Profile avatar
arxiv-cs-cr.bsky.social
Computer Science -- Cryptography and Security (cs.CR) source: export.arxiv.org/rss/cs.CR maintainer: @tmaehara.bsky.social
7,831 posts 185 followers 0 following
Prolific Poster

Austin Howard InjectLab: A Tactical Framework for Adversarial Threat Modeling Against Large Language Models https://arxiv.org/abs/2505.18156

G. L. Farchan A Blockchain-Based Approach for Secure and Transparent e-Faktur Issuance in Indonesia's VAT Reporting System https://arxiv.org/abs/2505.18157

Sunil Kumar Jang Bahadur, Gopala Dhar, Lavi Nigam GenAI Security: Outsmarting the Bots with a Proactive Testing Framework https://arxiv.org/abs/2505.18172

Taimoor Ahmad Quantum-Resilient Blockchain for Secure Transactions in UAV-Assisted Smart Agriculture Networks https://arxiv.org/abs/2505.18206

Youssouf Sidib\'e, Julia Gersey Privacy-Preserving Bathroom Monitoring for Elderly Emergencies Using PIR and LiDAR Sensors https://arxiv.org/abs/2505.18242

Nicolas K\"uchler, Ivan Petrov, Conrad Grobler, Ilia Shumailov Architectural Backdoors for Within-Batch Data Stealing and Model Inference Manipulation https://arxiv.org/abs/2505.18323

Rahul Thomas, Louai Zahran, Erica Choi, Akilesh Potti, Micah Goldblum, Arka Pal An Attack to Break Permutation-Based Private Third-Party Inference Schemes for LLMs https://arxiv.org/abs/2505.18332

Yuqi Jia, Zedian Shao, Yupei Liu, Jinyuan Jia, Dawn Song, Neil Zhenqiang Gong A Critical Evaluation of Defenses against Prompt Injection Attacks https://arxiv.org/abs/2505.18333

Boyi Wei, Benedikt Stroebl, Jiacen Xu, Joie Zhang, Zhou Li, Peter Henderson Dynamic Risk Assessments for Offensive Cybersecurity Agents https://arxiv.org/abs/2505.18384

Shuaishuai Liu, Gergely Bicz\'ok Modeling interdependent privacy threats https://arxiv.org/abs/2505.18386

Liao Peiyuan Towards Anonymous Neural Network Inference https://arxiv.org/abs/2505.18398

Sandeep Pirbhulal, Habtamu Abie, Martin Jullum, Didrik Nielsen, Anders L{\o}land AI/ML for 5G and Beyond Cybersecurity https://arxiv.org/abs/2505.18402

Guoheng Sun, Ziyao Wang, Xuandong Zhao, Bowei Tian, Zheyu Shen, Yexiao He, Jinming Xing, Ang Li Invisible Tokens, Visible Bills: The Urgent Need to Audit Hidden Operations in Opaque LLM Services https://arxiv.org/abs/2505.18471

Litao Ye, Bin Chen, Chen Sun, Shuo Wang, Peichang Zhang, Shengli Zhang A Study of Semi-Fungible Token based Wi-Fi Access Control https://arxiv.org/abs/2505.18518

Ritwik Murali, C Shunmuga Velayutham Adapting Novelty towards Generating Antigens for Antivirus systems https://arxiv.org/abs/2505.18520

Baolei Zhang, Haoran Xin, Jiatong Li, Dongzhe Zhang, Minghong Fang, Zhuqing Liu, Lihai Nie, Zheli Liu Benchmarking Poisoning Attacks against Retrieval-Augmented Generation https://arxiv.org/abs/2505.18543

Md Ahsanul Haque, Ismail Hossain, Md Mahmuduzzaman Kamol, Md Jahangir Alam, Suresh Kumar Amalapuram, Sajedul Talukder, Mohammad Saidur Rahman LAMDA: A Longitudinal Android Malware Benchmark for Concept Drift Analysis https://arxiv.org/abs/2505.18551

