We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 174

[ total of 133 entries: 1-133 ]
[ showing up to 250 entries per page: fewer | more ]

Thu, 11 Dec 2025

[1]  arXiv:2512.09883 [pdf, ps, other]
Title: ByteShield: Adversarially Robust End-to-End Malware Detection through Byte Masking
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2512.09872 [pdf, ps, other]
Title: FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning
Comments: Accepted in IEEE HOST 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[3]  arXiv:2512.09769 [pdf, ps, other]
Title: Defining Cost Function of Steganography with Large Language Models
Authors: Hanzhou Wu, Yige Wang
Comments: this https URL&user=IdiF7M0AAAAJ
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2512.09549 [pdf, ps, other]
Title: Chasing Shadows: Pitfalls in LLM Security Research
Comments: About to appear at NDSS'26
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2512.09539 [pdf, ps, other]
Title: Comparative Analysis of Hash-based Malware Clustering via K-Means
Comments: To be published in the proceedings of the 8th International Conference on Reliable Information and Communication Technology (IRICT 2025). Springer Book Series: "Lecture Notes on Data Engineering and Communications Technologies"
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[6]  arXiv:2512.09485 [pdf, ps, other]
Title: Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks
Comments: Accepted by IEEE JSAC. This work has been submitted to the IEEE for possible publication
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[7]  arXiv:2512.09442 [pdf, ps, other]
Title: Reference Recommendation based Membership Inference Attack against Hybrid-based Recommender Systems
Comments: This paper has been accepted by AAAI 2026
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2512.09409 [pdf, ps, other]
Title: Proof of Trusted Execution: A Consensus Paradigm for Deterministic Blockchain Finality
Comments: Submitted to Middleware 2026 Conference
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2512.09385 [pdf, ps, other]
Title: BugSweeper: Function-Level Detection of Smart Contract Vulnerabilities Using Graph Neural Networks
Comments: This paper is accepted to AAAI 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[10]  arXiv:2512.09321 [pdf, ps, other]
Title: ObliInjection: Order-Oblivious Prompt Injection Attack to LLM Agents with Multi-source Data
Comments: To appear in NDSS 2026
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2512.09264 [pdf, ps, other]
Title: FBA$^2$D: Frequency-based Black-box Attack for AI-generated Image Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[12]  arXiv:2512.09233 [pdf, ps, other]
Title: Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System
Comments: A shorter version of this paper will appear in the Proceedings of the Network and Distributed System Security Symposium (NDSS) 2026 published by the Internet Society
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2512.09150 [pdf, ps, other]
Title: Exposing Vulnerabilities in Counterfeit Prevention Systems Utilizing Physically Unclonable Surface Features
Comments: 15 pages; This work builds on arXiv:2408.02221 [cs.CR]
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[14]  arXiv:2512.09049 [pdf, ps, other]
Title: EMMap: A Systematic Framework for Spatial EMFI Mapping and Fault Classification on Microcontrollers
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2512.09882 (cross-list from cs.AI) [pdf, ps, other]
Title: Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[16]  arXiv:2512.09862 (cross-list from quant-ph) [pdf, ps, other]
Title: True Random Number Generators on IQM Spark
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[17]  arXiv:2512.09742 (cross-list from cs.CL) [pdf, ps, other]
Title: Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs
Comments: 70 pages, 47 figures
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2512.09699 (cross-list from quant-ph) [pdf, ps, other]
Title: Device Independent Quantum Secret Sharing Using Multiparty Pseudo-telepathy Game
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[19]  arXiv:2512.09311 (cross-list from cs.CV) [pdf, ps, other]
Title: Transformer-Driven Multimodal Fusion for Explainable Suspiciousness Estimation in Visual Surveillance
Comments: 12 pages, 10 figures, IEEE Transaction on Image Processing
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[20]  arXiv:2512.09309 (cross-list from cs.DC) [pdf, ps, other]
Title: A Distributed Framework for Privacy-Enhanced Vision Transformers on the Edge
Comments: 16 pages, 7 figures. Published in the Proceedings of the Tenth ACM/IEEE Symposium on Edge Computing (SEC '25), Dec 3-6, 2025, Washington, D.C., USA
Journal-ref: Proceedings of the Tenth ACM/IEEE Symposium on Edge Computing (SEC '25), 2025, Article 8, pp. 1-16
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[21]  arXiv:2512.09300 (cross-list from cs.OS) [pdf, ps, other]
Title: ZeroOS: A Universal Modular Library OS for zkVMs
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[22]  arXiv:2512.09006 (cross-list from cs.SE) [pdf, ps, other]
Title: Llama-based source code vulnerability detection: Prompt engineering vs Fine tuning
Comments: 20 pages, Accepted at ESORICS 2025
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 10 Dec 2025

[23]  arXiv:2512.08918 [pdf, ps, other]
