
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[26]  arXiv:2110.01842 [pdf, other]
Title: Dataset: Large-scale Urban IoT Activity Data for DDoS Attack Emulation
Comments: 5 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2110.01864 [pdf, other]
Title: Mobile authentication of copy detection patterns: how critical is to know fakes?
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[28]  arXiv:2110.01904 [pdf, other]
Title: System Security Assurance: A Systematic Literature Review
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[29]  arXiv:2110.01970 [pdf]
Title: Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure
Comments: Accepted for publication in the International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21)
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2110.01984 [pdf, other]
Title: Differential Privacy of Dirichlet Posterior Sampling
Comments: The privacy guarantees have been rewritten in terms of R\'enyi Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[31]  arXiv:2110.02022 [pdf, other]
Title: VESPo: Verified Evaluation of Secret Polynomials
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[32]  arXiv:2110.02040 [pdf]
Title: An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment
Comments: To be published in Proceedings of the CIRED 2021 Conference
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[33]  arXiv:2110.02103 [pdf, other]
Title: Notarial timestamps savings in logs management via Merkle trees and Key Derivation Functions
Authors: Andrea Barontini
Comments: 8 pages, 3 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2110.02125 [pdf, other]
Title: Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Machine Learning (cs.LG); Systems and Control (eess.SY)
[35]  arXiv:2110.02176 [pdf, other]
Title: Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[36]  arXiv:2110.02182 [pdf, other]
Title: Blockchain-based Federated Learning: A Comprehensive Survey
Authors: Zhilin Wang, Qin Hu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[37]  arXiv:2110.02221 [pdf, ps, other]
Title: Securing Federated Learning: A Covert Communication-based Approach
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2110.02259 [pdf, other]
Title: Multi-Modal Attack Detection for Cyber-Physical Additive Manufacturing
Journal-ref: TC-CPS Newsletter Volume 05, Issue 01 (Mar. 2020)
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2110.02329 [pdf, other]
Title: Task-aware Privacy Preservation for Multi-dimensional Data
Comments: Accepted by 39th International Conference on Machine Learning (ICML 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40]  arXiv:2110.02498 [pdf, other]
Title: Adversarial Attacks on Machinery Fault Diagnosis
Comments: 5 pages, 5 figures. Submitted to Interspeech 2022
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[41]  arXiv:2110.02504 [pdf, other]
Title: Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2110.02553 [pdf, ps, other]
Title: A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version
Comments: 20 pages, 7 figures, Shortened version to be published CRiSIS 2021
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2110.02594 [pdf, other]
Title: Empowering Citizens by a Blockchain-Based Robinson List
Comments: This article has been accepted for publication in International Journal of Computers and Applications, published by Taylor & Francis
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[44]  arXiv:2110.02631 [pdf, other]
Title: Inference Attacks Against Graph Neural Networks
Comments: 19 pages, 18 figures. To Appear in the 31st USENIX Security Symposium
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[45]  arXiv:2110.02940 [pdf, other]
Title: Secure Byzantine-Robust Distributed Learning via Clustering
Comments: 18 pages, 9 Figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[46]  arXiv:2110.03054 [pdf, other]
Title: On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models
Comments: Under Double-Blind Review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[47]  arXiv:2110.03080 [pdf, ps, other]
Title: Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data (Extended Version)
Comments: This extended version of our USENIX Security '22 paper includes appendices for interested readers
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[48]  arXiv:2110.03088 [pdf]
Title: Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Comments: arXiv admin note: substantial text overlap with arXiv:2005.10429, arXiv:2012.02848
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2110.03154 [pdf, other]
Title: DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems
Authors: Ce Zhou (1), Qiben Yan (1), Yan Shi (1), Lichao Sun (2) ((1) Michigan State University, (2) Lehigh University)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[50]  arXiv:2110.03168 [pdf, ps, other]
Title: Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses
