We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021

[ total of 346 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 301-346 ]
[ showing 50 entries per page: fewer | more | all ]
[1]  arXiv:2110.00094 [pdf]
Title: RFID Exploitation and Countermeasures
Authors: Luciano Gavoni
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2110.00104 [pdf, other]
Title: LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables
Authors: Mordechai Guri
Comments: Modified version accepted to 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021
Journal-ref: 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021, pp. 745-754
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2110.00250 [pdf]
Title: A Step Towards On-Path Security Function Outsourcing
Comments: Proceedings of International Conference on Distributed Computing and Networking (ICDCN 2022)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[4]  arXiv:2110.00274 [pdf, other]
Title: Enhancing Cold Wallet Security with Native Multi-Signature schemes in Centralized Exchanges
Comments: Nobitex Crypto-Exchange: this https URL, Available Online at: this https URL
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2110.00301 [pdf, other]
Title: Cyber-physical risk modeling with imperfect cyber-attackers
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[6]  arXiv:2110.00407 [src]
Title: Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing
Comments: Major update has been made and will be published at a later point in time
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2110.00555 [pdf, other]
Title: Design of multiplicative watermarking against covert attacks
Comments: 6 page conference paper accepted to the 60th IEEE Conference on Decision and Control
Journal-ref: 2021 60th IEEE Conference on Decision and Control (CDC), profs. of
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[8]  arXiv:2110.00719 [src]
Title: One-Bit Matrix Completion with Differential Privacy
Comments: We find some errors in the article
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[9]  arXiv:2110.00773 [pdf, other]
Title: Emerging Trends of Recently Published Datasets for Intrusion Detection Systems (IDS): A Survey
Comments: 18 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2110.00909 [pdf, other]
Title: Design and Evaluate Recomposited OR-AND-XOR-PUF
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2110.00981 [pdf, other]
Title: SecFL: Confidential Federated Learning using TEEs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[12]  arXiv:2110.01005 [pdf, other]
Title: Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations
Comments: Accepted to appear in the Proc. of ACM Conference on Computer and Communications Security (CCS 2022)
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2110.01038 [pdf]
Title: Generating and Managing Strong Passwords using Hotel Mnemonic
Authors: Sumith Yesudasan
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2110.01058 [pdf]
Title: Architecture of Network Camera Photo Authentication Scheme using Steganography Approach
Comments: 6 Pages, 3 Figures. arXiv admin note: text overlap with arXiv:1401.5561 by other authors
Journal-ref: International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 ISSN 2229-5518
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2110.01065 [pdf]
Title: A New Approach for Image Authentication Framework for Media Forensics Purpose
Comments: 11 pages, 19 figures and one table
Journal-ref: Journal of Computer Engineering & Information Technology, 2017, 6:6
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[16]  arXiv:2110.01137 [pdf]
Title: From cold resistor to secure key exchanger
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2110.01195 [pdf, other]
Title: Virtual Private Mobile Network with Multiple Gateways for B5G Location Privacy
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[18]  arXiv:2110.01202 [pdf, other]
Title: Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters
Authors: Han Wang
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[19]  arXiv:2110.01229 [pdf, other]
Title: AsymML: An Asymmetric Decomposition Framework for Privacy-Preserving DNN Training and Inference
Comments: 11 pages in total (7-page main contents, 1-page reference, 3-page appendix)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[20]  arXiv:2110.01315 [pdf, ps, other]
Title: Towards General-purpose Infrastructure for Protecting Scientific Data Under Study
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[21]  arXiv:2110.01362 [pdf, other]
Title: Automating Privilege Escalation with Deep Reinforcement Learning
Comments: To appear at AISec'21 (aisec.cc)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2110.01390 [pdf, ps, other]
Title: A Lightweight, Anonymous and Confidential Genomic Computing for Industrial Scale Deployment
Authors: Huafei Zhu
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2110.01495 [pdf, other]
Title: Realizing Forward Defense in the Cyber Domain
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2110.01740 [pdf, ps, other]
Title: Error Correction for FrodoKEM Using the Gosset Lattice
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2110.01757 [pdf, other]
Title: Detecting Timing Attack on PMU Data utilizing Unwrapped Phase Angle and Low-Rank Henkel Matrix Properties
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[26]  arXiv:2110.01842 [pdf, other]
Title: Dataset: Large-scale Urban IoT Activity Data for DDoS Attack Emulation
Comments: 5 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2110.01864 [pdf, other]
Title: Mobile authentication of copy detection patterns: how critical is to know fakes?