Title: Improved Pseudorandom Codes from Permuted Puzzles
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2512.08882 [pdf, ps, other]
Title: Decentralized Trust for Space AI: Blockchain-Based Federated Learning Across Multi-Vendor LEO Satellite Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2512.08862 [pdf, ps, other]
Title: Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[26]  arXiv:2512.08809 [pdf, ps, other]
Title: PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration
Comments: Accepted at IEEE INFOCOM 2026 (full version)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[27]  arXiv:2512.08802 [pdf, ps, other]
Title: Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework
Comments: published in CAMLIS 2025, this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[28]  arXiv:2512.08782 [pdf, ps, other]
Title: An Explainable AI Model for the Detecting Malicious Smart Contracts Based on EVM Opcode Based Features
Authors: Roopak Surendran
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2512.08575 [pdf, ps, other]
Title: Integrating Public Input and Technical Expertise for Effective Cybersecurity Policy Formulation
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[30]  arXiv:2512.08558 [pdf, ps, other]
Title: Labeled Delegated PSI and its Applications in the Public Sector
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2512.08493 [pdf, ps, other]
Title: LLM-based Vulnerable Code Augmentation: Generate or Refactor?
Comments: 6 pages, Submitted to ESAAN 2026, Under pier review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[32]  arXiv:2512.08417 [pdf, ps, other]
Title: Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs
Comments: Accepted by Network and Distributed System Security (NDSS) Symposium 2026
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2512.08372 [pdf, ps, other]
Title: USCSA: Evolution-Aware Security Analysis for Proxy-Based Upgradeable Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2512.08326 [pdf, ps, other]
Title: Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships
Comments: 11 pages, 7 figures, 8 tables;Accepted to ICSE 2026 Research Track
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[35]  arXiv:2512.08320 [pdf, ps, other]
Title: Developing a Strong CPS Defender: An Evolutionary Approach
Comments: 15 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2512.08310 [pdf, ps, other]
Title: Privacy-Preserving Identifier Checking in 5G
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2512.08299 [pdf, ps, other]
Title: Secure Audio Embedding in Images using Nature-Inspired Optimization
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2512.08291 [pdf, ps, other]
Title: Exposing and Defending Membership Leakage in Vulnerability Prediction Models
Comments: Accepted at APSEC 2025
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[39]  arXiv:2512.08290 [pdf, ps, other]
Title: Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem
Comments: All authors contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[40]  arXiv:2512.08289 [pdf, ps, other]
Title: MIRAGE: Misleading Retrieval-Augmented Generation via Black-box and Query-agnostic Poisoning Attacks
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2512.08204 [pdf, ps, other]
Title: Evaluating Vulnerabilities of Connected Vehicles Under Cyber Attacks by Attack-Defense Tree
Comments: 6 Pages, International Conference on Computing, Networking and Communication (ICNC), Maui, Hawaii, USA, 2026
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[42]  arXiv:2512.08185 [pdf, ps, other]
Title: A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties
Comments: 6 pages, 1 figure, framework proposal
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[43]  arXiv:2512.08172 [pdf, ps, other]
Title: Security Analysis of Integer Learning with Errors with Rejection Sampling
Comments: 24 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[44]  arXiv:2512.08169 [pdf, ps, other]
Title: Information-Dense Reasoning for Efficient and Auditable Security Alert Triage
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[45]  arXiv:2512.08107 [pdf, ps, other]
Title: Detecting Ambiguity Aversion in Cyberattack Behavior to Inform Cognitive Defense Strategies
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[46]  arXiv:2512.08104 [pdf, ps, other]
Title: AgentCrypt: Advancing Privacy and (Secure) Computation in AI Agent Collaboration
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2512.07909 [pdf, ps, other]
Title: Agentic Artificial Intelligence for Ethical Cybersecurity in Uganda: A Reinforcement Learning Framework for Threat Detection in Resource-Constrained Environments
Comments: 29 pages, 7 figures, 2 tables, 1 appendix
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[48]  arXiv:2512.08869 (cross-list from cs.LG) [pdf, ps, other]
Title: Differentially Private Synthetic Data Generation Using Context-Aware GANs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[49]  arXiv:2512.08858 (cross-list from cs.OS) [pdf, ps, other]
Title: NecoFuzz: Effective Fuzzing of Nested Virtualization via Fuzz-Harness Virtual Machines
Comments: To appear in EuroSys 2026
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[50]  arXiv:2512.08856 (cross-list from cs.CY) [pdf, ps, other]
Title: Can the GPC standard eliminate consent banners in the EU?
