We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 3

[ total of 133 entries: 1-50 | 4-53 | 54-103 | 104-133 ]
[ showing 50 entries per page: fewer | more | all ]

Thu, 11 Dec 2025 (continued, showing last 19 of 22 entries)

[4]  arXiv:2512.09549 [pdf, ps, other]
Title: Chasing Shadows: Pitfalls in LLM Security Research
Comments: About to appear at NDSS'26
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2512.09539 [pdf, ps, other]
Title: Comparative Analysis of Hash-based Malware Clustering via K-Means
Comments: To be published in the proceedings of the 8th International Conference on Reliable Information and Communication Technology (IRICT 2025). Springer Book Series: "Lecture Notes on Data Engineering and Communications Technologies"
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[6]  arXiv:2512.09485 [pdf, ps, other]
Title: Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks
Comments: Accepted by IEEE JSAC. This work has been submitted to the IEEE for possible publication
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[7]  arXiv:2512.09442 [pdf, ps, other]
Title: Reference Recommendation based Membership Inference Attack against Hybrid-based Recommender Systems
Comments: This paper has been accepted by AAAI 2026
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2512.09409 [pdf, ps, other]
Title: Proof of Trusted Execution: A Consensus Paradigm for Deterministic Blockchain Finality
Comments: Submitted to Middleware 2026 Conference
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2512.09385 [pdf, ps, other]
Title: BugSweeper: Function-Level Detection of Smart Contract Vulnerabilities Using Graph Neural Networks
Comments: This paper is accepted to AAAI 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[10]  arXiv:2512.09321 [pdf, ps, other]
Title: ObliInjection: Order-Oblivious Prompt Injection Attack to LLM Agents with Multi-source Data
Comments: To appear in NDSS 2026
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2512.09264 [pdf, ps, other]
Title: FBA$^2$D: Frequency-based Black-box Attack for AI-generated Image Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[12]  arXiv:2512.09233 [pdf, ps, other]
Title: Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System
Comments: A shorter version of this paper will appear in the Proceedings of the Network and Distributed System Security Symposium (NDSS) 2026 published by the Internet Society
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2512.09150 [pdf, ps, other]
Title: Exposing Vulnerabilities in Counterfeit Prevention Systems Utilizing Physically Unclonable Surface Features
Comments: 15 pages; This work builds on arXiv:2408.02221 [cs.CR]
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[14]  arXiv:2512.09049 [pdf, ps, other]
Title: EMMap: A Systematic Framework for Spatial EMFI Mapping and Fault Classification on Microcontrollers
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2512.09882 (cross-list from cs.AI) [pdf, ps, other]
Title: Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[16]  arXiv:2512.09862 (cross-list from quant-ph) [pdf, ps, other]
Title: True Random Number Generators on IQM Spark
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[17]  arXiv:2512.09742 (cross-list from cs.CL) [pdf, ps, other]
Title: Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs
Comments: 70 pages, 47 figures
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2512.09699 (cross-list from quant-ph) [pdf, ps, other]
Title: Device Independent Quantum Secret Sharing Using Multiparty Pseudo-telepathy Game
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[19]  arXiv:2512.09311 (cross-list from cs.CV) [pdf, ps, other]
Title: Transformer-Driven Multimodal Fusion for Explainable Suspiciousness Estimation in Visual Surveillance
Comments: 12 pages, 10 figures, IEEE Transaction on Image Processing
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[20]  arXiv:2512.09309 (cross-list from cs.DC) [pdf, ps, other]
Title: A Distributed Framework for Privacy-Enhanced Vision Transformers on the Edge
Comments: 16 pages, 7 figures. Published in the Proceedings of the Tenth ACM/IEEE Symposium on Edge Computing (SEC '25), Dec 3-6, 2025, Washington, D.C., USA
Journal-ref: Proceedings of the Tenth ACM/IEEE Symposium on Edge Computing (SEC '25), 2025, Article 8, pp. 1-16
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[21]  arXiv:2512.09300 (cross-list from cs.OS) [pdf, ps, other]
Title: ZeroOS: A Universal Modular Library OS for zkVMs
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[22]  arXiv:2512.09006 (cross-list from cs.SE) [pdf, ps, other]
Title: Llama-based source code vulnerability detection: Prompt engineering vs Fine tuning
Comments: 20 pages, Accepted at ESORICS 2025
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 10 Dec 2025