Comments: To appear in the ACM Workshop on Privacy in the Electronic Society (WPES '21)
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2110.03175 [pdf, other]
Title: Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[52]  arXiv:2110.03445 [pdf]
Title: PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[53]  arXiv:2110.03447 [pdf]
Title: GPS Spoofing Attacks on Phasor Measurement Units: Practical Feasibility and Countermeasures
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2110.03478 [pdf, other]
Title: Complex-valued deep learning with differential privacy
Comments: Submitted as conference paper to ICLR 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[55]  arXiv:2110.03491 [pdf, other]
Title: Privacy-preserving methods for smart-meter-based network simulations
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2110.03649 [pdf, other]
Title: Neural Networks, Inside Out: Solving for Inputs Given Parameters (A Preliminary Investigation)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Numerical Analysis (math.NA)
[57]  arXiv:2110.03798 [pdf, other]
Title: MPD: Moving Target Defense through Communication Protocol Dialects
Comments: 2021 EAI SecureComm
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2110.04180 [pdf, other]
Title: IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2110.04259 [pdf, other]
Title: A Wireless Intrusion Detection System for 802.11 WPA3 Networks
Comments: Nine pages including one page of references
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[60]  arXiv:2110.04293 [pdf, ps, other]
Title: Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions
Comments: The is the full version of the paper that will appear in Cryptology and Network Security (CANS), 2021
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2110.04394 [pdf, other]
Title: Identifying blockchain-based cryptocurrency accounts using investment portfolios
Authors: Amin Aghaee
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2110.04457 [pdf]
Title: Tailoring the Cyber Security Framework: How to Overcome the Complexities of Secure Live Virtual Machine Migration in Cloud Computing
Comments: Conference paper, 8 pages, 3 figures, Proceedings of the International Conference on Information Resources Management (CONF-IRM2020)
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2110.04488 [pdf, other]
Title: Demystifying the Transferability of Adversarial Attacks in Computer Networks
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[64]  arXiv:2110.04618 [pdf, other]
Title: A Multiple Snapshot Attack on Deniable Storage Systems
Comments: Submitted to MASCOTS 2021
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2110.04691 [pdf, other]
Title: Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2110.04751 [pdf, other]
Title: Dynamic Process Isolation
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2110.04788 [pdf, other]
Title: Garmr: Defending the gates of PKU-based sandboxing
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2110.04795 [pdf, ps, other]
Title: Group Signatures and Accountable Ring Signatures from Isogeny-based Assumptions
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2110.04887 [pdf, other]
Title: Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability
Comments: To appear in the 20th CyberWorlds Conference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70]  arXiv:2110.05005 [pdf, ps, other]
Title: Quasi-Cyclic Stern Proof of Knowledge
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2110.05022 [pdf, other]
Title: Blockchain for Edge of Things: Applications, Opportunities, and Challenges
Comments: The paper is accepted for publication in IEEE IoTJ
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72]  arXiv:2110.05088 [pdf, other]
Title: Privacy-Preserving Feature Selection with Fully Homomorphic Encryption
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2110.05118 [pdf, other]
Title: Confidential Token-Based License Management
Comments: To be published in the proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security (AMSec '21)
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2110.05154 [pdf, other]
Title: Privacy preserving local analysis of digital trace data: A proof-of-concept
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2110.05160 [pdf, other]
Title: Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope
Comments: Proc. of 31st USENIX Security Symposium, camera-ready
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[76]  arXiv:2110.05321 [pdf, other]
Title: Quantum solutions to possible challenges of Blockchain technology
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[77]  arXiv:2110.05335 [pdf, other]
Title: From FPGAs to Obfuscated eASICs: Design and Security Trade-offs
Comments: The results for the paper are given on the following link: this https URL