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[51]  arXiv:2512.08623 (cross-list from quant-ph) [pdf, ps, other]
Title: An Efficient Secret Communication Scheme for the Bosonic Wiretap Channel
Comments: 5 pages, 2 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[52]  arXiv:2512.08067 (cross-list from cs.DC) [pdf, ps, other]
Title: CapsuleFS A Multi-credential DataCapsule Filesystem
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[53]  arXiv:2512.07866 (cross-list from cs.LG) [pdf, ps, other]
Title: Command & Control (C2) Traffic Detection Via Algorithm Generated Domain (Dga) Classification Using Deep Learning And Natural Language Processing
Comments: Language: Portuguese
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Tue, 9 Dec 2025

[54]  arXiv:2512.07827 [pdf, ps, other]
Title: An Adaptive Multi-Layered Honeynet Architecture for Threat Behavior Analysis via Deep Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[55]  arXiv:2512.07725 [pdf, ps, other]
Title: Privacy Practices of Browser Agents
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2512.07533 [pdf, ps, other]
Title: VulnLLM-R: Specialized Reasoning LLM with Agent Scaffold for Vulnerability Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[57]  arXiv:2512.07495 [pdf, ps, other]
Title: Amulet: Fast TEE-Shielded Inference for On-Device Model Protection
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2512.07342 [pdf, ps, other]
Title: PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning
Comments: Accepted at NDSS 2026; code available at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[59]  arXiv:2512.07292 [pdf, ps, other]
Title: Breaking ECDSA with Electromagnetic Side-Channel Attacks: Challenges and Practicality on Modern Smartphones
Comments: This work has been submitted to Euro S&P 2026 for possible publication
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2512.07086 [pdf, ps, other]
Title: ThinkTrap: Denial-of-Service Attacks against Black-box LLM Services via Infinite Thinking
Comments: This version includes the final camera-ready manuscript accepted by NDSS 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[61]  arXiv:2512.07038 [pdf, ps, other]
Title: Ideal Attribution and Faithful Watermarks for Language Models
Comments: 30 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[62]  arXiv:2512.07033 [pdf, ps, other]
Title: Managed TLS Under Migration: Authentication Authority Across CDN and Hosting Transitions
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[63]  arXiv:2512.07030 [pdf, ps, other]
Title: A Comprehensive Study of Supervised Machine Learning Models for Zero-Day Attack Detection: Analyzing Performance on Imbalanced Data
Comments: 13 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[64]  arXiv:2512.06914 [pdf, ps, other]
Title: SoK: Trust-Authorization Mismatch in LLM Agent Interactions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[65]  arXiv:2512.06899 [pdf, ps, other]
Title: Patronus: Identifying and Mitigating Transferable Backdoors in Pre-trained Language Models
Comments: Work in progress
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2512.06846 [pdf, ps, other]
Title: CKG-LLM: LLM-Assisted Detection of Smart Contract Access Control Vulnerabilities Based on Knowledge Graphs
Comments: 6 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2512.06781 [pdf, ps, other]
Title: From Description to Score: Can LLMs Quantify Vulnerabilities?
