We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 155

[ total of 153 entries: 1-153 ]
[ showing up to 250 entries per page: fewer | more ]

Mon, 15 Dec 2025

[1]  arXiv:2512.11783 [pdf, ps, other]
Title: Super Suffixes: Bypassing Text Generation Alignment and Guard Models Simultaneously
Comments: 13 pages, 5 Figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[2]  arXiv:2512.11699 [pdf, ps, other]
Title: SoK: Demystifying the multiverse of MPC protocols
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2512.11690 [pdf, ps, other]
Title: Leveraging FPGAs for Homomorphic Matrix-Vector Multiplication in Oblivious Message Retrieval
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[4]  arXiv:2512.11602 [pdf, ps, other]
Title: Granite: Granular Runtime Enforcement for GitHub Actions Permissions
Comments: 13 pages, abstract compacted for arxiv
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2512.11484 [pdf, ps, other]
Title: Capacitive Touchscreens at Risk: Recovering Handwritten Trajectory on Smartphone via Electromagnetic Emanations
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2512.11431 [pdf, ps, other]
Title: Proving DNSSEC Correctness: A Formal Approach to Secure Domain Name Resolution
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Networking and Internet Architecture (cs.NI)
[7]  arXiv:2512.11316 [pdf, ps, other]
Title: Visualisation for the CIS benchmark scanning results
Comments: Preprint. Accepted to the ICICT'26. Final version to be published by in conference proceedings by Springer LNNS
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[8]  arXiv:2512.11272 [pdf, ps, other]
Title: Vision-Based Learning for Cyberattack Detection in Blockchain Smart Contracts and Transactions
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2512.11269 [pdf, ps, other]
Title: A Scalable Multi-GPU Framework for Encrypted Large-Model Inference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[10]  arXiv:2512.11147 [pdf, ps, other]
Title: MiniScope: A Least Privilege Framework for Authorizing Tool Calling Agents
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[11]  arXiv:2512.11143 [pdf, ps, other]
Title: Automated Penetration Testing with LLM Agents and Classical Planning
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2512.11135 [pdf, ps, other]
Title: Network and Compiler Optimizations for Efficient Linear Algebra Kernels in Private Transformer Inference
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2512.11122 [pdf, ps, other]
Title: Cybersecurity policy adoption in South Africa: Does public trust matter?
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[14]  arXiv:2512.11112 [pdf, ps, other]
Title: An LLVM-Based Optimization Pipeline for SPDZ
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Software Engineering (cs.SE)
[15]  arXiv:2512.10998 [pdf, ps, other]
Title: SCOUT: A Defense Against Data Poisoning Attacks in Fine-Tuned Language Models
Comments: 9 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[16]  arXiv:2512.11775 (cross-list from cs.DC) [pdf, ps, other]
Title: Hypergraph based Multi-Party Payment Channel
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[17]  arXiv:2512.11482 (cross-list from cs.SE) [pdf, ps, other]
Title: Towards Privacy-Preserving Code Generation: Differentially Private Code Language Models
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[18]  arXiv:2512.11286 (cross-list from quant-ph) [pdf, ps, other]
Title: A Survey of OAM-Encoded High-Dimensional Quantum Key Distribution: Foundations, Experiments, and Recent Trends
Comments: 20 pages, 5 figures, submitted to ICT Express
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[19]  arXiv:2512.11107 (cross-list from quant-ph) [pdf, ps, other]
Title: Digital Coherent-State QRNG Using System-Jitter Entropy via Random Permutation
Authors: Randy Kuang
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[20]  arXiv:2512.11087 (cross-list from cs.LG) [pdf, ps, other]
Title: Clip-and-Verify: Linear Constraint-Driven Domain Clipping for Accelerating Neural Network Verification
Comments: Accepted to NeurIPS 2025
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[21]  arXiv:2512.11004 (cross-list from quant-ph) [pdf, ps, other]
Title: Enhancing the Practical Reliability of Shor's Quantum Algorithm via Generalized Period Decomposition: Theory and Large-Scale Empirical Validation
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Fri, 12 Dec 2025

[22]  arXiv:2512.10766 [pdf, ps, other]
Title: Metaphor-based Jailbreaking Attacks on Text-to-Image Models
