Profile avatar
arxiv-cs-cr.bsky.social
Computer Science -- Cryptography and Security (cs.CR) source: export.arxiv.org/rss/cs.CR maintainer: @tmaehara.bsky.social
7,863 posts 186 followers 0 following
Prolific Poster

Mathew J. Walter, Aaron Barrett, Kimberly Tam Preventing Adversarial AI Attacks Against Autonomous Situational Awareness: A Maritime Case Study https://arxiv.org/abs/2505.21609

Zhengyuan Jiang, Moyang Guo, Kecen Li, Yuepeng Hu, Yupu Wang, Zhicong Huang, Cheng Hong, Neil Zhenqiang Gong VideoMarkBench: Benchmarking Robustness of Video Watermarking https://arxiv.org/abs/2505.21620

Alexander Nemecek, Yuzhou Jiang, Erman Ayday The Feasibility of Topic-Based Watermarking on Academic Peer Reviews https://arxiv.org/abs/2505.21636

Joshua Drexel, Esther H\"anggi, Iy\'an M\'endez Veiga Reproducible Builds and Insights from an Independent Verifier for Arch Linux https://arxiv.org/abs/2505.21642

Julia Boone, Tolunay Seyfi, Fatemeh Afghah A Joint Reconstruction-Triplet Loss Autoencoder Approach Towards Unseen Attack Detection in IoV Networks https://arxiv.org/abs/2505.21703

Alessio Di Santo Lazarus Group Targets Crypto-Wallets and Financial Data while employing new Tradecrafts https://arxiv.org/abs/2505.21725

Nasir Hussain, Haohan Chen, Chanh Tran, Philip Huang, Zhuohao Li, Pravir Chugh, William Chen, Ashish Kundu, Yuan Tian VulBinLLM: LLM-powered Vulnerability Detection for Stripped Binaries https://arxiv.org/abs/2505.22010

Keno Hassler, Philipp G\"orz, Stephan Lipp, Thorsten Holz, Marcel B\"ohme A Comparative Study of Fuzzers and Static Analysis Tools for Finding Memory Unsafety in C and C++ https://arxiv.org/abs/2505.22052

Hongyu Jin, Panos Papadimitratos Accountable, Scalable and DoS-resilient Secure Vehicular Communication https://arxiv.org/abs/2505.22162

Denis Petrov, Pascal Ruffing, Sebastian Zillien, Steffen Wendzel Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences https://arxiv.org/abs/2505.22220

Yongcan Yu, Yanbo Wang, Ran He, Jian Liang Test-Time Immunization: A Universal Defense Framework Against Jailbreaks for (Multimodal) Large Language Models https://arxiv.org/abs/2505.22271

Victor J\"uttner, Erik Buchmann Does Johnny Get the Message? Evaluating Cybersecurity Notifications for Everyday Users https://arxiv.org/abs/2505.22435

Sizai Hou, Songze Li, Baturalp Buyukates Privacy-preserving Prompt Personalization in Federated Learning for Multimodal Large Language Models https://arxiv.org/abs/2505.22447

Joel Daniel Andersson, Lukas Retschmeier, Boel Nelson, Rasmus Pagh Private Lossless Multiple Release https://arxiv.org/abs/2505.22449

Banafsheh Saber Latibari, Najmeh Nazari, Avesta Sasan, Houman Homayoun, Pratik Satam, Soheil Salehi, Hossein Sayadi Transformers for Secure Hardware Systems: Applications, Challenges, and Outlook https://arxiv.org/abs/2505.22605

Denis Donadel, Gabriele Crestanello, Giulio Morandini, Daniele Antonioli, Mauro Conti, Massimo Merro SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes https://arxiv.org/abs/2505.22638

Mohamed Aly Bouke On the Intractability of Chaotic Symbolic Walks: Toward a Non-Algebraic Post-Quantum Hardness Assumption https://arxiv.org/abs/2505.22644

Jiaxiong He EarthOL: A Proof-of-Human-Contribution Consensus Protocol -- Addressing Fundamental Challenges in Decentralized Value Assessment with Enhanced Verification and Security Mechanisms https://arxiv.org/abs/2505.20614

Xinjie Lin, Gang Xiong, Gaopeng Gou, Wenqi Dong, Jing Yu, Zhen Li, Wei Xia Respond to Change with Constancy: Instruction-tuning with LLM for Non-I.I.D. Network Traffic Classification https://arxiv.org/abs/2505.20866

Romain de Laage Towards a DSL for hybrid secure computation https://arxiv.org/abs/2505.20912

Xihuan Lin, Jie Zhang, Gelei Deng, Tianzhe Liu, Xiaolong Liu, Changcai Yang, Tianwei Zhang, Qing Guo, Riqing Chen IRCopilot: Automated Incident Response with Large Language Models https://arxiv.org/abs/2505.20945

Puwei Lian, Yujun Cai, Songze Li Unveiling Impact of Frequency Components on Membership Inference Attacks for Diffusion Models https://arxiv.org/abs/2505.20955

Matteo Nardelli, Francesco De Sclavis, Michela Iezzi A Hitchhiker's Guide to Privacy-Preserving Cryptocurrencies: A Survey on Anonymity, Confidentiality, and Auditability https://arxiv.org/abs/2505.21008

Makoto Shimamura, Shingo Matsugaya, Keisuke Sakai, Kosuke Takeshige, Masaki Hashimoto Uncovering Black-hat SEO based fake E-commerce scam groups from their redirectors and websites https://arxiv.org/abs/2505.21021

Jianmin Liu, Li Yan, Borui Li, Lei Yu, Chao Shen SHE-LoRA: Selective Homomorphic Encryption for Federated Tuning with Heterogeneous LoRA https://arxiv.org/abs/2505.21051