Faithful Chiagoziem Onwuegbuche, Adelodun Olaoluwa, Anca Delia Jurcut, Liliana Pasquale MLRan: A Behavioural Dataset for Ransomware Analysis and Detection https://arxiv.org/abs/2505.18613

Szivia Lesty\'an, William Letrone, Ludovica Robustelli, Gergely Bicz\'ok Anonymity-washing https://arxiv.org/abs/2505.18627

Yuanhe Zhang, Xinyue Wang, Haoran Gao, Zhenhong Zhou, Fanyu Meng, Yuyao Zhang, Sen Su $PD^3F$: A Pluggable and Dynamic DoS-Defense Framework Against Resource Consumption Attacks Targeting Large Language Models https://arxiv.org/abs/2505.18680

Eunjin Roh, Yigitcan Kaya, Christopher Kruegel, Giovanni Vigna, Sanghyun Hong MADCAT: Combating Malware Detection Under Concept Drift with Test-Time Adaptation https://arxiv.org/abs/2505.18734

Kelechi G. Kalu, Sofia Okorafor, Bet\"ul Durak, Kim Laine, Radames C. Moreno, Santiago Torres-Arias, James C. Davis ARMS: A Vision for Actor Reputation Metric Systems in the Open-Source Software Supply Chain https://arxiv.org/abs/2505.18760

Jamie Hayes, Ilia Shumailov, Christopher A. Choquette-Choo, Matthew Jagielski, George Kaissis, Katherine Lee, Milad Nasr, Sahra Ghalebikesabi, ... Strong Membership Inference Attacks on Massive Datasets and (Moderately) Large Language Models https://arxiv.org/abs/2505.18773

Nam Hoang Thanh, Trung Pham Duy, Lam Bui Thu Mal-D2GAN: Double-Detector based GAN for Malware Generation https://arxiv.org/abs/2505.18806

Omer Ege, Mustafa Cagal, Kemal Bicakci Usability of Token-based and Remote Electronic Signatures: A User Experience Study https://arxiv.org/abs/2505.18814

Muhammed Golec, Yaser Khamayseh, Suhib Bani Melhem, Abdulmalik Alwarafy LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy https://arxiv.org/abs/2505.18846

Gogulakrishnan Thiyagarajan, Vinay Bist, Prabhudarshi Nayak Securing Credit Inquiries: The Role of Real-Time User Approval in Preventing SSN Identity Theft https://arxiv.org/abs/2505.18861

Brady D. Lund, Bryan Anderson, Ana Roeschley, Gahangir Hossain Understanding the Relationship Between Personal Data Privacy Literacy and Data Privacy Information Sharing by University Students https://arxiv.org/abs/2505.18870

Brady D. Lund, Tae Hee Lee, Ziang Wang, Ting Wang, Nishith Reddy Mannuru Zero Trust Cybersecurity: Procedures and Considerations in Context https://arxiv.org/abs/2505.18872

Miles Q. Li, Benjamin C. M. Fung Security Concerns for Large Language Models: A Survey https://arxiv.org/abs/2505.18889

Muhammad Wahid Akram, Keshav Sood, Muneeb Ul Hassan, Basant Subba Exemplifying Emerging Phishing: QR-based Browser-in-The-Browser (BiTB) Attack https://arxiv.org/abs/2505.18944

Hyunwoo Kim, Jaeseong Lee, Sunpyo Hong, Changmin Han Secure IVSHMEM: End-to-End Shared-Memory Protocol with Hypervisor-CA Handshake and In-Kernel Access Control https://arxiv.org/abs/2505.19004

Emily Priyadarshini, Massimo Bartoletti A quantitative notion of economic security for smart contract compositions https://arxiv.org/abs/2505.19006