Comments: This paper includes model-generated content that may contain offensive or distressing material
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[23]  arXiv:2512.10732 [pdf, ps, other]
Title: TriHaRd: Higher Resilience for TEE Trusted Time
Comments: 2026 45th IEEE International Conference on Computer Communications (INFOCOM)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[24]  arXiv:2512.10667 [pdf, ps, other]
Title: A Proof of Success and Reward Distribution Protocol for Multi-bridge Architecture in Cross-chain Communication
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Emerging Technologies (cs.ET)
[25]  arXiv:2512.10653 [pdf, ps, other]
Title: Virtual camera detection: Catching video injection attacks in remote biometric systems
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[26]  arXiv:2512.10637 [pdf, ps, other]
Title: Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks
Comments: 6 pages,2 figures, 1 Table
Journal-ref: Neha and T. Bhatia "Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks" (2025) 103-107
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2512.10636 [pdf, ps, other]
Title: Objectives and Design Principles in Offline Payments with Central Bank Digital Currency (CBDC)
Comments: 22 pages main body, 31 pages overall; 7 tables
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2512.10600 [pdf, ps, other]
Title: Authority Backdoor: A Certifiable Backdoor Mechanism for Authoring DNNs
Comments: Accepted to AAAI 2026 (Main Track). Code is available at: this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[29]  arXiv:2512.10487 [pdf, ps, other]
Title: LLM-Assisted AHP for Explainable Cyber Range Evaluation
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2512.10485 [pdf, ps, other]
Title: From Lab to Reality: A Practical Evaluation of Deep Learning Models and LLMs for Vulnerability Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[31]  arXiv:2512.10470 [pdf, ps, other]
Title: Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques
Comments: 5 pages, 3 figures, experimental paper
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2512.10426 [pdf, ps, other]
Title: Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[33]  arXiv:2512.10372 [pdf, ps, other]
Title: D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[34]  arXiv:2512.10361 [pdf, ps, other]
Title: Bit of a Close Talker: A Practical Guide to Serverless Cloud Co-Location Attacks
Comments: In the proceedings of Network and Distributed System Security (NDSS) Symposium 2026
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[35]  arXiv:2512.10296 [pdf, ps, other]
Title: FLARE: A Wireless Side-Channel Fingerprinting Attack on Federated Learning
Comments: This paper has been accepted for publication in IEEE INFOCOM 2026 - IEEE Conference on Computer Communications
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[36]  arXiv:2512.10280 [pdf, ps, other]
Title: Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[37]  arXiv:2512.10185 [pdf, ps, other]
Title: Watermarks for Language Models via Probabilistic Automata
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[38]  arXiv:2512.10135 [pdf, ps, other]
Title: Lightweight Security for Private Networks: Real-World Evaluation of WireGuard
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); High Energy Physics - Experiment (hep-ex)
[39]  arXiv:2512.10104 [pdf, ps, other]
Title: LLM-PEA: Leveraging Large Language Models Against Phishing Email Attacks
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[40]  arXiv:2512.10088 [pdf, ps, other]
Title: Evaluation of Risk and Resilience of the MBTA Green Rapid Transit System
Comments: 28 pages, multiple figures. Course project (CY 5250, Northeastern University)
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2512.10029 [pdf, ps, other]
Title: Malicious GenAI Chrome Extensions: Unpacking Data Exfiltration and Malicious Behaviours
Comments: VIRUS BULLETIN CONFERENCE SEPTEMBER 2025
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2512.10020 [pdf, ps, other]
Title: A Comparative Analysis of zk-SNARKs and zk-STARKs: Theory and Practice
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[43]  arXiv:2512.09959 [pdf, ps, other]
Title: TRUCE: TRUsted Compliance Enforcement Service for Secure Health Data Exchange
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2512.09958 [pdf, ps, other]
Title: When Quantum Federated Learning Meets Blockchain in 6G Networks
Comments: Accepted at IEEE Communications Standards Magazine
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[45]  arXiv:2512.09954 [pdf, ps, other]