Jia Li, Jiacheng Shen, Yuxin Su, Michael R. Lyu ColorGo: Directed Concolic Execution https://arxiv.org/abs/2505.21130

Avihay Cohen JavaSith: A Client-Side Framework for Analyzing Potentially Malicious Extensions in Browsers, VS Code, and NPM Packages https://arxiv.org/abs/2505.21263

Yao Huang, Yitong Sun, Shouwei Ruan, Yichi Zhang, Yinpeng Dong, Xingxing Wei Breaking the Ceiling: Exploring the Potential of Jailbreak Attacks through Expanding Strategy Space https://arxiv.org/abs/2505.21277

Pedro Pereira, Jos\'e Gon\c{c}alves, Jo\~ao Vitorino, Eva Maia, Isabel Pra\c{c}a Enhancing JavaScript Malware Detection through Weighted Behavioral DFAs https://arxiv.org/abs/2505.21406

Pouria Fallahpour, Alex B. Grilo, Garazi Muguruza, Mahshid Riahinia Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond https://arxiv.org/abs/2505.21442

Yali Yuan, Yu Huang, Xingjian Zeng, Hantao Mei, Guang Cheng M3S-UPD: Efficient Multi-Stage Self-Supervised Learning for Fine-Grained Encrypted Traffic Classification with Unknown Pattern Discovery https://arxiv.org/abs/2505.21462

Haowei Wang, Junjie Wang, Xiaojun Jia, Rupeng Zhang, Mingyang Li, Zhe Liu, Yang Liu, Qing Wang AdInject: Real-World Black-Box Attacks on Web Agents via Advertising Delivery https://arxiv.org/abs/2505.21499

Austin Howard InjectLab: A Tactical Framework for Adversarial Threat Modeling Against Large Language Models https://arxiv.org/abs/2505.18156

G. L. Farchan A Blockchain-Based Approach for Secure and Transparent e-Faktur Issuance in Indonesia's VAT Reporting System https://arxiv.org/abs/2505.18157

Sunil Kumar Jang Bahadur, Gopala Dhar, Lavi Nigam GenAI Security: Outsmarting the Bots with a Proactive Testing Framework https://arxiv.org/abs/2505.18172

Taimoor Ahmad Quantum-Resilient Blockchain for Secure Transactions in UAV-Assisted Smart Agriculture Networks https://arxiv.org/abs/2505.18206

Youssouf Sidib\'e, Julia Gersey Privacy-Preserving Bathroom Monitoring for Elderly Emergencies Using PIR and LiDAR Sensors https://arxiv.org/abs/2505.18242

Nicolas K\"uchler, Ivan Petrov, Conrad Grobler, Ilia Shumailov Architectural Backdoors for Within-Batch Data Stealing and Model Inference Manipulation https://arxiv.org/abs/2505.18323

Rahul Thomas, Louai Zahran, Erica Choi, Akilesh Potti, Micah Goldblum, Arka Pal An Attack to Break Permutation-Based Private Third-Party Inference Schemes for LLMs https://arxiv.org/abs/2505.18332

Yuqi Jia, Zedian Shao, Yupei Liu, Jinyuan Jia, Dawn Song, Neil Zhenqiang Gong A Critical Evaluation of Defenses against Prompt Injection Attacks https://arxiv.org/abs/2505.18333

Boyi Wei, Benedikt Stroebl, Jiacen Xu, Joie Zhang, Zhou Li, Peter Henderson Dynamic Risk Assessments for Offensive Cybersecurity Agents https://arxiv.org/abs/2505.18384

Shuaishuai Liu, Gergely Bicz\'ok Modeling interdependent privacy threats https://arxiv.org/abs/2505.18386

Liao Peiyuan Towards Anonymous Neural Network Inference https://arxiv.org/abs/2505.18398

Sandeep Pirbhulal, Habtamu Abie, Martin Jullum, Didrik Nielsen, Anders L{\o}land AI/ML for 5G and Beyond Cybersecurity https://arxiv.org/abs/2505.18402

Guoheng Sun, Ziyao Wang, Xuandong Zhao, Bowei Tian, Zheyu Shen, Yexiao He, Jinming Xing, Ang Li Invisible Tokens, Visible Bills: The Urgent Need to Audit Hidden Operations in Opaque LLM Services https://arxiv.org/abs/2505.18471

Litao Ye, Bin Chen, Chen Sun, Shuo Wang, Peichang Zhang, Shengli Zhang A Study of Semi-Fungible Token based Wi-Fi Access Control https://arxiv.org/abs/2505.18518

Ritwik Murali, C Shunmuga Velayutham Adapting Novelty towards Generating Antigens for Antivirus systems https://arxiv.org/abs/2505.18520

Baolei Zhang, Haoran Xin, Jiatong Li, Dongzhe Zhang, Minghong Fang, Zhuqing Liu, Lihai Nie, Zheli Liu Benchmarking Poisoning Attacks against Retrieval-Augmented Generation https://arxiv.org/abs/2505.18543

Md Ahsanul Haque, Ismail Hossain, Md Mahmuduzzaman Kamol, Md Jahangir Alam, Suresh Kumar Amalapuram, Sajedul Talukder, Mohammad Saidur Rahman LAMDA: A Longitudinal Android Malware Benchmark for Concept Drift Analysis https://arxiv.org/abs/2505.18551

Faithful Chiagoziem Onwuegbuche, Adelodun Olaoluwa, Anca Delia Jurcut, Liliana Pasquale MLRan: A Behavioural Dataset for Ransomware Analysis and Detection https://arxiv.org/abs/2505.18613