We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021, skipping first 150

[ total of 346 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | 301-346 ]
[ showing 50 entries per page: fewer | more | all ]
[151]  arXiv:2110.10603 [pdf, other]
Title: Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications
Comments: This work is to appear at the 54th IEEE/ACM International Symposium on Microarchitecture (MICRO 2021)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[152]  arXiv:2110.10720 [pdf, ps, other]
Title: Privacy in Open Search: A Review of Challenges and Solutions
Comments: Paper accepted at OSSYM 2021 - Third International Open Search Symposium
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Information Retrieval (cs.IR)
[153]  arXiv:2110.10769 [pdf, other]
Title: RegGuard: Leveraging CPU Registers for Mitigation of Control- and Data-Oriented Attacks
Comments: 15 pages with 8 figures
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2110.11007 [pdf, other]
Title: Attack Detection and Localization in Smart Grid with Image-based Deep Learning
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2110.11091 [pdf, other]
Title: E-DPNCT: An Enhanced Attack Resilient Differential Privacy Model For Smart Grids Using Split Noise Cancellation
Comments: 10 pages, 12 figues, 4 tables
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2110.11177 [pdf, other]
Title: Decentralised Trustworthy Collaborative Intrusion Detection System for IoT
Comments: 8 pages, 7 figures, accepted to IEEE Blockchain 2021
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2110.11188 [pdf, other]
Title: Classification of Encrypted IoT Traffic Despite Padding and Shaping
Comments: 13 pages, 11 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[158]  arXiv:2110.11290 [pdf, other]
Title: Physical Side-Channel Attacks on Embedded Neural Networks: A Survey
Comments: 25 pages, 7 figures
Journal-ref: M. M\'endez Real and R. Salvador, "Physical Side-Channel Attacks on Embedded Neural Networks: A Survey," Applied Sciences, vol. 11, no. 15, p. 6790, Jul. 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[159]  arXiv:2110.11354 [pdf]
Title: Cybersecurity of Renewable Energy Data and Applications Using Distributed Ledger Technology
Comments: 5 pages, 4 figures, 2021 International Conference & Exposition on Modern Energy and Power Systems (ICMEPS2021)
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2110.11418 [pdf, ps, other]
Title: SABMIS: Sparse approximation based blind multi-image steganography scheme
Comments: 24 Pages, 9 Figures, and 5 Tables
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2110.11446 [pdf, other]
Title: ML with HE: Privacy Preserving Machine Learning Inferences for Genome Studies
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Genomics (q-bio.GN)
[162]  arXiv:2110.11459 [pdf, other]
Title: CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering
Subjects: Cryptography and Security (cs.CR)
[163]  arXiv:2110.11488 [pdf, other]
Title: Certificate Root Stores: An Area of Unity or Disparity?
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[164]  arXiv:2110.11578 [pdf, other]
Title: PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy
Comments: arXiv admin note: text overlap with arXiv:2012.06337 by other authors
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[165]  arXiv:2110.11603 [pdf, other]
Title: ReCFA: Resilient Control-Flow Attestation
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2110.11646 [pdf, other]
Title: WebFed: Cross-platform Federated Learning Framework Based on Web Browser with Local Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[167]  arXiv:2110.11740 [pdf, other]
Title: Selfish & Opaque Transaction Ordering in the Bitcoin Blockchain: The Case for Chain Neutrality
Comments: This is a pre-print of our paper accepted to appear to ACM IMC 2021
Journal-ref: In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC 2021)
Subjects: Cryptography and Security (cs.CR)
[168]  arXiv:2110.11765 [pdf, other]
Title: MOTENS: A Pedagogical Design Model for Serious Cyber Games
Comments: 22 pages, 12 figures and 6 tables
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2110.12127 [pdf, other]
Title: Low-Latency VLSI Architectures for Modular Polynomial Multiplication via Fast Filtering and Applications to Lattice-Based Cryptography
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[170]  arXiv:2110.12162 [pdf, other]
Title: Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities
Comments: Due to length limit, we slightly trimmed the abstract displayed on arXiv
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[171]  arXiv:2110.12340 [pdf, other]
Title: Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Subjects: Cryptography and Security (cs.CR)
[172]  arXiv:2110.12534 [pdf, other]
Title: When Blockchain Meets Auction Models: A Survey, Some Applications, and Challenges
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[173]  arXiv:2110.12553 [pdf, other]
Title: Towards Blockchain-enabled Open Architectures for Scalable Digital Asset Platforms
Comments: 21 pages, 9 diagrams
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2110.12627 [pdf, other]