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Programming Languages (cs.PL)
[68]  arXiv:2512.06747 [pdf, ps, other]
Title: PrivLLMSwarm: Privacy-Preserving LLM-Driven UAV Swarms for Secure IoT Surveillance
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[69]  arXiv:2512.06713 [pdf, ps, other]
Title: Look Twice before You Leap: A Rational Agent Framework for Localized Adversarial Anonymization
Comments: 16 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[70]  arXiv:2512.06660 [pdf, ps, other]
Title: Towards Small Language Models for Security Query Generation in SOC Workflows
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[71]  arXiv:2512.06659 [pdf, ps, other]
Title: The Evolution of Agentic AI in Cybersecurity: From Single LLM Reasoners to Multi-Agent Systems and Autonomous Pipelines
Authors: Vaishali Vinay
Comments: Accepted at ICAIC 2026
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2512.06589 [pdf, ps, other]
Title: OmniSafeBench-MM: A Unified Benchmark and Toolbox for Multimodal Jailbreak Attack-Defense Evaluation
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[73]  arXiv:2512.06557 [pdf, ps, other]
Title: Characterizing Large-Scale Adversarial Activities Through Large-Scale Honey-Nets
Comments: Accepted at Conference IEEE UEMCON 2025
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[74]  arXiv:2512.06556 [pdf, ps, other]
Title: Securing the Model Context Protocol: Defending LLMs Against Tool Poisoning and Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[75]  arXiv:2512.06555 [pdf, ps, other]
Title: BEACON: A Unified Behavioral-Tactical Framework for Explainable Cybercrime Analysis with Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[76]  arXiv:2512.06500 [pdf, ps, other]
Title: PDRIMA: A Policy-Driven Runtime Integrity Measurement and Attestation Approach for ARM TrustZone-based TEE
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2512.06467 [pdf, ps, other]
Title: Formalisation of Security for Federated Learning with DP and Attacker Advantage in IIIf for Satellite Swarms -- Extended Version
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[78]  arXiv:2512.06411 [pdf, ps, other]
Title: KyFrog: A High-Security LWE-Based KEM Inspired by ML-KEM
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[79]  arXiv:2512.06396 [pdf, ps, other]
Title: AgenticCyber: A GenAI-Powered Multi-Agent System for Multimodal Threat Detection and Adaptive Response in Cybersecurity
Authors: Shovan Roy
Comments: 6 pages for IEEE conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[80]  arXiv:2512.06390 [pdf, ps, other]
Title: Web Technologies Security in the AI Era: A Survey of CDN-Enhanced Defenses
Comments: Accepted at 2025 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). 7 pages, 5 figures
Journal-ref: 2025 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), Bali, Indonesia, 2025, pp. 180-186
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[81]  arXiv:2512.06387 [pdf, ps, other]
Title: Beyond Model Jailbreak: Systematic Dissection of the "Ten DeadlySins" in Embodied Intelligence
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[82]  arXiv:2512.06364 [pdf, ps, other]
Title: JEEVHITAA -- An End-to-End HCAI System to Support Collective Care
Comments: 14 pages, 4 figures, 6 tables, 2 algorithms, Preprint of work Submitted to MobiSys 2026 - Emergent Ideas Track
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Human-Computer Interaction (cs.HC)
[83]  arXiv:2512.06253 [pdf, ps, other]
Title: Privacy Loss of Noise Perturbation via Concentration Analysis of A Product Measure
Comments: Accepted by ACM International Conference on Management of Data (SIGMOD '26)
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2512.06172 [pdf, ps, other]
Title: DEFEND: Poisoned Model Detection and Malicious Client Exclusion Mechanism for Secure Federated Learning-based Road Condition Classification
Comments: Accepted to the 41st ACM/SIGAPP Symposium on Applied Computing (SAC 2026)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[85]  arXiv:2512.06155 [pdf, ps, other]
Title: Sift or Get Off the PoC: Applying Information Retrieval to Vulnerability Research with SiftRank
Authors: Caleb Gross
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[86]  arXiv:2512.06048 [pdf, ps, other]
Title: The Road of Adaptive AI for Precision in Cybersecurity
Authors: Sahil Garg
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG); Software Engineering (cs.SE)
[87]  arXiv:2512.06033 [pdf, ps, other]
Title: Sell Data to AI Algorithms Without Revealing It: Secure Data Valuation and Sharing via Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[88]  arXiv:2512.07814 (cross-list from cs.SE) [pdf, ps, other]
Title: Understanding Privacy Risks in Code Models Through Training Dynamics: A Causal Approach
Comments: 21 pages, 8 figures
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[89]  arXiv:2512.07574 (cross-list from eess.IV) [pdf, ps, other]
Title: Precise Liver Tumor Segmentation in CT Using a Hybrid Deep Learning-Radiomics Framework
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[90]  arXiv:2512.07520 (cross-list from cs.AR) [pdf, ps, other]
