secure

Title: Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography. (arXiv:2208.01635v1 [cs.CR])

Title: CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations. (arXiv:2208.01703v1 [cs.CR])

security

Title: Recognizing and Extracting Cybersecurtity-relevant Entities from Text. (arXiv:2208.01693v1 [cs.CL])

Title: Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography. (arXiv:2208.01634v1 [cs.CR])

Title: A New Implementation of Federated Learning for Privacy and Security Enhancement. (arXiv:2208.01826v1 [cs.CR])

Title: Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView. (arXiv:2208.01968v1 [cs.CR])

Title: Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage. (arXiv:2208.02093v1 [cs.CR])

In this paper, we present a new generic cache template attack technique, LBTA, layered binary templating attacks. LBTA uses multiple coarser-grained side channel layers as an extension to cache-line granularity templating to speed up the runtime of cache templating attacks. We describe LBTA with a variable number of layers with concrete side channels of different granularity, ranging from 64 B to 2MB in practice and in theory beyond. In particular the software-level page cache side channel in combination with the hardware-level L3 cache side channel, already reduces the templating runtime by three orders of magnitude. We apply LBTAs to different software projects and thereby discover data deduplication and dead-stripping during compilation and linking as novel security issues. We show that these mechanisms introduce large spatial distances in binaries for data accessed during a keystroke, enabling reliable leakage of keystrokes. Using LBTA on Chromium-based applications, we can build a full unprivileged cache-based keylogger. Our findings show that all user input to Chromium-based apps is affected and we demonstrate this on a selection of popular apps including Signal, Threema, Discord, and password manager apps like passky. As this is not a flaw of individual apps but the framework, we conclude that all apps that use the framework will also be affected, i.e., hundreds of apps.

Title: A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach. (arXiv:2208.02094v1 [cs.CR])

Title: Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. (arXiv:2208.02125v1 [cs.CR])

Title: Scrypt Mining with ASICs. (arXiv:2208.02160v1 [cs.CR])

Title: Statistical Decoding 2.0: Reducing Decoding to LPN. (arXiv:2208.02201v1 [cs.CR])

We revisit this old algorithm by using parity-check equations in a more general way. Here the parity-checks are used to get LPN samples with a secret which is part of the error and the LPN noise is related to the weight of the parity-checks we produce. The corresponding LPN problem is then solved by standard Fourier techniques. By properly choosing the method of producing these low weight equations and the size of the LPN problem, we are able to outperform in this way significantly information set decodings at code rates smaller than $0.3$. It gives for the first time after $60$ years, a better decoding algorithm for a significant range which does not belong to the ISD family.

Title: Contrasting global approaches for identifying and managing cybersecurity risks in supply chains. (arXiv:2208.02244v1 [cs.CR])

privacy

Title: A Roadmap for Greater Public Use of Privacy-Sensitive Government Data: Workshop Report. (arXiv:2208.01636v1 [cs.CR])

Title: CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version). (arXiv:2208.02159v1 [cs.CR])

Title: Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing. (arXiv:2208.01886v1 [cs.CR])

protect

defense

attack

Title: Multiclass ASMA vs Targeted PGD Attack in Image Segmentation. (arXiv:2208.01844v1 [cs.CV])

Title: Adversarial Camouflage for Node Injection Attack on Graphs. (arXiv:2208.01819v1 [cs.LG])

Title: Mass Exit Attacks on the Lightning Network. (arXiv:2208.01908v1 [cs.CR])

Title: Spectrum Focused Frequency Adversarial Attacks for Automatic Modulation Classification. (arXiv:2208.01919v1 [cs.CR])

Title: Success of Uncertainty-Aware Deep Models Depends on Data Manifold Geometry. (arXiv:2208.01705v1 [cs.LG])

robust

Title: Robust RGB-D Fusion for Saliency Detection. (arXiv:2208.01762v1 [cs.CV])

Title: Rethinking the Evaluation of Unbiased Scene Graph Generation. (arXiv:2208.01909v1 [cs.CV])

Title: Decay2Distill: Leveraging spatial perturbation and regularization for self-supervised image denoisin. (arXiv:2208.01948v1 [cs.CV])

Title: Localization and Classification of Parasitic Eggs in Microscopic Images Using an EfficientDet Detector. (arXiv:2208.01963v1 [cs.CV])

Title: Convolutional Fine-Grained Classification with Self-Supervised Target Relation Regularization. (arXiv:2208.01997v1 [cs.CV])

Title: KD-SCFNet: Towards More Accurate and Efficient Salient Object Detection via Knowledge Distillation. (arXiv:2208.02178v1 [cs.CV])

Title: Robust Learning of Deep Time Series Anomaly Detection Models with Contaminated Training Data. (arXiv:2208.01841v1 [cs.LG])

Title: Robust Graph Neural Networks using Weighted Graph Laplacian. (arXiv:2208.01853v1 [cs.LG])

biometric

steal

extraction

Title: Cross-Lingual Knowledge Transfer for Clinical Phenotyping. (arXiv:2208.01912v1 [cs.CL])

Title: KPI-BERT: A Joint Named Entity Recognition and Relation Extraction Model for Financial Reports. (arXiv:2208.02140v1 [cs.CL])

Title: V-Coder: Adaptive AutoEncoder for Semantic Disclosure in Knowledge Graphs. (arXiv:2208.01735v1 [cs.AI])

membership infer

federate

Title: Differentially Private Vertical Federated Clustering. (arXiv:2208.01700v1 [cs.CR])

Title: Asynchronous Federated Learning for Edge-assisted Vehicular Networks. (arXiv:2208.01901v1 [cs.LG])

fair

Title: From Single Aircraft to Communities: A Neutral Interpretation of Air Traffic Complexity Dynamics. (arXiv:2208.01740v1 [cs.AI])

Title: A Lightweight Transmission Parameter Selection Scheme Using Reinforcement Learning for LoRaWAN. (arXiv:2208.01824v1 [cs.LG])

interpretability

Title: The Importance of the Instantaneous Phase in Detecting Faces with Convolutional Neural Networks. (arXiv:2208.01638v1 [cs.CV])

Title: Unsupervised Discovery of Semantic Concepts in Satellite Imagery with Style-based Wavelet-driven Generative Models. (arXiv:2208.02089v1 [cs.CV])

exlainability

watermark