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[78]  arXiv:2110.05344 [pdf, other]
Title: Quantum multi-factor authentication
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[79]  arXiv:2110.05370 [pdf]
Title: Classifying SMEs for Approaching Cybersecurity Competence and Awareness
Comments: 7 pages, 1 Table, The 16th International Conference on Availability, Reliability and Security. (ARES 2021)
Journal-ref: Shojaifar, A., & Jarvinen, H. (2021, August). Classifying SMEs for Approaching Cybersecurity Competence and Awareness. In The 16th International Conference on Availability, Reliability and Security (pp. 1-7)
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2110.05524 [pdf, other]
Title: Generalization Techniques Empirically Outperform Differential Privacy against Membership Inference
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2110.05562 [pdf, other]
Title: A Mutation Framework for Evaluating Security Analysis tools in IoT Applications
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[82]  arXiv:2110.05619 [pdf, other]
Title: Towards a Principled Approach for Dynamic Analysis of Android's Middleware
Comments: Version submitted to USENIX OSDI'20
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2110.05840 [pdf, other]
Title: A bridge between features and evidence for binary attribute-driven perfect privacy
Comments: ICASSP 2022
Subjects: Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[84]  arXiv:2110.05849 [pdf, ps, other]
Title: Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection
Comments: Accepted at The Sixth International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2021)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[85]  arXiv:2110.05878 [pdf, other]
Title: Sanctuary lost: a cyber-physical warfare in space
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[86]  arXiv:2110.05895 [pdf, ps, other]
Title: Adjusting Queries to Statistical Procedures Under Differential Privacy
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2110.05949 [pdf]
Title: Securing music sharing platforms: A Blockchain-Based Approach
Comments: 13 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2110.05977 [pdf, other]
Title: Datasets are not Enough: Challenges in Labeling Network Traffic
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2110.06019 [pdf]
Title: Secure Email -- A Usability Study
Authors: Adrian Reuter (TUM), Karima Boudaoud (I3S), Marco Winckler (I3S, WIMMICS, IRIT-ICS), Ahmed Abdelmaksoud (I3S), Wadie Lemrazzeq (I3S)
Journal-ref: FC 2020: Workshops, International Conference on Financial Cryptography and Data Security, 12063, pp.36-46, 2020, Lecture Notes in Computer Science book series (LNCS, volume 12063), 978-3-030-54454-6
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[90]  arXiv:2110.06025 [pdf, other]
Title: Privacy-Preserving Phishing Email Detection Based on Federated Learning and LSTM
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91]  arXiv:2110.06253 [pdf, other]
Title: StateAFL: Greybox Fuzzing for Stateful Network Servers
Authors: Roberto Natella
Comments: The tool is available at this https URL
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS); Software Engineering (cs.SE)
[92]  arXiv:2110.06363 [pdf, other]
Title: A Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2110.06412 [pdf, other]
Title: Offset-Symmetric Gaussians for Differential Privacy
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[94]  arXiv:2110.06413 [pdf]
Title: 3LSAA: A Secure And Privacy-preserving Zero-knowledge-based Data-sharing Approach Under An Untrusted Environment
Comments: 21 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2110.06485 [pdf, other]
Title: Communication-Efficient Triangle Counting under Local Differential Privacy
Comments: Full version of the paper accepted at USENIX Security 2022; The first and second authors made equal contribution
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[96]  arXiv:2110.06654 [pdf, other]
Title: State of Security and Privacy Practices of Top Websites in the East African Community (EAC)
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[97]  arXiv:2110.06657 [pdf]
Title: SmashEx: Smashing SGX Enclaves Using Exceptions
Comments: Accepted to ACM CCS 2021
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2110.06904 [pdf, ps, other]
Title: Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks
Comments: 18 pages
Journal-ref: USENIX Security Symposium 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[99]  arXiv:2110.07009 [pdf, other]
Title: Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[100]  arXiv:2110.07157 [pdf, other]
Title: Bandwidth Utilization Side-Channel on ML Inference Accelerators
Subjects: Cryptography and Security (cs.CR)
[ total of 346 entries: 1-100 | 101-200 | 201-300 | 301-346 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2206, contact, help  (Access key information)