We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 53

[ total of 133 entries: 1-50 | 4-53 | 54-103 | 104-133 ]
[ showing 50 entries per page: fewer | more | all ]

Tue, 9 Dec 2025

[54]  arXiv:2512.07827 [pdf, ps, other]
Title: An Adaptive Multi-Layered Honeynet Architecture for Threat Behavior Analysis via Deep Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[55]  arXiv:2512.07725 [pdf, ps, other]
Title: Privacy Practices of Browser Agents
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2512.07533 [pdf, ps, other]
Title: VulnLLM-R: Specialized Reasoning LLM with Agent Scaffold for Vulnerability Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[57]  arXiv:2512.07495 [pdf, ps, other]
Title: Amulet: Fast TEE-Shielded Inference for On-Device Model Protection
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2512.07342 [pdf, ps, other]
Title: PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning
Comments: Accepted at NDSS 2026; code available at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[59]  arXiv:2512.07292 [pdf, ps, other]
Title: Breaking ECDSA with Electromagnetic Side-Channel Attacks: Challenges and Practicality on Modern Smartphones
Comments: This work has been submitted to Euro S&P 2026 for possible publication
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2512.07086 [pdf, ps, other]
Title: ThinkTrap: Denial-of-Service Attacks against Black-box LLM Services via Infinite Thinking
Comments: This version includes the final camera-ready manuscript accepted by NDSS 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[61]  arXiv:2512.07038 [pdf, ps, other]
Title: Ideal Attribution and Faithful Watermarks for Language Models
Comments: 30 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[62]  arXiv:2512.07033 [pdf, ps, other]
Title: Managed TLS Under Migration: Authentication Authority Across CDN and Hosting Transitions
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[63]  arXiv:2512.07030 [pdf, ps, other]
Title: A Comprehensive Study of Supervised Machine Learning Models for Zero-Day Attack Detection: Analyzing Performance on Imbalanced Data
Comments: 13 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[64]  arXiv:2512.06914 [pdf, ps, other]
Title: SoK: Trust-Authorization Mismatch in LLM Agent Interactions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[65]  arXiv:2512.06899 [pdf, ps, other]
Title: Patronus: Identifying and Mitigating Transferable Backdoors in Pre-trained Language Models
Comments: Work in progress
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2512.06846 [pdf, ps, other]
Title: CKG-LLM: LLM-Assisted Detection of Smart Contract Access Control Vulnerabilities Based on Knowledge Graphs
Comments: 6 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2512.06781 [pdf, ps, other]
Title: From Description to Score: Can LLMs Quantify Vulnerabilities?
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Programming Languages (cs.PL)
[68]  arXiv:2512.06747 [pdf, ps, other]
Title: PrivLLMSwarm: Privacy-Preserving LLM-Driven UAV Swarms for Secure IoT Surveillance
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[69]  arXiv:2512.06713 [pdf, ps, other]
Title: Look Twice before You Leap: A Rational Agent Framework for Localized Adversarial Anonymization
Comments: 16 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[70]  arXiv:2512.06660 [pdf, ps, other]
Title: Towards Small Language Models for Security Query Generation in SOC Workflows
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[71]  arXiv:2512.06659 [pdf, ps, other]
Title: The Evolution of Agentic AI in Cybersecurity: From Single LLM Reasoners to Multi-Agent Systems and Autonomous Pipelines
Authors: Vaishali Vinay
Comments: Accepted at ICAIC 2026
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2512.06589 [pdf, ps, other]
Title: OmniSafeBench-MM: A Unified Benchmark and Toolbox for Multimodal Jailbreak Attack-Defense Evaluation
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[73]  arXiv:2512.06557 [pdf, ps, other]
Title: Characterizing Large-Scale Adversarial Activities Through Large-Scale Honey-Nets
Comments: Accepted at Conference IEEE UEMCON 2025
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[74]  arXiv:2512.06556 [pdf, ps, other]
Title: Securing the Model Context Protocol: Defending LLMs Against Tool Poisoning and Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[75]  arXiv:2512.06555 [pdf, ps, other]
Title: BEACON: A Unified Behavioral-Tactical Framework for Explainable Cybercrime Analysis with Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[76]  arXiv:2512.06500 [pdf, ps, other]
Title: PDRIMA: A Policy-Driven Runtime Integrity Measurement and Attestation Approach for ARM TrustZone-based TEE
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2512.06467 [pdf, ps, other]
Title: Formalisation of Security for Federated Learning with DP and Attacker Advantage in IIIf for Satellite Swarms -- Extended Version
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[78]  arXiv:2512.06411 [pdf, ps, other]
Title: KyFrog: A High-Security LWE-Based KEM Inspired by ML-KEM
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[79]  arXiv:2512.06396 [pdf, ps, other]
Title: AgenticCyber: A GenAI-Powered Multi-Agent System for Multimodal Threat Detection and Adaptive Response in Cybersecurity
Authors: Shovan Roy
Comments: 6 pages for IEEE conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[80]  arXiv:2512.06390 [pdf, ps, other]
Title: Web Technologies Security in the AI Era: A Survey of CDN-Enhanced Defenses
Comments: Accepted at 2025 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). 7 pages, 5 figures
Journal-ref: 2025 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), Bali, Indonesia, 2025, pp. 180-186