Title: Cross-Layer Isochronous Diffusion Protocol (CIDP): A Rigorous Information-Theoretic and Control-Theoretic Framework for Sovereign Tactical Anonymity
Authors: Pravin G
Comments: 11 pages, 4 figures, 4 tables, with full proofs and FPGA prototype evaluation
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2512.09953 [pdf, ps, other]
Title: ZK-APEX: Zero-Knowledge Approximate Personalized Unlearning with Executable Proofs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[47]  arXiv:2512.09938 [pdf, ps, other]
Title: Blockchain-Anchored Audit Trail Model for Transparent Inter-Operator Settlement
Journal-ref: INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING; 2024;https://www.ijisae.org/index.php/IJISAE/article/view/7919/6939
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[48]  arXiv:2512.09934 [pdf, ps, other]
Title: IoTEdu: Access Control, Detection, and Automatic Incident Response in Academic IoT Networks
Comments: 5 pages, 2 figures, and 3 tables, accepted for presentation at ERRC/WRSeg 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI); Software Engineering (cs.SE)
[49]  arXiv:2512.10652 (cross-list from cs.CV) [pdf, ps, other]
Title: TriDF: Evaluating Perception, Detection, and Hallucination for Interpretable DeepFake Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[50]  arXiv:2512.10449 (cross-list from cs.AI) [pdf, ps, other]
Title: When Reject Turns into Accept: Quantifying the Vulnerability of LLM-Based Scientific Reviewers to Indirect Prompt Injection
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[51]  arXiv:2512.10203 (cross-list from econ.TH) [pdf, ps, other]
Title: On Sybil Proofness in Competitive Combinatorial Exchanges
Authors: Abhimanyu Nag
Comments: 26 Pages, Accepted to FC26 as a poster
Subjects: Theoretical Economics (econ.TH); Cryptography and Security (cs.CR)
[52]  arXiv:2512.09957 (cross-list from cs.DC) [pdf, ps, other]
Title: CloudFix: Automated Policy Repair for Cloud Access Control Policies Using Large Language Models
Comments: 10 pages
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[53]  arXiv:2512.09941 (cross-list from cs.IT) [pdf, ps, other]
Title: Fourier Sparsity of Delta Functions and Matching Vector PIRs
Comments: Full version. Accepted to ITCS 2026
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Combinatorics (math.CO)

Thu, 11 Dec 2025

[54]  arXiv:2512.09883 [pdf, ps, other]
Title: ByteShield: Adversarially Robust End-to-End Malware Detection through Byte Masking
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2512.09872 [pdf, ps, other]
Title: FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning
Comments: Accepted in IEEE HOST 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[56]  arXiv:2512.09769 [pdf, ps, other]
Title: Defining Cost Function of Steganography with Large Language Models
Authors: Hanzhou Wu, Yige Wang
Comments: this https URL&user=IdiF7M0AAAAJ
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2512.09549 [pdf, ps, other]
Title: Chasing Shadows: Pitfalls in LLM Security Research
Comments: About to appear at NDSS'26
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2512.09539 [pdf, ps, other]
Title: Comparative Analysis of Hash-based Malware Clustering via K-Means
Comments: To be published in the proceedings of the 8th International Conference on Reliable Information and Communication Technology (IRICT 2025). Springer Book Series: "Lecture Notes on Data Engineering and Communications Technologies"
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[59]  arXiv:2512.09485 [pdf, ps, other]
Title: Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks
Comments: Accepted by IEEE JSAC. This work has been submitted to the IEEE for possible publication
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[60]  arXiv:2512.09442 [pdf, ps, other]
Title: Reference Recommendation based Membership Inference Attack against Hybrid-based Recommender Systems
Comments: This paper has been accepted by AAAI 2026
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2512.09409 [pdf, ps, other]
Title: Proof of Trusted Execution: A Consensus Paradigm for Deterministic Blockchain Finality
Comments: Submitted to Middleware 2026 Conference
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2512.09385 [pdf, ps, other]
Title: BugSweeper: Function-Level Detection of Smart Contract Vulnerabilities Using Graph Neural Networks
Comments: This paper is accepted to AAAI 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[63]  arXiv:2512.09321 [pdf, ps, other]