[23]  arXiv:2512.08918 [pdf, ps, other]
Title: Improved Pseudorandom Codes from Permuted Puzzles
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2512.08882 [pdf, ps, other]
Title: Decentralized Trust for Space AI: Blockchain-Based Federated Learning Across Multi-Vendor LEO Satellite Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2512.08862 [pdf, ps, other]
Title: Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[26]  arXiv:2512.08809 [pdf, ps, other]
Title: PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration
Comments: Accepted at IEEE INFOCOM 2026 (full version)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[27]  arXiv:2512.08802 [pdf, ps, other]
Title: Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework
Comments: published in CAMLIS 2025, this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[28]  arXiv:2512.08782 [pdf, ps, other]
Title: An Explainable AI Model for the Detecting Malicious Smart Contracts Based on EVM Opcode Based Features
Authors: Roopak Surendran
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2512.08575 [pdf, ps, other]
Title: Integrating Public Input and Technical Expertise for Effective Cybersecurity Policy Formulation
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[30]  arXiv:2512.08558 [pdf, ps, other]
Title: Labeled Delegated PSI and its Applications in the Public Sector
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2512.08493 [pdf, ps, other]
Title: LLM-based Vulnerable Code Augmentation: Generate or Refactor?
Comments: 6 pages, Submitted to ESAAN 2026, Under pier review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[32]  arXiv:2512.08417 [pdf, ps, other]
Title: Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs
Comments: Accepted by Network and Distributed System Security (NDSS) Symposium 2026
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2512.08372 [pdf, ps, other]
Title: USCSA: Evolution-Aware Security Analysis for Proxy-Based Upgradeable Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2512.08326 [pdf, ps, other]
Title: Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships
Comments: 11 pages, 7 figures, 8 tables;Accepted to ICSE 2026 Research Track
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[35]  arXiv:2512.08320 [pdf, ps, other]
Title: Developing a Strong CPS Defender: An Evolutionary Approach
Comments: 15 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2512.08310 [pdf, ps, other]
Title: Privacy-Preserving Identifier Checking in 5G
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2512.08299 [pdf, ps, other]
Title: Secure Audio Embedding in Images using Nature-Inspired Optimization
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2512.08291 [pdf, ps, other]
Title: Exposing and Defending Membership Leakage in Vulnerability Prediction Models
Comments: Accepted at APSEC 2025
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[39]  arXiv:2512.08290 [pdf, ps, other]
Title: Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem
Comments: All authors contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[40]  arXiv:2512.08289 [pdf, ps, other]
Title: MIRAGE: Misleading Retrieval-Augmented Generation via Black-box and Query-agnostic Poisoning Attacks
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2512.08204 [pdf, ps, other]
Title: Evaluating Vulnerabilities of Connected Vehicles Under Cyber Attacks by Attack-Defense Tree
Comments: 6 Pages, International Conference on Computing, Networking and Communication (ICNC), Maui, Hawaii, USA, 2026
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[42]  arXiv:2512.08185 [pdf, ps, other]
Title: A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties
Comments: 6 pages, 1 figure, framework proposal
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[43]  arXiv:2512.08172 [pdf, ps, other]
Title: Security Analysis of Integer Learning with Errors with Rejection Sampling
Comments: 24 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[44]  arXiv:2512.08169 [pdf, ps, other]
Title: Information-Dense Reasoning for Efficient and Auditable Security Alert Triage
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[45]  arXiv:2512.08107 [pdf, ps, other]
Title: Detecting Ambiguity Aversion in Cyberattack Behavior to Inform Cognitive Defense Strategies
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[46]  arXiv:2512.08104 [pdf, ps, other]
Title: AgentCrypt: Advancing Privacy and (Secure) Computation in AI Agent Collaboration
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2512.07909 [pdf, ps, other]
Title: Agentic Artificial Intelligence for Ethical Cybersecurity in Uganda: A Reinforcement Learning Framework for Threat Detection in Resource-Constrained Environments
Comments: 29 pages, 7 figures, 2 tables, 1 appendix
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[48]  arXiv:2512.08869 (cross-list from cs.LG) [pdf, ps, other]
Title: Differentially Private Synthetic Data Generation Using Context-Aware GANs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[49]  arXiv:2512.08858 (cross-list from cs.OS) [pdf, ps, other]
Title: NecoFuzz: Effective Fuzzing of Nested Virtualization via Fuzz-Harness Virtual Machines
Comments: To appear in EuroSys 2026
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[50]  arXiv:2512.08856 (cross-list from cs.CY) [pdf, ps, other]
Title: Can the GPC standard eliminate consent banners in the EU?
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[51]  arXiv:2512.08623 (cross-list from quant-ph) [pdf, ps, other]
Title: An Efficient Secret Communication Scheme for the Bosonic Wiretap Channel
Comments: 5 pages, 2 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[52]  arXiv:2512.08067 (cross-list from cs.DC) [pdf, ps, other]
Title: CapsuleFS A Multi-credential DataCapsule Filesystem
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[53]  arXiv:2512.07866 (cross-list from cs.LG) [pdf, ps, other]
Title: Command & Control (C2) Traffic Detection Via Algorithm Generated Domain (Dga) Classification Using Deep Learning And Natural Language Processing
Comments: Language: Portuguese
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 133 entries: 1-50 | 4-53 | 54-103 | 104-133 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)