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[81]  arXiv:2512.06387 [pdf, ps, other]
Title: Beyond Model Jailbreak: Systematic Dissection of the "Ten DeadlySins" in Embodied Intelligence
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[82]  arXiv:2512.06364 [pdf, ps, other]
Title: JEEVHITAA -- An End-to-End HCAI System to Support Collective Care
Comments: 14 pages, 4 figures, 6 tables, 2 algorithms, Preprint of work Submitted to MobiSys 2026 - Emergent Ideas Track
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Human-Computer Interaction (cs.HC)
[83]  arXiv:2512.06253 [pdf, ps, other]
Title: Privacy Loss of Noise Perturbation via Concentration Analysis of A Product Measure
Comments: Accepted by ACM International Conference on Management of Data (SIGMOD '26)
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2512.06172 [pdf, ps, other]
Title: DEFEND: Poisoned Model Detection and Malicious Client Exclusion Mechanism for Secure Federated Learning-based Road Condition Classification
Comments: Accepted to the 41st ACM/SIGAPP Symposium on Applied Computing (SAC 2026)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[85]  arXiv:2512.06155 [pdf, ps, other]
Title: Sift or Get Off the PoC: Applying Information Retrieval to Vulnerability Research with SiftRank
Authors: Caleb Gross
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[86]  arXiv:2512.06048 [pdf, ps, other]
Title: The Road of Adaptive AI for Precision in Cybersecurity
Authors: Sahil Garg
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG); Software Engineering (cs.SE)
[87]  arXiv:2512.06033 [pdf, ps, other]
Title: Sell Data to AI Algorithms Without Revealing It: Secure Data Valuation and Sharing via Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[88]  arXiv:2512.07814 (cross-list from cs.SE) [pdf, ps, other]
Title: Understanding Privacy Risks in Code Models Through Training Dynamics: A Causal Approach
Comments: 21 pages, 8 figures
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[89]  arXiv:2512.07574 (cross-list from eess.IV) [pdf, ps, other]
Title: Precise Liver Tumor Segmentation in CT Using a Hybrid Deep Learning-Radiomics Framework
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[90]  arXiv:2512.07520 (cross-list from cs.AR) [pdf, ps, other]
Title: aLEAKator: HDL Mixed-Domain Simulation for Masked Hardware \& Software Formal Verification
Authors: Noé Amiot (ALSOC), Quentin L. Meunier (ALSOC), Karine Heydemann (ALSOC), Emmanuelle Encrenaz (ALSOC)
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[91]  arXiv:2512.07368 (cross-list from cs.SE) [pdf, ps, other]
Title: Challenges in Developing Secure Software -- Results of an Interview Study in the German Software Industry
Comments: This paper includes 6 pages, 1 table, 1 figure. It is an English translation of our paper published in the German journal "Softwaretechnik Trends": ISSN 0720-8928, vol. 45, no. 4, pp. 2-7, year 2025
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[92]  arXiv:2512.07247 (cross-list from cs.CV) [pdf, ps, other]
Title: AdLift: Lifting Adversarial Perturbations to Safeguard 3D Gaussian Splatting Assets Against Instruction-Driven Editing
Comments: 40 pages, 34 figures, 18 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[93]  arXiv:2512.07228 (cross-list from cs.CV) [pdf, ps, other]
Title: Towards Robust Protective Perturbation against DeepFake Face Swapping
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[94]  arXiv:2512.06971 (cross-list from cs.LG) [pdf, ps, other]
Title: Prediction with Expert Advice under Local Differential Privacy
Comments: 19 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[95]  arXiv:2512.06925 (cross-list from cs.LG) [pdf, ps, other]
Title: Deep Reinforcement Learning for Phishing Detection with Transformer-Based Semantic Features
Authors: Aseer Al Faisal
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[96]  arXiv:2512.06906 (cross-list from cs.SE) [pdf, ps, other]
Title: MINES: Explainable Anomaly Detection through Web API Invariant Inference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG)
[97]  arXiv:2512.06716 (cross-list from cs.AI) [pdf, ps, other]
Title: Cognitive Control Architecture (CCA): A Lifecycle Supervision Framework for Robustly Aligned AI Agents
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[98]  arXiv:2512.06304 (cross-list from eess.AS) [pdf, ps, other]
Title: Degrading Voice: A Comprehensive Overview of Robust Voice Conversion Through Input Manipulation
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Sound (cs.SD)
[99]  arXiv:2512.06243 (cross-list from cs.LG) [pdf, ps, other]
Title: Quantization Blindspots: How Model Compression Breaks Backdoor Defenses
Authors: Rohan Pandey, Eric Ye
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[100]  arXiv:2512.06123 (cross-list from cs.SE) [pdf, ps, other]
Title: Toward Patch Robustness Certification and Detection for Deep Learning Systems Beyond Consistent Samples
Comments: accepted by IEEE Transactions on Reliability; extended technical report
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 8 Dec 2025 (showing first 3 of 11 entries)

[101]  arXiv:2512.05951 [pdf, ps, other]
Title: Trusted AI Agents in the Cloud
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[102]  arXiv:2512.05745 [pdf, ps, other]
Title: ARGUS: Defending Against Multimodal Indirect Prompt Injection via Steering Instruction-Following Behavior
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[103]  arXiv:2512.05707 [pdf, ps, other]
Title: Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models
Subjects: Cryptography and Security (cs.CR)
[ total of 133 entries: 1-50 | 4-53 | 54-103 | 104-133 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)