Title: ObliInjection: Order-Oblivious Prompt Injection Attack to LLM Agents with Multi-source Data
Comments: To appear in NDSS 2026. For slides, see this https URL
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2512.09264 [pdf, ps, other]
Title: FBA$^2$D: Frequency-based Black-box Attack for AI-generated Image Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[65]  arXiv:2512.09233 [pdf, ps, other]
Title: Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System
Comments: A shorter version of this paper will appear in the Proceedings of the Network and Distributed System Security Symposium (NDSS) 2026 published by the Internet Society
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2512.09150 [pdf, ps, other]
Title: Exposing Vulnerabilities in Counterfeit Prevention Systems Utilizing Physically Unclonable Surface Features
Comments: 15 pages; This work builds on arXiv:2408.02221 [cs.CR]
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[67]  arXiv:2512.09049 [pdf, ps, other]
Title: EMMap: A Systematic Framework for Spatial EMFI Mapping and Fault Classification on Microcontrollers
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2512.09882 (cross-list from cs.AI) [pdf, ps, other]
Title: Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[69]  arXiv:2512.09862 (cross-list from quant-ph) [pdf, ps, other]
Title: True Random Number Generators on IQM Spark
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[70]  arXiv:2512.09742 (cross-list from cs.CL) [pdf, ps, other]
Title: Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs
Comments: 70 pages, 47 figures
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[71]  arXiv:2512.09699 (cross-list from quant-ph) [pdf, ps, other]
Title: Device Independent Quantum Secret Sharing Using Multiparty Pseudo-telepathy Game
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[72]  arXiv:2512.09311 (cross-list from cs.CV) [pdf, ps, other]
Title: Transformer-Driven Multimodal Fusion for Explainable Suspiciousness Estimation in Visual Surveillance
Comments: 12 pages, 10 figures, IEEE Transaction on Image Processing
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[73]  arXiv:2512.09309 (cross-list from cs.DC) [pdf, ps, other]
Title: A Distributed Framework for Privacy-Enhanced Vision Transformers on the Edge
Comments: 16 pages, 7 figures. Published in the Proceedings of the Tenth ACM/IEEE Symposium on Edge Computing (SEC '25), Dec 3-6, 2025, Washington, D.C., USA
Journal-ref: Proceedings of the Tenth ACM/IEEE Symposium on Edge Computing (SEC '25), 2025, Article 8, pp. 1-16
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[74]  arXiv:2512.09300 (cross-list from cs.OS) [pdf, ps, other]
Title: ZeroOS: A Universal Modular Library OS for zkVMs
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[75]  arXiv:2512.09006 (cross-list from cs.SE) [pdf, ps, other]
Title: Llama-based source code vulnerability detection: Prompt engineering vs Fine tuning
Comments: 20 pages, Accepted at ESORICS 2025
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 10 Dec 2025

[76]  arXiv:2512.08918 [pdf, ps, other]
Title: Improved Pseudorandom Codes from Permuted Puzzles
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2512.08882 [pdf, ps, other]
Title: Decentralized Trust for Space AI: Blockchain-Based Federated Learning Across Multi-Vendor LEO Satellite Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[78]  arXiv:2512.08862 [pdf, ps, other]
Title: Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[79]  arXiv:2512.08809 [pdf, ps, other]
Title: PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration
Comments: Accepted at IEEE INFOCOM 2026 (full version)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[80]  arXiv:2512.08802 [pdf, ps, other]
Title: Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework
Comments: published in CAMLIS 2025, this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[81]  arXiv:2512.08782 [pdf, ps, other]
Title: An Explainable AI Model for the Detecting Malicious Smart Contracts Based on EVM Opcode Based Features
Authors: Roopak Surendran
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2512.08575 [pdf, ps, other]
Title: Integrating Public Input and Technical Expertise for Effective Cybersecurity Policy Formulation
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[83]  arXiv:2512.08558 [pdf, ps, other]
Title: Labeled Delegated PSI and its Applications in the Public Sector
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2512.08493 [pdf, ps, other]
Title: LLM-based Vulnerable Code Augmentation: Generate or Refactor?
