We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 11

[ total of 150 entries: 1-50 | 12-61 | 62-111 | 112-150 ]
[ showing 50 entries per page: fewer | more | all ]

Fri, 5 Dec 2025

[12]  arXiv:2512.05065 [pdf, ps, other]
Title: Personalizing Agent Privacy Decisions via Logical Entailment
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2512.04950 [pdf, ps, other]
Title: Opacity problems in multi-energy timed automata
Comments: This is the author version (extended with all proofs) of the manuscript of the same name published in the proceedings of the 41st ACM/SIGAPP Symposium on Applied Computing (SAC 2026)
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2512.04908 [pdf, ps, other]
Title: Logic-Driven Cybersecurity: A Novel Framework for System Log Anomaly Detection using Answer Set Programming
Comments: Submitted to FLOPS 2026
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[15]  arXiv:2512.04855 [pdf, ps, other]
Title: A Novel Trust-Based DDoS Cyberattack Detection Model for Smart Business Environments
Comments: 22 Pages
Journal-ref: International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.5/6, November 2025
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2512.04841 [pdf, ps, other]
Title: SoK: a Comprehensive Causality Analysis Framework for Large Language Model Security
Authors: Wei Zhao, Zhe Li, Jun Sun
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[17]  arXiv:2512.04675 [pdf, ps, other]
Title: Cryptanalysis of Gleeok-128
Comments: 44 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2512.04668 [pdf, ps, other]
Title: Topology Matters: Measuring Memory Leakage in Multi-Agent LLMs
Comments: Under review at ACL Rolling Review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[19]  arXiv:2512.04611 [pdf, ps, other]
Title: PBFuzz: Agentic Directed Fuzzing for PoV Generation
Comments: 24 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[20]  arXiv:2512.04580 [pdf, ps, other]
Title: A Light-Weight Large Language Model File Format for Highly-Secure Model Distribution
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[21]  arXiv:2512.04436 [pdf, ps, other]
Title: ReFuzz: Reusing Tests for Processor Fuzzing with Contextual Bandits
Comments: To be published in the proceedings of the Network and Distributed System Security (NDSS) Symposium, 2026
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2512.04368 [pdf, ps, other]
Title: AutoGuard: A Self-Healing Proactive Security Layer for DevSecOps Pipelines Using Reinforcement Learning
Comments: Accepted and Presented at 1st IEEE Uttar Pradesh Section Women in Engineering International Conference on Electrical Electronics and Computer Engineering (UPWIECON 2025) organized by NIELIT Dehradun held during 30th 31st October 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Performance (cs.PF)
[23]  arXiv:2512.04338 [pdf, ps, other]
Title: One Detector Fits All: Robust and Adaptive Detection of Malicious Packages from PyPI to Enterprises
Comments: Proceedings of the 2025 Annual Computer Security Applications Conference (ACSAC' 25), December 8-12, 2025, Honolulu, Hawaii, USA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[24]  arXiv:2512.04260 [pdf, ps, other]
Title: Breaking Isolation: A New Perspective on Hypervisor Exploitation via Cross-Domain Attacks
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2512.04259 [pdf, ps, other]
Title: WildCode: An Empirical Analysis of Code Generated by ChatGPT
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[26]  arXiv:2512.04254 [pdf, ps, other]
Title: Hey GPT-OSS, Looks Like You Got It -- Now Walk Me Through It! An Assessment of the Reasoning Language Models Chain of Thought Mechanism for Digital Forensics
Comments: Accept at DFRWS EU 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[27]  arXiv:2512.04237 [pdf, ps, other]
Title: Primitive Vector Cipher(PVC): A Hybrid Encryption Scheme based on the Vector Computational Diffie-Hellman (V-CDH) Problem
Comments: Submitted for publication. 19 pages
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2512.04129 [pdf, ps, other]
Title: Tipping the Dominos: Topology-Aware Multi-Hop Attacks on LLM-Based Multi-Agent Systems
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2512.04120 [pdf, ps, other]
Title: Towards Contextual Sensitive Data Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computers and Society (cs.CY); Databases (cs.DB); Information Retrieval (cs.IR)
[30]  arXiv:2512.05069 (cross-list from cs.LG) [pdf, ps, other]
Title: Hybrid Quantum-Classical Autoencoders for Unsupervised Network Intrusion Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[31]  arXiv:2512.04785 (cross-list from cs.AI) [pdf, ps, other]
Title: ASTRIDE: A Security Threat Modeling Platform for Agentic-AI Applications
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[32]  arXiv:2512.04590 (cross-list from cs.LG) [pdf, ps, other]
Title: Exploiting \texttt{ftrace}'s \texttt{function\_graph} Tracer Features for Machine Learning: A Case Study on Encryption Detection
Comments: Conference paper presented at AICCSA 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[33]  arXiv:2512.04106 (cross-list from cs.SE) [pdf, ps, other]
Title: Retrieval-Augmented Few-Shot Prompting Versus Fine-Tuning for Code Vulnerability Detection
Comments: Accepted in the 3rd International Conference on Foundation and Large Language Models (FLLM2025)
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)

Thu, 4 Dec 2025 (showing first 28 of 34 entries)

