arXiv cs.CR Cryptography and Security
cscr-bot.bsky.social
arXiv cs.CR Cryptography and Security
@cscr-bot.bsky.social
Reposted by arXiv cs.CR Cryptography and Security
Anantaa Kotal, Anupam Joshi: Differentially Private Synthetic Data Generation Using Context-Aware GANs https://arxiv.org/abs/2512.08869 https://arxiv.org/pdf/2512.08869 https://arxiv.org/html/2512.08869
December 10, 2025 at 6:34 AM
Reposted by arXiv cs.CR Cryptography and Security
Reima Ishii, Takaaki Fukai, Takahiro Shinagawa: NecoFuzz: Effective Fuzzing of Nested Virtualization via Fuzz-Harness Virtual Machines https://arxiv.org/abs/2512.08858 https://arxiv.org/pdf/2512.08858 https://arxiv.org/html/2512.08858
December 10, 2025 at 6:33 AM
Reposted by arXiv cs.CR Cryptography and Security
Sebastian Zimmeck, Harshvardhan J. Pandit, Frederik Zuiderveen Borgesius, Cristiana Teixeira Santos, Konrad Kollnig, Robin Berjon: Can the GPC standard eliminate consent banners in the EU? https://arxiv.org/abs/2512.08856 https://arxiv.org/pdf/2512.08856 https://arxiv.org/html/2512.08856
December 10, 2025 at 6:30 AM
Reposted by arXiv cs.CR Cryptography and Security
Esther H\"anggi, Iy\'an M\'endez Veiga, Ligong Wang: An Efficient Secret Communication Scheme for the Bosonic Wiretap Channel https://arxiv.org/abs/2512.08623 https://arxiv.org/pdf/2512.08623 https://arxiv.org/html/2512.08623
December 10, 2025 at 6:50 AM
Reposted by arXiv cs.CR Cryptography and Security
Qingyang Hu, Yucheng Huang, Manshi Yang: CapsuleFS A Multi-credential DataCapsule Filesystem https://arxiv.org/abs/2512.08067 https://arxiv.org/pdf/2512.08067 https://arxiv.org/html/2512.08067
December 10, 2025 at 6:30 AM
Reposted by arXiv cs.CR Cryptography and Security
Maria Milena Araujo Felix: Command & Control (C2) Traffic Detection Via Algorithm Generated Domain (Dga) Classification Using Deep Learning And Natural Language Processing https://arxiv.org/abs/2512.07866 https://arxiv.org/pdf/2512.07866 https://arxiv.org/html/2512.07866
December 10, 2025 at 6:32 AM
Miranda Christ, Noah Golowich, Sam Gunn, Ankur Moitra, Daniel Wichs: Improved Pseudorandom Codes from Permuted Puzzles https://arxiv.org/abs/2512.08918 https://arxiv.org/pdf/2512.08918 https://arxiv.org/html/2512.08918
December 10, 2025 at 6:30 AM
Mohamed Elmahallawy, Asma Jodeiri Akbarfam: Decentralized Trust for Space AI: Blockchain-Based Federated Learning Across Multi-Vendor LEO Satellite Networks https://arxiv.org/abs/2512.08882 https://arxiv.org/pdf/2512.08882 https://arxiv.org/html/2512.08882
December 10, 2025 at 6:30 AM
Mohamed Elmahallawy, Sanjay Madria, Samuel Frimpong: Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety https://arxiv.org/abs/2512.08862 https://arxiv.org/pdf/2512.08862 https://arxiv.org/html/2512.08862
December 10, 2025 at 6:30 AM
Yi Liu, Weixiang Han, Chengjun Cai, Xingliang Yuan, Cong Wang: PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration https://arxiv.org/abs/2512.08809 https://arxiv.org/pdf/2512.08809 https://arxiv.org/html/2512.08809
December 10, 2025 at 6:30 AM
Sadegh Momeni, Ge Zhang, Birkett Huber, Hamza Harkous, Sam Lipton, Benoit Seguin, Yanis Pavlidis: Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework https://arxiv.org/abs/2512.08802 https://arxiv.org/pdf/2512.08802 https://arxiv.org/html/2512.08802
December 10, 2025 at 6:30 AM
Roopak Surendran: An Explainable AI Model for the Detecting Malicious Smart Contracts Based on EVM Opcode Based Features https://arxiv.org/abs/2512.08782 https://arxiv.org/pdf/2512.08782 https://arxiv.org/html/2512.08782
