We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 213 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 201-213 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 4 Feb 2026 (showing first 25 of 40 entries)

[1]  arXiv:2602.03792 [pdf, ps, other]
Title: WebSentinel: Detecting and Localizing Prompt Injection Attacks for Web Agents
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[2]  arXiv:2602.03671 [pdf, ps, other]
Title: mopri - An Analysis Framework for Unveiling Privacy Violations in Mobile Apps
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3]  arXiv:2602.03666 [pdf, ps, other]
Title: Reference-Free EM Validation Flow for Detecting Triggered Hardware Trojans
Comments: Accepted at International Symposium on Quality Electronic Design (ISQED), 2026
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2602.03648 [pdf, ps, other]
Title: Can Developers rely on LLMs for Secure IaC Development?
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2602.03580 [pdf, ps, other]
Title: Don't believe everything you read: Understanding and Measuring MCP Behavior under Misleading Tool Descriptions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[6]  arXiv:2602.03489 [pdf, ps, other]
Title: Detecting and Explaining Malware Family Evolution Using Rule-Based Drift Analysis
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2602.03470 [pdf, ps, other]
Title: Reading Between the Code Lines: On the Use of Self-Admitted Technical Debt for Security Analysis
Comments: Preprint submitted to Journal of Systems and Software
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Software Engineering (cs.SE)
[8]  arXiv:2602.03423 [pdf, ps, other]
Title: Origin Lens: A Privacy-First Mobile Framework for Cryptographic Image Provenance and AI Detection
Comments: Accepted at ACM TheWebConf '26 Companion
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[9]  arXiv:2602.03377 [pdf, ps, other]
Title: SEW: Strengthening Robustness of Black-box DNN Watermarking via Specificity Enhancement
Comments: Accepted by KDD 2026
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2602.03328 [pdf, ps, other]
Title: GuardReasoner-Omni: A Reasoning-based Multi-modal Guardrail for Text, Image, and Video
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2602.03284 [pdf, ps, other]
Title: Time Is All It Takes: Spike-Retiming Attacks on Event-Driven Spiking Neural Networks
Comments: Accepted by ICLR 2026
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[12]  arXiv:2602.03271 [pdf, ps, other]
Title: LogicScan: An LLM-driven Framework for Detecting Business Logic Vulnerabilities in Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2602.03127 [pdf, ps, other]
Title: Cyber Insurance, Audit, and Policy: Review, Analysis and Recommendations
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2602.03117 [pdf, ps, other]
Title: AgentDyn: A Dynamic Open-Ended Benchmark for Evaluating Prompt Injection Attacks of Real-World Agent Security System
Comments: 23 Pages, 16 Tables
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2602.03085 [pdf, ps, other]
Title: The Trigger in the Haystack: Extracting and Reconstructing LLM Backdoor Triggers
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[16]  arXiv:2602.03040 [pdf, ps, other]
Title: DF-LoGiT: Data-Free Logic-Gated Backdoor Attacks in Vision Transformers
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2602.03035 [pdf, ps, other]
Title: Generalizable and Interpretable RF Fingerprinting with Shapelet-Enhanced Large Language Models
Comments: 12 pages, 7 figures, IMWUT submission
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2602.03012 [pdf, ps, other]
Title: CVE-Factory: Scaling Expert-Level Agentic Tasks for Code Security Vulnerability
Comments: Under Review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[19]  arXiv:2602.02781 [pdf, ps, other]
Title: Evaluating False Alarm and Missing Attacks in CAN IDS
Comments: 8 pages, 2 figures, and 8 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[20]  arXiv:2602.02718 [pdf, ps, other]
Title: Composition for Pufferfish Privacy
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2602.02717 [pdf, ps, other]
Title: On the Feasibility of Hybrid Homomorphic Encryption for Intelligent Transportation Systems
Comments: This version has been submitted to a peer-reviewed journal and is currently under review
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2602.02689 [pdf, ps, other]
Title: Eidolon: A Practical Post-Quantum Signature Scheme Based on k-Colorability in the Age of Graph Neural Networks
Comments: 23 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[23]  arXiv:2602.02641 [pdf, ps, other]
Title: Benchmarking Large Language Models for Zero-shot and Few-shot Phishing URL Detection
Comments: 9 pages, accepted at the 39th Conference on Neural Information Processing Systems (NeurIPS 2025 LAW Workshop)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[24]  arXiv:2602.02629 [pdf, ps, other]
Title: Trustworthy Blockchain-based Federated Learning for Electronic Health Records: Securing Participant Identity with Decentralized Identifiers and Verifiable Credentials
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[25]  arXiv:2602.02615 [pdf, ps, other]
Title: TinyGuard:A lightweight Byzantine Defense for Resource-Constrained Federated Learning via Statistical Update Fingerprints
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 213 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 201-213 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2602, contact, help  (Access key information)