We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021, skipping first 140

[ total of 346 entries: 1-50 | 41-90 | 91-140 | 141-190 | 191-240 | 241-290 | 291-340 | 341-346 ]
[ showing 50 entries per page: fewer | more | all ]
[141]  arXiv:2110.10037 [pdf, ps, other]
Title: Java Card Virtual Machine Memory Organization: a Design Proposal
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2110.10086 [pdf, ps, other]
Title: Three Attacks on Proof-of-Stake Ethereum
Subjects: Cryptography and Security (cs.CR)
[143]  arXiv:2110.10129 [pdf, other]
Title: Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:2110.10291 [pdf, other]
Title: A Deeper Look into RowHammer`s Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses
Comments: A shorter version of this work is to appear at the 54th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-54), 2021
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[145]  arXiv:2110.10354 [pdf, other]
Title: Detecting Backdoor Attacks Against Point Cloud Classifiers
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[146]  arXiv:2110.10396 [pdf, other]
Title: UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services
Authors: Chengqian Guo (1, 2 and 4), Jingqiang Lin (3), Quanwei Cai (1, 2 and 4), Wei Wang (1, 2 and 4), Fengjun Li (5), Qiongxiao Wang (1, 2 and 4), Jiwu Jing (4), Bin Zhao (6) ((1) State Key Laboratory of Information Security, Institute of Information Engineering, CAS, (2) Data Assurance and Communication Security Research Center, CAS, (3) School of Cyber Security, University of Science and Technology of China, (4) School of Cyber Security, University of Chinese Academy of Sciences (5) University of Kansas, (6) JD.com Silicon Valley R&D Center)
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2110.10418 [pdf, other]
Title: Steganography of Complex Networks
Authors: Daewon Lee
Comments: 16 pages, 6 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[148]  arXiv:2110.10493 [pdf, ps, other]
Title: On the Effectiveness of Clone Detection for Detecting IoT-related Vulnerable Clones
Comments: 7 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[149]  arXiv:2110.10540 [pdf, other]
Title: On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2110.10567 [pdf, other]
Title: Fingerprint recognition with embedded presentation attacks detection: are we ready?
Journal-ref: IEEE Transactions on Information Forensics and Security (2021)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[151]  arXiv:2110.10603 [pdf, other]
Title: Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications
Comments: This work is to appear at the 54th IEEE/ACM International Symposium on Microarchitecture (MICRO 2021)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[152]  arXiv:2110.10720 [pdf, ps, other]
Title: Privacy in Open Search: A Review of Challenges and Solutions
Comments: Paper accepted at OSSYM 2021 - Third International Open Search Symposium
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Information Retrieval (cs.IR)
[153]  arXiv:2110.10769 [pdf, other]
Title: RegGuard: Leveraging CPU Registers for Mitigation of Control- and Data-Oriented Attacks
Comments: 15 pages with 8 figures
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2110.11007 [pdf, other]
Title: Attack Detection and Localization in Smart Grid with Image-based Deep Learning
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2110.11091 [pdf, other]
Title: E-DPNCT: An Enhanced Attack Resilient Differential Privacy Model For Smart Grids Using Split Noise Cancellation
Comments: 13 pages, 7 figues, 1 tables
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2110.11177 [pdf, other]
Title: Decentralised Trustworthy Collaborative Intrusion Detection System for IoT
Comments: 8 pages, 7 figures, accepted to IEEE Blockchain 2021
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2110.11188 [pdf, other]
Title: Classification of Encrypted IoT Traffic Despite Padding and Shaping
Comments: 13 pages, 11 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[158]  arXiv:2110.11290 [pdf, other]
Title: Physical Side-Channel Attacks on Embedded Neural Networks: A Survey
Comments: 25 pages, 7 figures
Journal-ref: M. M\'endez Real and R. Salvador, "Physical Side-Channel Attacks on Embedded Neural Networks: A Survey," Applied Sciences, vol. 11, no. 15, p. 6790, Jul. 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[159]  arXiv:2110.11354 [pdf]
Title: Cybersecurity of Renewable Energy Data and Applications Using Distributed Ledger Technology
Comments: 5 pages, 4 figures, 2021 International Conference & Exposition on Modern Energy and Power Systems (ICMEPS2021)
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2110.11418 [pdf, ps, other]
Title: SABMIS: Sparse approximation based blind multi-image steganography scheme
Comments: 37 Pages, 20 Figures, and 12 Tables
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2110.11446 [pdf, other]
Title: ML with HE: Privacy Preserving Machine Learning Inferences for Genome Studies
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Genomics (q-bio.GN)
[162]  arXiv:2110.11459 [pdf, other]
Title: CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering
Subjects: Cryptography and Security (cs.CR)
[163]  arXiv:2110.11488 [pdf, other]
Title: Certificate Root Stores: An Area of Unity or Disparity?