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[28]  arXiv:2110.01904 [pdf, other]
Title: System Security Assurance: A Systematic Literature Review
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[29]  arXiv:2110.01970 [pdf]
Title: Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure
Comments: Accepted for publication in the International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21)
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2110.01984 [pdf, other]
Title: Differential Privacy of Dirichlet Posterior Sampling
Comments: The privacy guarantees have been rewritten in terms of R\'enyi Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[31]  arXiv:2110.02022 [pdf, other]
Title: VESPo: Verified Evaluation of Secret Polynomials
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[32]  arXiv:2110.02040 [pdf]
Title: An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment
Comments: To be published in Proceedings of the CIRED 2021 Conference
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[33]  arXiv:2110.02103 [pdf, other]
Title: Notarial timestamps savings in logs management via Merkle trees and Key Derivation Functions
Authors: Andrea Barontini
Comments: 8 pages, 3 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2110.02125 [pdf, other]
Title: Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Machine Learning (cs.LG); Systems and Control (eess.SY)
[35]  arXiv:2110.02176 [pdf, other]
Title: Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[36]  arXiv:2110.02182 [pdf, other]
Title: Blockchain-based Federated Learning: A Comprehensive Survey
Authors: Zhilin Wang, Qin Hu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[37]  arXiv:2110.02221 [pdf, ps, other]
Title: Securing Federated Learning: A Covert Communication-based Approach
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2110.02259 [pdf, other]
Title: Multi-Modal Attack Detection for Cyber-Physical Additive Manufacturing
Journal-ref: TC-CPS Newsletter Volume 05, Issue 01 (Mar. 2020)
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2110.02329 [pdf, other]
Title: Task-aware Privacy Preservation for Multi-dimensional Data
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40]  arXiv:2110.02498 [pdf, other]
Title: Adversarial Attacks on Machinery Fault Diagnosis
Comments: 5 pages, 5 figures. Submitted to Interspeech 2022
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[41]  arXiv:2110.02504 [pdf, other]
Title: Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2110.02553 [pdf, ps, other]
Title: A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version
Comments: 20 pages, 7 figures, Shortened version to be published CRiSIS 2021
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2110.02594 [pdf, other]
Title: Empowering Citizens by a Blockchain-Based Robinson List
Comments: This article has been accepted for publication in International Journal of Computers and Applications, published by Taylor & Francis
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[44]  arXiv:2110.02631 [pdf, other]
Title: Inference Attacks Against Graph Neural Networks
Comments: 19 pages, 18 figures. To Appear in the 31st USENIX Security Symposium
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[45]  arXiv:2110.02940 [pdf, other]
Title: Secure Byzantine-Robust Distributed Learning via Clustering
Comments: 18 pages, 9 Figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[46]  arXiv:2110.03054 [pdf, other]
Title: On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning
Comments: Under Double-Blind Review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[47]  arXiv:2110.03080 [pdf, ps, other]
Title: Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data (Extended Version)
Comments: This extended version of our USENIX Security '22 paper includes appendices for interested readers
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[48]  arXiv:2110.03088 [pdf]
Title: Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Comments: arXiv admin note: substantial text overlap with arXiv:2005.10429, arXiv:2012.02848
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2110.03154 [pdf, other]
Title: DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems
Authors: Ce Zhou (1), Qiben Yan (1), Yan Shi (1), Lichao Sun (2) ((1) Michigan State University, (2) Lehigh University)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[50]  arXiv:2110.03168 [pdf, ps, other]
Title: Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses
Comments: To appear in the ACM Workshop on Privacy in the Electronic Society (WPES '21)
Subjects: Cryptography and Security (cs.CR)
[ total of 346 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 301-346 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2205, contact, help  (Access key information)