Comments: 6 pages, Submitted to ESAAN 2026, Under pier review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[85]  arXiv:2512.08417 [pdf, ps, other]
Title: Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs
Comments: Accepted by Network and Distributed System Security (NDSS) Symposium 2026
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2512.08372 [pdf, ps, other]
Title: USCSA: Evolution-Aware Security Analysis for Proxy-Based Upgradeable Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2512.08326 [pdf, ps, other]
Title: Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships
Comments: 11 pages, 7 figures, 8 tables;Accepted to ICSE 2026 Research Track
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[88]  arXiv:2512.08320 [pdf, ps, other]
Title: Developing a Strong CPS Defender: An Evolutionary Approach
Comments: 15 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2512.08310 [pdf, ps, other]
Title: Privacy-Preserving Identifier Checking in 5G
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2512.08299 [pdf, ps, other]
Title: Secure Audio Embedding in Images using Nature-Inspired Optimization
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2512.08291 [pdf, ps, other]
Title: Exposing and Defending Membership Leakage in Vulnerability Prediction Models
Comments: Accepted at APSEC 2025
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[92]  arXiv:2512.08290 [pdf, ps, other]
Title: Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem
Comments: All authors contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[93]  arXiv:2512.08289 [pdf, ps, other]
Title: MIRAGE: Misleading Retrieval-Augmented Generation via Black-box and Query-agnostic Poisoning Attacks
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2512.08204 [pdf, ps, other]
Title: Evaluating Vulnerabilities of Connected Vehicles Under Cyber Attacks by Attack-Defense Tree
Comments: 6 Pages, International Conference on Computing, Networking and Communication (ICNC), Maui, Hawaii, USA, 2026
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[95]  arXiv:2512.08185 [pdf, ps, other]
Title: A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties
Comments: 6 pages, 1 figure, framework proposal
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[96]  arXiv:2512.08172 [pdf, ps, other]
Title: Security Analysis of Integer Learning with Errors with Rejection Sampling
Comments: 24 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[97]  arXiv:2512.08169 [pdf, ps, other]
Title: Information-Dense Reasoning for Efficient and Auditable Security Alert Triage
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[98]  arXiv:2512.08107 [pdf, ps, other]
Title: Detecting Ambiguity Aversion in Cyberattack Behavior to Inform Cognitive Defense Strategies
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[99]  arXiv:2512.08104 [pdf, ps, other]
Title: AgentCrypt: Advancing Privacy and (Secure) Computation in AI Agent Collaboration
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2512.07909 [pdf, ps, other]
Title: Agentic Artificial Intelligence for Ethical Cybersecurity in Uganda: A Reinforcement Learning Framework for Threat Detection in Resource-Constrained Environments
Comments: 29 pages, 7 figures, 2 tables, 1 appendix
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[101]  arXiv:2512.08869 (cross-list from cs.LG) [pdf, ps, other]
Title: Differentially Private Synthetic Data Generation Using Context-Aware GANs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[102]  arXiv:2512.08858 (cross-list from cs.OS) [pdf, ps, other]
Title: NecoFuzz: Effective Fuzzing of Nested Virtualization via Fuzz-Harness Virtual Machines
Comments: To appear in EuroSys 2026
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[103]  arXiv:2512.08856 (cross-list from cs.CY) [pdf, ps, other]
Title: Can the GPC standard eliminate consent banners in the EU?
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[104]  arXiv:2512.08623 (cross-list from quant-ph) [pdf, ps, other]
Title: An Efficient Secret Communication Scheme for the Bosonic Wiretap Channel
Comments: 5 pages, 2 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[105]  arXiv:2512.08067 (cross-list from cs.DC) [pdf, ps, other]
Title: CapsuleFS A Multi-credential DataCapsule Filesystem
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[106]  arXiv:2512.07866 (cross-list from cs.LG) [pdf, ps, other]
Title: Command & Control (C2) Traffic Detection Via Algorithm Generated Domain (Dga) Classification Using Deep Learning And Natural Language Processing
Comments: Language: Portuguese
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Tue, 9 Dec 2025

[107]  arXiv:2512.07827 [pdf, ps, other]
Title: An Adaptive Multi-Layered Honeynet Architecture for Threat Behavior Analysis via Deep Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[108]  arXiv:2512.07725 [pdf, ps, other]
Title: Privacy Practices of Browser Agents
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2512.07533 [pdf, ps, other]
Title: VulnLLM-R: Specialized Reasoning LLM with Agent Scaffold for Vulnerability Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[110]  arXiv:2512.07495 [pdf, ps, other]
Title: Amulet: Fast TEE-Shielded Inference for On-Device Model Protection
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2512.07342 [pdf, ps, other]
Title: PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning
Comments: Accepted at NDSS 2026; code available at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2512.07292 [pdf, ps, other]
Title: Breaking ECDSA with Electromagnetic Side-Channel Attacks: Challenges and Practicality on Modern Smartphones
Comments: This work has been submitted to Euro S&P 2026 for possible publication
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.07086 [pdf, ps, other]
Title: ThinkTrap: Denial-of-Service Attacks against Black-box LLM Services via Infinite Thinking
Comments: This version includes the final camera-ready manuscript accepted by NDSS 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[114]  arXiv:2512.07038 [pdf, ps, other]
Title: Ideal Attribution and Faithful Watermarks for Language Models
Comments: 30 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[115]  arXiv:2512.07033 [pdf, ps, other]
Title: Managed TLS Under Migration: Authentication Authority Across CDN and Hosting Transitions
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[116]  arXiv:2512.07030 [pdf, ps, other]
Title: A Comprehensive Study of Supervised Machine Learning Models for Zero-Day Attack Detection: Analyzing Performance on Imbalanced Data
Comments: 13 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[117]  arXiv:2512.06914 [pdf, ps, other]
Title: SoK: Trust-Authorization Mismatch in LLM Agent Interactions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[118]  arXiv:2512.06899 [pdf, ps, other]
Title: Patronus: Identifying and Mitigating Transferable Backdoors in Pre-trained Language Models
Comments: Work in progress
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2512.06846 [pdf, ps, other]
Title: CKG-LLM: LLM-Assisted Detection of Smart Contract Access Control Vulnerabilities Based on Knowledge Graphs
Comments: 6 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2512.06781 [pdf, ps, other]
Title: From Description to Score: Can LLMs Quantify Vulnerabilities?
