We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 57 entries: 1-25 | 26-50 | 51-57 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 26 Jan 2023

[1]  arXiv:2301.10733 [pdf]
Title: The Synchronic Web
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2301.10629 [pdf, other]
Title: Evaluating Deception and Moving Target Defense with Network Attack Simulation
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2301.10618 [pdf, other]
Title: Clueless: A Tool Characterising Values Leaking as Addresses
Comments: Accepted by Hardware and Architectural Support for Security and Privacy (HASP) 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[4]  arXiv:2301.10597 [pdf, other]
Title: Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript
Authors: Romain Fouquet (CRIStAL, SPIRALS), Pierre Laperdrix (CRIStAL, SPIRALS), Romain Rouvoy (SPIRALS, IUF)
Comments: ACM Transactions on Internet Technology, In press
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2301.10502 [pdf, other]
Title: SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation
Comments: 8 pages, 1 figure, 2 tables, ICISSP 2023 this https URL
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2301.10395 [pdf, ps, other]
Title: Huff-DP: Huffman Coding based Differential Privacy Mechanism for Real-Time Data
Comments: Submitted to Venue
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2301.10336 [pdf, other]
Title: A survey of Digital Manufacturing Hardware and Software Trojans
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2301.10545 (cross-list from cs.SE) [pdf, other]
Title: Beware of the Unexpected: Bimodal Taint Analysis
Journal-ref: International Symposium on Software Testing and Analysis (ISSTA), 2023
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[9]  arXiv:2301.10541 (cross-list from econ.GN) [pdf, other]
Title: Educational Game on Cryptocurrency Investment: Using Microeconomic Decision Making to Understand Macroeconomic Principles
Subjects: General Economics (econ.GN); Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR); Computational Finance (q-fin.CP); General Finance (q-fin.GN)
[10]  arXiv:2301.10433 (cross-list from quant-ph) [pdf, other]
Title: Delegated variational quantum algorithms based on quantum homomorphic encryption
Comments: 12 pages, 15 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[11]  arXiv:2301.10412 (cross-list from cs.CL) [pdf, other]
Title: BDMMT: Backdoor Sample Detection for Language Models through Model Mutation Testing
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[12]  arXiv:2301.10407 (cross-list from cs.SE) [pdf, other]
Title: Don't Lie to Me: Avoiding Malicious Explanations with STEALTH
Comments: 6 pages, 6 Tables, 3 figures
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[13]  arXiv:2301.10400 (cross-list from cs.LG) [pdf, other]
Title: When to Trust Aggregated Gradients: Addressing Negative Client Sampling in Federated Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 25 Jan 2023 (showing first 12 of 14 entries)

[14]  arXiv:2301.10213 [pdf, ps, other]
Title: Database Reconstruction Is Not So Easy and Is Different from Reidentification
Comments: Journal of Official Statistics (to appear)
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[15]  arXiv:2301.10056 [pdf]
Title: Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses
Journal-ref: 2023 IEEE Symposium on Security and Privacy (SP)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Multimedia (cs.MM); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[16]  arXiv:2301.09956 [pdf, other]
Title: Membership Inference of Diffusion Models
Authors: Hailong Hu, Jun Pang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17]  arXiv:2301.09806 [pdf, other]
Title: Demystifying NFT Promotion and Phishing Scams
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[18]  arXiv:2301.09801 [pdf, other]
Title: Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Comments: Accepted by IEEE Internet of Things Journal
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG); Machine Learning (stat.ML)
[19]  arXiv:2301.09761 [pdf, other]
Title: $\textit{FairShare}$: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT
Comments: Accepted for publication at IEEE Transactions on Network and Service Management under the Special Issue of "Recent Advances on Blockchain for Network and Service Management"
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[20]  arXiv:2301.09740 [pdf, other]
Title: DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[21]  arXiv:2301.09738 [pdf, other]
Title: Security of Electrical, Optical and Wireless On-Chip Interconnects: A Survey
Comments: 35 pages, 16 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Networking and Internet Architecture (cs.NI)
[22]  arXiv:2301.10226 (cross-list from cs.LG) [pdf, other]
Title: A Watermark for Large Language Models
Comments: 12 pages in the main body. Code will be available at github.com/jwkirchenbauer/lm-watermarking
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[23]  arXiv:2301.10216 (cross-list from cs.LO) [pdf, other]
Title: C-SAR: SAT Attack Resistant Logic Locking for RSFQ Circuits
Subjects: Logic in Computer Science (cs.LO); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[24]  arXiv:2301.10053 (cross-list from cs.LG) [pdf, other]
Title: A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[25]  arXiv:2301.10028 (cross-list from cs.CY) [pdf]
Title: Super forecasting the technological singularity risks from artificial intelligence
Journal-ref: Evol. Syst. 2022, pp. 1 11, Jun. 2022
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 57 entries: 1-25 | 26-50 | 51-57 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2301, contact, help  (Access key information)