[34]  arXiv:2512.03792 [pdf, ps, other]
Title: Unfolding Challenges in Securing and Regulating Unmanned Air Vehicles
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2512.03791 [pdf, ps, other]
Title: CCN: Decentralized Cross-Chain Channel Networks Supporting Secure and Privacy-Preserving Multi-Hop Interactions
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2512.03775 [pdf, ps, other]
Title: "MCP Does Not Stand for Misuse Cryptography Protocol": Uncovering Cryptographic Misuse in Model Context Protocol at Scale
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2512.03765 [pdf, ps, other]
Title: The Treasury Proof Ledger: A Cryptographic Framework for Accountable Bitcoin Treasuries
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2512.03720 [pdf, ps, other]
Title: Context-Aware Hierarchical Learning: A Two-Step Paradigm towards Safer LLMs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[39]  arXiv:2512.03669 [pdf, ps, other]
Title: Towards Privacy-Preserving Range Queries with Secure Learned Spatial Index over Encrypted Data
Comments: IEEE TrustCom-2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[40]  arXiv:2512.03641 [pdf, ps, other]
Title: A Descriptive Model for Modelling Attacker Decision-Making in Cyber-Deception
Comments: 24 Pages, 4 Tables
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2512.03620 [pdf, ps, other]
Title: SELF: A Robust Singular Value and Eigenvalue Approach for LLM Fingerprinting
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[42]  arXiv:2512.03551 [pdf, ps, other]
Title: A User Centric Group Authentication Scheme for Secure Communication
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2512.03465 [pdf, ps, other]
Title: Tuning for TraceTarnish: Techniques, Trends, and Testing Tangible Traits
Authors: Robert Dilworth
Comments: 20 pages, 8 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Information Retrieval (cs.IR)
[44]  arXiv:2512.03462 [pdf, ps, other]
Title: A Hybrid Deep Learning and Anomaly Detection Framework for Real-Time Malicious URL Classification
Comments: 14 pages,2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[45]  arXiv:2512.03461 [pdf, ps, other]
Title: In-Situ Encryption of Single-Transistor Nonvolatile Memories without Density Loss
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[46]  arXiv:2512.03420 [pdf, ps, other]
Title: HarnessAgent: Scaling Automatic Fuzzing Harness Construction with Tool-Augmented LLM Pipelines
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[47]  arXiv:2512.03361 [pdf, ps, other]
Title: Rethinking Security in Semantic Communication: Latent Manipulation as a New Threat
Authors: Zhiyuan Xi, Kun Zhu
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[48]  arXiv:2512.03358 [pdf, ps, other]
Title: Scaling Trust in Quantum Federated Learning: A Multi-Protocol Privacy Design
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2512.03356 [pdf, ps, other]
Title: Immunity memory-based jailbreak detection: multi-agent adaptive guard for large language models
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2512.03351 [pdf, ps, other]
Title: Empirical assessment of the perception of graphical threat model acceptability
Comments: Accepted into the Asia-Pacific Software Engineering Conference (APSEC) 2025. Will appear in APSEC 2025 proceedings
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2512.03238 [pdf, ps, other]
Title: How to DP-fy Your Data: A Practical Guide to Generating Synthetic Data With Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[52]  arXiv:2512.03207 [pdf, ps, other]
Title: Technical Report: The Need for a (Research) Sandstorm through the Privacy Sandbox
Comments: Technical report accompanying the research portal Privacy Sandstorm (this https URL) launched after our HotPETs 2024 talk "The Need for a (Research) Sandstorm through the Privacy Sandbox''
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2512.03121 [pdf, ps, other]
Title: Lost in Modality: Evaluating the Effectiveness of Text-Based Membership Inference Attacks on Large Multimodal Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[54]  arXiv:2512.03100 [pdf, ps, other]
Title: Ensemble Privacy Defense for Knowledge-Intensive LLMs against Membership Inference Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[55]  arXiv:2512.03097 [pdf, ps, other]
Title: Many-to-One Adversarial Consensus: Exposing Multi-Agent Collusion Risks in AI-Based Healthcare
Comments: 7 pages Conference level paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[56]  arXiv:2512.03089 [pdf, ps, other]
Title: Password-Activated Shutdown Protocols for Misaligned Frontier Agents
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[57]  arXiv:2512.03088 [pdf, ps, other]
Title: From Oracle Choice to Oracle Lock-In: An Exploratory Study on Blockchain Oracles Supplier Selection
Comments: Not peer reviewed
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); General Economics (econ.GN)
[58]  arXiv:2512.04044 (cross-list from cs.LG) [pdf, ps, other]
Title: MarkTune: Improving the Quality-Detectability Trade-off in Open-Weight LLM Watermarking
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[59]  arXiv:2512.04008 (cross-list from cs.LG) [pdf, ps, other]
Title: Efficient Public Verification of Private ML via Regularization
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[60]  arXiv:2512.03868 (cross-list from cs.SE) [pdf, ps, other]
Title: A Comprehensive Study on the Impact of Vulnerable Dependencies on Open-Source Software
Journal-ref: 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[61]  arXiv:2512.03816 (cross-list from cs.LG) [pdf, ps, other]
Title: Log Probability Tracking of LLM APIs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 150 entries: 1-50 | 12-61 | 62-111 | 112-150 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)