Title: aLEAKator: HDL Mixed-Domain Simulation for Masked Hardware \& Software Formal Verification
Authors: Noé Amiot (ALSOC), Quentin L. Meunier (ALSOC), Karine Heydemann (ALSOC), Emmanuelle Encrenaz (ALSOC)
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[91]  arXiv:2512.07368 (cross-list from cs.SE) [pdf, ps, other]
Title: Challenges in Developing Secure Software -- Results of an Interview Study in the German Software Industry
Comments: This paper includes 6 pages, 1 table, 1 figure. It is an English translation of our paper published in the German journal "Softwaretechnik Trends": ISSN 0720-8928, vol. 45, no. 4, pp. 2-7, year 2025
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[92]  arXiv:2512.07247 (cross-list from cs.CV) [pdf, ps, other]
Title: AdLift: Lifting Adversarial Perturbations to Safeguard 3D Gaussian Splatting Assets Against Instruction-Driven Editing
Comments: 40 pages, 34 figures, 18 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[93]  arXiv:2512.07228 (cross-list from cs.CV) [pdf, ps, other]
Title: Towards Robust Protective Perturbation against DeepFake Face Swapping
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[94]  arXiv:2512.06971 (cross-list from cs.LG) [pdf, ps, other]
Title: Prediction with Expert Advice under Local Differential Privacy
Comments: 19 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[95]  arXiv:2512.06925 (cross-list from cs.LG) [pdf, ps, other]
Title: Deep Reinforcement Learning for Phishing Detection with Transformer-Based Semantic Features
Authors: Aseer Al Faisal
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[96]  arXiv:2512.06906 (cross-list from cs.SE) [pdf, ps, other]
Title: MINES: Explainable Anomaly Detection through Web API Invariant Inference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG)
[97]  arXiv:2512.06716 (cross-list from cs.AI) [pdf, ps, other]
Title: Cognitive Control Architecture (CCA): A Lifecycle Supervision Framework for Robustly Aligned AI Agents
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[98]  arXiv:2512.06304 (cross-list from eess.AS) [pdf, ps, other]
Title: Degrading Voice: A Comprehensive Overview of Robust Voice Conversion Through Input Manipulation
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Sound (cs.SD)
[99]  arXiv:2512.06243 (cross-list from cs.LG) [pdf, ps, other]
Title: Quantization Blindspots: How Model Compression Breaks Backdoor Defenses
Authors: Rohan Pandey, Eric Ye
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[100]  arXiv:2512.06123 (cross-list from cs.SE) [pdf, ps, other]
Title: Toward Patch Robustness Certification and Detection for Deep Learning Systems Beyond Consistent Samples
Comments: accepted by IEEE Transactions on Reliability; extended technical report
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 8 Dec 2025

[101]  arXiv:2512.05951 [pdf, ps, other]
Title: Trusted AI Agents in the Cloud
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[102]  arXiv:2512.05745 [pdf, ps, other]
Title: ARGUS: Defending Against Multimodal Indirect Prompt Injection via Steering Instruction-Following Behavior
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[103]  arXiv:2512.05707 [pdf, ps, other]
Title: Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2512.05518 [pdf, ps, other]
Title: Matching Ranks Over Probability Yields Truly Deep Safety Alignment
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[105]  arXiv:2512.05485 [pdf, ps, other]
Title: TeleAI-Safety: A comprehensive LLM jailbreaking benchmark towards attacks, defenses, and evaluations
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2512.05459 [pdf, ps, other]
Title: PrivCode: When Code Generation Meets Differential Privacy
Comments: Accepted at NDSS 2026; code available at this https URL
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2512.05374 [pdf, ps, other]
Title: Please Don't Kill My Vibe: Empowering Agents with Data Flow Control
Comments: 7 pages, 7 figures, CIDR 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB)
[108]  arXiv:2512.05321 [pdf, ps, other]
Title: A Practical Honeypot-Based Threat Intelligence Framework for Cyber Defence in the Cloud
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2512.05288 [pdf, ps, other]
Title: Beyond Detection: A Comprehensive Benchmark and Study on Representation Learning for Fine-Grained Webshell Family Classification
Authors: Feijiang Han
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[110]  arXiv:2512.04429 (cross-list from quant-ph) [pdf, ps, other]
Title: Combined Quantum and Post-Quantum Security Performance Under Finite Keys
Comments: 10 pages, 5 figures, 1 table
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[111]  arXiv:2509.18874 (cross-list from cs.HC) [pdf, ps, other]
Title: When Ads Become Profiles: Uncovering the Invisible Risk of Web Advertising at Scale with LLMs
Subjects: Human-Computer Interaction (cs.HC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)

Fri, 5 Dec 2025

[112]  arXiv:2512.05065 [pdf, ps, other]
Title: Personalizing Agent Privacy Decisions via Logical Entailment
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.04950 [pdf, ps, other]