Sel\c{c}uk Topal A Systematic Classification of Vulnerabilities in MoveEVM Smart Contracts (MWC) https://arxiv.org/abs/2505.19047

Wei Zhang, Ju Xing, Xiaoqi Li Penetration Testing for System Security: Methods and Practical Approaches https://arxiv.org/abs/2505.19174

Shiyu Xiang, Tong Zhang, Ronghao Chen ALRPHFS: Adversarially Learned Risk Patterns with Hierarchical Fast \& Slow Reasoning for Robust Agent Defense https://arxiv.org/abs/2505.19260

Zeinab Lashkaripour, Masoud Khosravi-Farmad, AhmadReza Montazerolghaem, Razieh Rezaee BSAGIoT: A Bayesian Security Aspect Graph for Internet of Things (IoT) https://arxiv.org/abs/2505.19283

Ken Huang, Vineeth Sai Narajala, John Yeoh, Ramesh Raskar, Youssef Harkati, Jerry Huang, Idan Habler, Chris Hughes A Novel Zero-Trust Identity Framework for Agentic AI: Decentralized Authentication and Fine-Grained Access Control https://arxiv.org/abs/2505.19301

Amit Chakraborty, Sayyed Farid Ahamed, Sandip Roy, Soumya Banerjee, Kevin Choi, Abdul Rahman, Alison Hu, Edward Bowen, Sachin Shetty RADEP: A Resilient Adaptive Defense Framework Against Model Extraction Attacks https://arxiv.org/abs/2505.19364

Ethan TS. Liu, Austin Wang, Spencer Mateega, Carlos Georgescu, Danny Tang VADER: A Human-Evaluated Benchmark for Vulnerability Assessment, Detection, Explanation, and Remediation https://arxiv.org/abs/2505.19395

Chong Guan An Empirical Study of JavaScript Inclusion Security Issues in Chrome Extensions https://arxiv.org/abs/2505.19456

Di Zhao, Bo Jiang, Song Liu, Susu Cui, Meng Shen, Dongqi Han, Xingmao Guan, Zhigang Lu Language of Network: A Generative Pre-trained Model for Encrypted Traffic Comprehension https://arxiv.org/abs/2505.19482

Martijn Hanegraaf, Savio Sciancalepore, Gabriele Oligeri Weak-Jamming Detection in IEEE 802.11 Networks: Techniques, Scenarios and Mobility https://arxiv.org/abs/2505.19633

Zhou Feng, Jiahao Chen, Chunyi Zhou, Yuwen Pu, Qingming Li, Shouling Ji Poison in the Well: Feature Embedding Disruption in Backdoor Attacks https://arxiv.org/abs/2505.19821

Binyan Xu, Xilin Dai, Di Tang, Kehuan Zhang One Surrogate to Fool Them All: Universal, Transferable, and Targeted Adversarial Attacks with CLIP https://arxiv.org/abs/2505.19840

Chunyang Li, Junwei Zhang, Anda Cheng, Zhuo Ma, Xinghua Li, Jianfeng Ma CPA-RAG:Covert Poisoning Attacks on Retrieval-Augmented Generation in Large Language Models https://arxiv.org/abs/2505.19864

Artem Petrov, Dmitrii Volkov Evaluating AI cyber capabilities with crowdsourced elicitation https://arxiv.org/abs/2505.19915

Bilel Cherif, Tamas Bisztray, Richard A. Dubniczky, Aaesha Aldahmani, Saeed Alshehhi, Norbert Tihanyi DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in Digital Forensics and Incident Response https://arxiv.org/abs/2505.19973

Jafar Akhoundali, Hamidreza Hamidi, Kristian Rietveld, Olga Gadyatskaya Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHub https://arxiv.org/abs/2505.20186

Haoyu Wang, Zeyu Qin, Yifei Zhao, Chao Du, Min Lin, Xueqian Wang, Tianyu Pang Lifelong Safety Alignment for Language Models https://arxiv.org/abs/2505.20259