December 10, 2025 at 6:30 AM
Hlekane Ngobeni, Mike Wa Nkongolo: Integrating Public Input and Technical Expertise for Effective Cybersecurity Policy Formulation https://arxiv.org/abs/2512.08575 https://arxiv.org/pdf/2512.08575 https://arxiv.org/html/2512.08575
December 10, 2025 at 6:30 AM
Kristof Verslype, Florian Kerschbaum, Cyprien Delpech de Saint Guilhem, Bart De Decker, Jorn Lapon: Labeled Delegated PSI and its Applications in the Public Sector https://arxiv.org/abs/2512.08558 https://arxiv.org/pdf/2512.08558 https://arxiv.org/html/2512.08558
December 10, 2025 at 6:30 AM
Dyna Soumhane Ouchebara, St\'ephane Dupont: LLM-based Vulnerable Code Augmentation: Generate or Refactor? https://arxiv.org/abs/2512.08493 https://arxiv.org/pdf/2512.08493 https://arxiv.org/html/2512.08493
December 10, 2025 at 6:30 AM
Yinan Zhong, Qianhao Miao, Yanjiao Chen, Jiangyi Deng, Yushi Cheng, Wenyuan Xu: Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs https://arxiv.org/abs/2512.08417 https://arxiv.org/pdf/2512.08417 https://arxiv.org/html/2512.08417
December 10, 2025 at 6:30 AM
Xiaoqi Li, Lei Xie, Wenkai Li, Zongwei Li: USCSA: Evolution-Aware Security Analysis for Proxy-Based Upgradeable Smart Contracts https://arxiv.org/abs/2512.08372 https://arxiv.org/pdf/2512.08372 https://arxiv.org/html/2512.08372
December 10, 2025 at 6:30 AM
Wang, Li, Zhang, Zhuang, Yang, Zhang, Luo, Lin: Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships https://arxiv.org/abs/2512.08326 https://arxiv.org/pdf/2512.08326 https://arxiv.org/html/2512.08326
December 10, 2025 at 6:30 AM
Qingyuan Hu, Christopher M. Poskitt, Jun Sun, Yuqi Chen: Developing a Strong CPS Defender: An Evolutionary Approach https://arxiv.org/abs/2512.08320 https://arxiv.org/pdf/2512.08320 https://arxiv.org/html/2512.08320
December 10, 2025 at 6:30 AM
Marcel D. S. K. Gr\"afenstein, Stefan K\"opsell, Maryam Zarezadeh: Privacy-Preserving Identifier Checking in 5G https://arxiv.org/abs/2512.08310 https://arxiv.org/pdf/2512.08310 https://arxiv.org/html/2512.08310
December 10, 2025 at 6:30 AM
Aman Kumar, Ankit Chaudhary: Secure Audio Embedding in Images using Nature-Inspired Optimization https://arxiv.org/abs/2512.08299 https://arxiv.org/pdf/2512.08299 https://arxiv.org/html/2512.08299
December 10, 2025 at 6:30 AM
Yihan Liao, Jacky Keung, Xiaoxue Ma, Jingyu Zhang, Yicheng Sun: Exposing and Defending Membership Leakage in Vulnerability Prediction Models https://arxiv.org/abs/2512.08291 https://arxiv.org/pdf/2512.08291 https://arxiv.org/html/2512.08291
December 10, 2025 at 6:30 AM
Shiva Gaire, Srijan Gyawali, Saroj Mishra, Suman Niroula, Dilip Thakur, Umesh Yadav: Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem https://arxiv.org/abs/2512.08290 https://arxiv.org/pdf/2512.08290 https://arxiv.org/html/2512.08290
December 10, 2025 at 6:30 AM
Chen, He, Wang, Shao, Zheng, Liu, Li, Chen, Chu, Qin: MIRAGE: Misleading Retrieval-Augmented Generation via Black-box and Query-agnostic Poisoning Attacks https://arxiv.org/abs/2512.08289 https://arxiv.org/pdf/2512.08289 https://arxiv.org/html/2512.08289
December 10, 2025 at 6:30 AM
Muhammad Baqer Mollah, Honggang Wang, Hua Fang: Evaluating Vulnerabilities of Connected Vehicles Under Cyber Attacks by Attack-Defense Tree https://arxiv.org/abs/2512.08204 https://arxiv.org/pdf/2512.08204 https://arxiv.org/html/2512.08204
December 10, 2025 at 6:30 AM