Title: Orthogonal variance-based feature selection for intrusion detection systems
Comments: Accepted at ISNCC 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[175]  arXiv:2110.12925 [pdf, other]
Title: CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Comments: 8 pages, accepted to WWW 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[176]  arXiv:2110.12948 [pdf, other]
Title: Generating Watermarked Adversarial Texts
Comments: this https URL&hl=en
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[177]  arXiv:2110.12963 [pdf]
Title: Anomaly-Based Intrusion Detection System for Cyber-Physical System Security
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[178]  arXiv:2110.12974 [pdf]
Title: Blockchain application in simulated environment for Cyber-Physical Systems Security
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[179]  arXiv:2110.12989 [pdf, other]
Title: RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability
Subjects: Cryptography and Security (cs.CR)
[180]  arXiv:2110.13239 [pdf, ps, other]
Title: An Uncertainty Principle is a Price of Privacy-Preserving Microdata
Comments: Preprint of NeurIPS 2021 paper
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2110.13250 [pdf, other]
Title: Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Comments: accepted at ACML 2021
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[182]  arXiv:2110.13346 [pdf, other]
Title: Exploring eFPGA-based Redaction for IP Protection
Comments: Accepted to ICCAD 2021
Subjects: Cryptography and Security (cs.CR)
[183]  arXiv:2110.13407 [pdf]
Title: VLSI Implementation of Cryptographic Algorithms & Techniques: A Literature Review
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[184]  arXiv:2110.13409 [pdf, other]
Title: Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[185]  arXiv:2110.13424 [pdf, other]
Title: Precise URL Phishing Detection Using Neural Networks
Comments: 10 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE)
[186]  arXiv:2110.13488 [pdf, other]
Title: Wavelet: Code-based postquantum signatures with fast verification on microcontrollers
Subjects: Cryptography and Security (cs.CR)
[187]  arXiv:2110.13499 [pdf, other]
Title: SEDML: Securely and Efficiently Harnessing Distributed Knowledge in Machine Learning
Subjects: Cryptography and Security (cs.CR)
[188]  arXiv:2110.13562 [pdf, other]
Title: Measuring the Effectiveness of Digital Hygiene using Historical DNS Data
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[189]  arXiv:2110.13650 [pdf, other]
Title: GANash -- A GAN approach to steganography
Comments: Presented at the 6 th National Conference on Information and Communication Technologies (NCICT 2020), June 12, 2020
Subjects: Cryptography and Security (cs.CR)
[190]  arXiv:2110.13655 [pdf, other]
Title: Bridging the gap to real-world for network intrusion detection systems with data-centric approach
Comments: Camera-ready version from Data-centric AI workshop at NeurIPS 2021, see this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[191]  arXiv:2110.13760 [pdf, other]
Title: DPCOVID: Privacy-Preserving Federated Covid-19 Detection
Comments: 7 pages, 8 Figures, 4 Tables
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[192]  arXiv:2110.14090 [pdf]
Title: Teardown and feasibility study of IronKey -- the most secure USB Flash drive
Comments: 16 pages, 73 figures, Hardwear.IO conference 28-29 October 2021, Hague, Netherlands
Subjects: Cryptography and Security (cs.CR)
[193]  arXiv:2110.14596 [pdf, ps, other]
Title: Efficient and Secure TSA for the Tangle
Authors: Quentin Bramas (UNISTRA, ICube, ICUBE-Réseaux)
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Networking and Internet Architecture (cs.NI)
[194]  arXiv:2110.14597 [pdf, other]
Title: Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[195]  arXiv:2110.14693 [pdf, other]
Title: Towards Robust Reasoning over Knowledge Graphs
Subjects: Cryptography and Security (cs.CR)
[196]  arXiv:2110.14794 [pdf, other]
Title: Masked LARk: Masked Learning, Aggregation and Reporting worKflow
Comments: Microsoft Journal of Applied Research (MSJAR Volume 16)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[197]  arXiv:2110.14911 [pdf]
Title: A Machine Learning Approach for DDoS Detection on IoT Devices
Subjects: Cryptography and Security (cs.CR)
[198]  arXiv:2110.14979 [pdf, other]
Title: Unmanned Aerial Vehicles Traffic Management Solution Using Crowd-sensing and Blockchain
Comments: This work has been submitted to the IEEE for possible publication
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[199]  arXiv:2110.15150 [pdf, ps, other]
Title: Messaging with Purpose Limitation -- Privacy-Compliant Publish-Subscribe Systems
Subjects: Cryptography and Security (cs.CR)
[200]  arXiv:2110.15161 [pdf, other]
Title: Secure Blockchain Platform for Industrial IoT with Trusted Computing Hardware
Journal-ref: IEEE Internet of Things Magazine 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[ total of 346 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | 301-346 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2206, contact, help  (Access key information)