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Programming Languages (cs.PL)
[121]  arXiv:2512.06747 [pdf, ps, other]
Title: PrivLLMSwarm: Privacy-Preserving LLM-Driven UAV Swarms for Secure IoT Surveillance
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[122]  arXiv:2512.06713 [pdf, ps, other]
Title: Look Twice before You Leap: A Rational Agent Framework for Localized Adversarial Anonymization
Comments: 16 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[123]  arXiv:2512.06660 [pdf, ps, other]
Title: Towards Small Language Models for Security Query Generation in SOC Workflows
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124]  arXiv:2512.06659 [pdf, ps, other]
Title: The Evolution of Agentic AI in Cybersecurity: From Single LLM Reasoners to Multi-Agent Systems and Autonomous Pipelines
Authors: Vaishali Vinay
Comments: Accepted at ICAIC 2026
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2512.06589 [pdf, ps, other]
Title: OmniSafeBench-MM: A Unified Benchmark and Toolbox for Multimodal Jailbreak Attack-Defense Evaluation
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[126]  arXiv:2512.06557 [pdf, ps, other]
Title: Characterizing Large-Scale Adversarial Activities Through Large-Scale Honey-Nets
Comments: Accepted at Conference IEEE UEMCON 2025
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[127]  arXiv:2512.06556 [pdf, ps, other]
Title: Securing the Model Context Protocol: Defending LLMs Against Tool Poisoning and Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[128]  arXiv:2512.06555 [pdf, ps, other]
Title: BEACON: A Unified Behavioral-Tactical Framework for Explainable Cybercrime Analysis with Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[129]  arXiv:2512.06500 [pdf, ps, other]
Title: PDRIMA: A Policy-Driven Runtime Integrity Measurement and Attestation Approach for ARM TrustZone-based TEE
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2512.06467 [pdf, ps, other]
Title: Formalisation of Security for Federated Learning with DP and Attacker Advantage in IIIf for Satellite Swarms -- Extended Version
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[131]  arXiv:2512.06411 [pdf, ps, other]
Title: KyFrog: A High-Security LWE-Based KEM Inspired by ML-KEM
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[132]  arXiv:2512.06396 [pdf, ps, other]
Title: AgenticCyber: A GenAI-Powered Multi-Agent System for Multimodal Threat Detection and Adaptive Response in Cybersecurity
Authors: Shovan Roy
Comments: 6 pages for IEEE conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[133]  arXiv:2512.06390 [pdf, ps, other]
Title: Web Technologies Security in the AI Era: A Survey of CDN-Enhanced Defenses
Comments: Accepted at 2025 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). 7 pages, 5 figures
Journal-ref: 2025 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), Bali, Indonesia, 2025, pp. 180-186
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[134]  arXiv:2512.06387 [pdf, ps, other]
Title: Beyond Model Jailbreak: Systematic Dissection of the "Ten DeadlySins" in Embodied Intelligence
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[135]  arXiv:2512.06364 [pdf, ps, other]
Title: JEEVHITAA -- An End-to-End HCAI System to Support Collective Care
Comments: 14 pages, 4 figures, 6 tables, 2 algorithms, Preprint of ongoing work. Longer Pilot work underway
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[136]  arXiv:2512.06253 [pdf, ps, other]
Title: Privacy Loss of Noise Perturbation via Concentration Analysis of A Product Measure
Comments: Accepted by ACM International Conference on Management of Data (SIGMOD '26)
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2512.06172 [pdf, ps, other]
Title: DEFEND: Poisoned Model Detection and Malicious Client Exclusion Mechanism for Secure Federated Learning-based Road Condition Classification
Comments: Accepted to the 41st ACM/SIGAPP Symposium on Applied Computing (SAC 2026)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[138]  arXiv:2512.06155 [pdf, ps, other]