Journal-ref: USENIX Cyber Security Experimentation and Test Workshop (CSET 2022)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[164]  arXiv:2110.11578 [pdf, other]
Title: PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy
Comments: arXiv admin note: text overlap with arXiv:2012.06337 by other authors
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[165]  arXiv:2110.11603 [pdf, other]
Title: ReCFA: Resilient Control-Flow Attestation
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2110.11646 [pdf, other]
Title: WebFed: Cross-platform Federated Learning Framework Based on Web Browser with Local Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[167]  arXiv:2110.11740 [pdf, other]
Title: Selfish & Opaque Transaction Ordering in the Bitcoin Blockchain: The Case for Chain Neutrality
Comments: This is a pre-print of our paper accepted to appear to ACM IMC 2021
Journal-ref: In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC 2021)
Subjects: Cryptography and Security (cs.CR)
[168]  arXiv:2110.11765 [pdf, other]
Title: MOTENS: A Pedagogical Design Model for Serious Cyber Games
Comments: 22 pages, 12 figures and 6 tables
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2110.12127 [pdf, other]
Title: Low-Latency VLSI Architectures for Modular Polynomial Multiplication via Fast Filtering and Applications to Lattice-Based Cryptography
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[170]  arXiv:2110.12162 [pdf, other]
Title: Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities
Comments: Due to length limit, we slightly trimmed the abstract displayed on arXiv
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[171]  arXiv:2110.12340 [pdf, other]
Title: Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Comments: camera-ready for IEEE S&P 2022
Subjects: Cryptography and Security (cs.CR)
[172]  arXiv:2110.12534 [pdf, other]
Title: Integration of Blockchain and Auction Models: A Survey, Some Applications, and Challenges
Journal-ref: IEEE Commun. Surv. Tutor. 2022; 1-41
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[173]  arXiv:2110.12553 [pdf, other]
Title: Towards Blockchain-enabled Open Architectures for Scalable Digital Asset Platforms
Comments: 21 pages, 9 diagrams
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2110.12627 [pdf, other]
Title: Orthogonal variance-based feature selection for intrusion detection systems
Comments: Accepted at ISNCC 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[175]  arXiv:2110.12925 [pdf, other]
Title: CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Comments: 8 pages, accepted to WWW 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[176]  arXiv:2110.12948 [pdf, other]
Title: Generating Watermarked Adversarial Texts
Comments: this https URL&hl=en
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[177]  arXiv:2110.12963 [pdf]
Title: Anomaly-Based Intrusion Detection System for Cyber-Physical System Security
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[178]  arXiv:2110.12974 [pdf]
Title: Blockchain application in simulated environment for Cyber-Physical Systems Security
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[179]  arXiv:2110.12989 [pdf, other]
Title: RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability
Subjects: Cryptography and Security (cs.CR)
[180]  arXiv:2110.13239 [pdf, ps, other]
Title: An Uncertainty Principle is a Price of Privacy-Preserving Microdata
Comments: Preprint of NeurIPS 2021 paper
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2110.13250 [pdf, other]
Title: Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Comments: accepted at ACML 2021
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[182]  arXiv:2110.13346 [pdf, other]
Title: Exploring eFPGA-based Redaction for IP Protection
Comments: Accepted to ICCAD 2021
Subjects: Cryptography and Security (cs.CR)
[183]  arXiv:2110.13407 [pdf]
Title: VLSI Implementation of Cryptographic Algorithms & Techniques: A Literature Review
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[184]  arXiv:2110.13409 [pdf, other]
Title: Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[185]  arXiv:2110.13424 [pdf, other]
Title: Phish-Defence: Phishing Detection Using Deep Recurrent Neural Networks
Comments: 9 pages, 10 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE)
[186]  arXiv:2110.13488 [pdf, other]
Title: Wavelet: Code-based postquantum signatures with fast verification on microcontrollers
Subjects: Cryptography and Security (cs.CR)
[187]  arXiv:2110.13499 [pdf, other]
Title: SEDML: Securely and Efficiently Harnessing Distributed Knowledge in Machine Learning
Subjects: Cryptography and Security (cs.CR)
[188]  arXiv:2110.13562 [pdf, other]
Title: Measuring the Effectiveness of Digital Hygiene using Historical DNS Data
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[189]  arXiv:2110.13650 [pdf, other]
Title: GANash -- A GAN approach to steganography
Comments: Presented at the 6 th National Conference on Information and Communication Technologies (NCICT 2020), June 12, 2020
Subjects: Cryptography and Security (cs.CR)
[190]  arXiv:2110.13655 [pdf, other]
Title: Bridging the gap to real-world for network intrusion detection systems with data-centric approach
Comments: Camera-ready version from Data-centric AI workshop at NeurIPS 2021, see this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[ total of 346 entries: 1-50 | 41-90 | 91-140 | 141-190 | 191-240 | 241-290 | 291-340 | 341-346 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2302, contact, help  (Access key information)