Title: Opacity problems in multi-energy timed automata
Comments: This is the author version (extended with all proofs) of the manuscript of the same name published in the proceedings of the 41st ACM/SIGAPP Symposium on Applied Computing (SAC 2026)
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2512.04908 [pdf, ps, other]
Title: Logic-Driven Cybersecurity: A Novel Framework for System Log Anomaly Detection using Answer Set Programming
Comments: Submitted to FLOPS 2026
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[115]  arXiv:2512.04855 [pdf, ps, other]
Title: A Novel Trust-Based DDoS Cyberattack Detection Model for Smart Business Environments
Comments: 22 Pages
Journal-ref: International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.5/6, November 2025
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2512.04841 [pdf, ps, other]
Title: SoK: a Comprehensive Causality Analysis Framework for Large Language Model Security
Authors: Wei Zhao, Zhe Li, Jun Sun
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.04675 [pdf, ps, other]
Title: Cryptanalysis of Gleeok-128
Comments: 44 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2512.04668 [pdf, ps, other]
Title: Topology Matters: Measuring Memory Leakage in Multi-Agent LLMs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[119]  arXiv:2512.04611 [pdf, ps, other]
Title: PBFuzz: Agentic Directed Fuzzing for PoV Generation
Comments: 24 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[120]  arXiv:2512.04580 [pdf, ps, other]
Title: CryptoTensors: A Light-Weight Large Language Model File Format for Highly-Secure Model Distribution
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[121]  arXiv:2512.04436 [pdf, ps, other]
Title: ReFuzz: Reusing Tests for Processor Fuzzing with Contextual Bandits
Comments: To be published in the proceedings of the Network and Distributed System Security (NDSS) Symposium, 2026
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2512.04368 [pdf, ps, other]
Title: AutoGuard: A Self-Healing Proactive Security Layer for DevSecOps Pipelines Using Reinforcement Learning
Comments: Accepted and Presented at 1st IEEE Uttar Pradesh Section Women in Engineering International Conference on Electrical Electronics and Computer Engineering (UPWIECON 2025) organized by NIELIT Dehradun held during 30th 31st October 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Performance (cs.PF)
[123]  arXiv:2512.04338 [pdf, ps, other]
Title: One Detector Fits All: Robust and Adaptive Detection of Malicious Packages from PyPI to Enterprises
Comments: Proceedings of the 2025 Annual Computer Security Applications Conference (ACSAC' 25), December 8-12, 2025, Honolulu, Hawaii, USA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[124]  arXiv:2512.04260 [pdf, ps, other]
Title: Breaking Isolation: A New Perspective on Hypervisor Exploitation via Cross-Domain Attacks
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2512.04259 [pdf, ps, other]
Title: WildCode: An Empirical Analysis of Code Generated by ChatGPT
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[126]  arXiv:2512.04254 [pdf, ps, other]
Title: Hey GPT-OSS, Looks Like You Got It -- Now Walk Me Through It! An Assessment of the Reasoning Language Models Chain of Thought Mechanism for Digital Forensics
Comments: Accept at DFRWS EU 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[127]  arXiv:2512.04237 [pdf, ps, other]
Title: Primitive Vector Cipher(PVC): A Hybrid Encryption Scheme based on the Vector Computational Diffie-Hellman (V-CDH) Problem
Comments: Submitted for publication. 19 pages
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2512.04129 [pdf, ps, other]
Title: Tipping the Dominos: Topology-Aware Multi-Hop Attacks on LLM-Based Multi-Agent Systems
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2512.04120 [pdf, ps, other]
Title: Towards Contextual Sensitive Data Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computers and Society (cs.CY); Databases (cs.DB); Information Retrieval (cs.IR)
[130]  arXiv:2512.05069 (cross-list from cs.LG) [pdf, ps, other]
Title: Hybrid Quantum-Classical Autoencoders for Unsupervised Network Intrusion Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[131]  arXiv:2512.04785 (cross-list from cs.AI) [pdf, ps, other]
Title: ASTRIDE: A Security Threat Modeling Platform for Agentic-AI Applications
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[132]  arXiv:2512.04590 (cross-list from cs.LG) [pdf, ps, other]
Title: Exploiting ftrace's function_graph Tracer Features for Machine Learning: A Case Study on Encryption Detection
Comments: Conference paper presented at AICCSA 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[133]  arXiv:2512.04106 (cross-list from cs.SE) [pdf, ps, other]
Title: Retrieval-Augmented Few-Shot Prompting Versus Fine-Tuning for Code Vulnerability Detection
Comments: Accepted in the 3rd International Conference on Foundation and Large Language Models (FLLM2025)
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[ total of 133 entries: 1-133 ]
[ showing up to 250 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)