Title: Sift or Get Off the PoC: Applying Information Retrieval to Vulnerability Research with SiftRank
Authors: Caleb Gross
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[139]  arXiv:2512.06048 [pdf, ps, other]
Title: The Road of Adaptive AI for Precision in Cybersecurity
Authors: Sahil Garg
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG); Software Engineering (cs.SE)
[140]  arXiv:2512.06033 [pdf, ps, other]
Title: Sell Data to AI Algorithms Without Revealing It: Secure Data Valuation and Sharing via Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[141]  arXiv:2512.07814 (cross-list from cs.SE) [pdf, ps, other]
Title: Understanding Privacy Risks in Code Models Through Training Dynamics: A Causal Approach
Comments: 21 pages, 8 figures
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[142]  arXiv:2512.07574 (cross-list from eess.IV) [pdf, ps, other]
Title: Precise Liver Tumor Segmentation in CT Using a Hybrid Deep Learning-Radiomics Framework
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[143]  arXiv:2512.07520 (cross-list from cs.AR) [pdf, ps, other]
Title: aLEAKator: HDL Mixed-Domain Simulation for Masked Hardware \& Software Formal Verification
Authors: Noé Amiot (ALSOC), Quentin L. Meunier (ALSOC), Karine Heydemann (ALSOC), Emmanuelle Encrenaz (ALSOC)
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[144]  arXiv:2512.07368 (cross-list from cs.SE) [pdf, ps, other]
Title: Challenges in Developing Secure Software -- Results of an Interview Study in the German Software Industry
Comments: This paper includes 6 pages, 1 table, 1 figure. It is an English translation of our paper published in the German journal "Softwaretechnik Trends": ISSN 0720-8928, vol. 45, no. 4, pp. 2-7, year 2025
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[145]  arXiv:2512.07247 (cross-list from cs.CV) [pdf, ps, other]
Title: AdLift: Lifting Adversarial Perturbations to Safeguard 3D Gaussian Splatting Assets Against Instruction-Driven Editing
Comments: 40 pages, 34 figures, 18 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[146]  arXiv:2512.07228 (cross-list from cs.CV) [pdf, ps, other]
Title: Towards Robust Protective Perturbation against DeepFake Face Swapping
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[147]  arXiv:2512.06971 (cross-list from cs.LG) [pdf, ps, other]
Title: Prediction with Expert Advice under Local Differential Privacy
Comments: 19 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[148]  arXiv:2512.06925 (cross-list from cs.LG) [pdf, ps, other]
Title: Deep Reinforcement Learning for Phishing Detection with Transformer-Based Semantic Features
Authors: Aseer Al Faisal
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[149]  arXiv:2512.06906 (cross-list from cs.SE) [pdf, ps, other]
Title: MINES: Explainable Anomaly Detection through Web API Invariant Inference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG)
[150]  arXiv:2512.06716 (cross-list from cs.AI) [pdf, ps, other]
Title: Cognitive Control Architecture (CCA): A Lifecycle Supervision Framework for Robustly Aligned AI Agents
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[151]  arXiv:2512.06304 (cross-list from eess.AS) [pdf, ps, other]
Title: Degrading Voice: A Comprehensive Overview of Robust Voice Conversion Through Input Manipulation
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Sound (cs.SD)
[152]  arXiv:2512.06243 (cross-list from cs.LG) [pdf, ps, other]
Title: Quantization Blindspots: How Model Compression Breaks Backdoor Defenses
Authors: Rohan Pandey, Eric Ye
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[153]  arXiv:2512.06123 (cross-list from cs.SE) [pdf, ps, other]
Title: Toward Patch Robustness Certification and Detection for Deep Learning Systems Beyond Consistent Samples
Comments: accepted by IEEE Transactions on Reliability; extended technical report
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 153 entries: 1-153 ]
[ showing up to 250 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)