We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Sep 2022

[ total of 360 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 351-360 ]
[ showing 25 entries per page: fewer | more | all ]
[1]  arXiv:2209.00080 [pdf, other]
Title: Wiggle: Physical Challenge-Response Verification of Vehicle Platooning
Comments: 10 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2209.00170 [pdf, other]
Title: CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach
Comments: 22 pages. Submitted to ACM Transactions on Sensor Networks (TOSN)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Machine Learning (stat.ML)
[3]  arXiv:2209.00263 [pdf, other]
Title: Attack Tactic Identification by Transfer Learning of Language Model
Comments: 13 pages, 7 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2209.00307 [pdf, other]
Title: Memory Tagging: A Memory Efficient Design
Comments: 16 Pages, 7 Figures. This version of the paper extends a shorter version submitted to IEEE Euro S&P'23
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2209.00405 [pdf, other]
Title: Towards Assessing Isolation Properties in Partitioning Hypervisors
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2209.00411 [pdf, other]
Title: Efficient ML Models for Practical Secure Inference
Comments: 10 pages include references, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[7]  arXiv:2209.00586 [pdf, other]
Title: Authentication, Authorization, and Selective Disclosure for IoT data sharing using Verifiable Credentials and Zero-Knowledge Proofs
Comments: to appear in ESORICS Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2209.00685 [pdf, other]
Title: SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[9]  arXiv:2209.00721 [pdf, other]
Title: Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach
Comments: Preprint (Under revision), 35 pages. Added repository link, see this https URL
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2209.00741 [pdf]
Title: A Low-Cost Multi-Agent System for Physical Security in Smart Buildings
Comments: 10 pages, 2 tables, 3 figures, ICCCN 2022 conference
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Systems and Control (eess.SY)
[11]  arXiv:2209.00750 [pdf, other]
Title: Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[12]  arXiv:2209.00757 [pdf, other]
Title: Universal Fourier Attack for Time Series
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[13]  arXiv:2209.00778 [pdf, other]
Title: Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach
Comments: Accepted by IEEE Transactions on Smart Grid
Journal-ref: IEEE Transactions on Smart Grid 13 (2022) 4862-4872
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[14]  arXiv:2209.00782 [pdf, other]
Title: BinImg2Vec: Augmenting Malware Binary Image Classification with Data2Vec
Journal-ref: 1st International Conference on AI in Cybersecurity (ICAIC), 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[15]  arXiv:2209.00783 [pdf, other]
Title: TypoSwype: An Imaging Approach to Detect Typo-Squatting
Journal-ref: 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[16]  arXiv:2209.00786 [pdf, ps, other]
Title: Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2209.00812 [pdf, other]
Title: Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?
Comments: Accepted by the 33rd IEEE International Symposium on Software Reliability Engineering (ISSRE 2022)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[18]  arXiv:2209.00813 [pdf, other]
Title: CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems
Comments: 10 pages, 9 figures, To appear at ICCAD 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[19]  arXiv:2209.00862 [pdf, other]
Title: Spatio-Temporal Attack Course-of-Action (COA) Search Learning for Scalable and Time-Varying Networks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[20]  arXiv:2209.00943 [pdf, other]
Title: Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[21]  arXiv:2209.01105 [pdf]
Title: Data Encryption based on 7D Complex Chaotic System with Cubic Memristor for Smart Grid
Comments: Accepted by Frontiers in Energy Research
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[22]  arXiv:2209.01129 [pdf, other]
Title: Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure
Comments: Technical report, corresponding paper accepted to Transactions on Privacy and Security 2022 (TOPS), 54 pages. arXiv admin note: substantial text overlap with arXiv:1912.08788
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2209.01179 [pdf, other]
Title: Automatic Detection of Speculative Execution Combinations
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[24]  arXiv:2209.01285 [pdf, other]
Title: Security Best Practices: A Critical Analysis Using IoT as a Case Study
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2209.01290 [pdf, other]
Title: Accelerating Polynomial Multiplication for Homomorphic Encryption on GPUs
Comments: Accepted, to be pusblished at SEED 2022 conference (IEEE International Symposium on Secure and Private Execution Environment Design)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[ total of 360 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 351-360 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2301, contact, help  (Access key information)