Top 10 Arxiv Papers Today in Cryptography And Security


2.255 Mikeys
#1. Anonymous and confidential file sharing over untrusted clouds
Stefan Contiu, Sébastien Vaucher, Rafael Pires, Marcelo Pasin, Pascal Felber, Laurent Réveillère
Using public cloud services for storing and sharing confidential data requires end users to cryptographically protect both the data and the access to the data. In some cases, the identity of end users needs to remain confidential against the cloud provider and fellow users accessing the data. As such, the underlying cryptographic access control mechanism needs to ensure the anonymity of both data producers and consumers. We introduce A-SKY, a cryptographic access control extension capable of providing confidentiality and anonymity guarantees, all while efficiently scaling to large organizations. A-SKY leverages trusted execution environments (TEEs) to address the impracticality of anonymous broadcast encryption (ANOBE) schemes, achieving faster execution times and shorter ciphertexts. The innovative design of A-SKY limits the usage of the TEE to the narrow set of data producing operations, and thus optimizes the dominant data consumption actions by not requiring a TEE. Furthermore, we propose a scalable implementation for A-SKY...
more | pdf | html
Figures
None.
Tweets
x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t.co/hJeDyHrlYn
kom_256: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
operationoxygen: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
remagio: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
antifarben: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
1stCrassCitizen: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
encodedwitch: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
__chamal: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
AcooEdi: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
origin_hosting: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
dheeraj_rn: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
fahadsoror: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
p3t3r49principl: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
CANIS_IMPETUS: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
packethacker: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
xb3t0: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
Nyzblossom1: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
_xspeak: RT @x0rz: Anonymous and Confidential File Sharing over Untrusted Clouds https://t.co/Y0ARSbY9u0 (PDF) #privacy #encryption #cloud https://t…
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 6
Total Words: 10508
Unqiue Words: 3096

2.165 Mikeys
#2. Towards Characterizing and Limiting Information Exposure in DNN Layers
Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Andrea Cavallaro, Hamed Haddadi
Pre-trained Deep Neural Network (DNN) models are increasingly used in smartphones and other user devices to enable prediction services, leading to potential disclosures of (sensitive) information from training data captured inside these models. Based on the concept of generalization error, we propose a framework to measure the amount of sensitive information memorized in each layer of a DNN. Our results show that, when considered individually, the last layers encode a larger amount of information from the training data compared to the first layers. We find that, while the neuron of convolutional layers can expose more (sensitive) information than that of fully connected layers, the same DNN architecture trained with different datasets has similar exposure per layer. We evaluate an architecture to protect the most sensitive layers within the memory limits of Trusted Execution Environment (TEE) against potential white-box membership inference attacks without the significant computational overhead.
more | pdf | html
Figures
None.
Tweets
BrundageBot: Towards Characterizing and Limiting Information Exposure in DNN Layers. Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Andrea Cavallaro, and Hamed Haddadi https://t.co/nP6gFNr0iS
arxiv_cs_LG: Towards Characterizing and Limiting Information Exposure in DNN Layers. Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Andrea Cavallaro, and Hamed Haddadi https://t.co/b47JeJAZPG
Memoirs: Towards Characterizing and Limiting Information Exposure in DNN Layers. https://t.co/revYYYuVOx
Github

runs several layers of a deep learning model in TrustZone

Repository: darknetp
User: mofanv
Language: C
Stargazers: 0
Subscribers: 0
Forks: 0
Open Issues: 1
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 5
Total Words: 3508
Unqiue Words: 1331

2.088 Mikeys
#3. Local Distribution Obfuscation via Probability Coupling
Yusuke Kawamoto, Takao Murakami
We introduce a general model for the local obfuscation of probability distributions and investigate its theoretical properties. Specifically, we relax a notion of distribution privacy by generalizing it to divergence, and investigate local obfuscation mechanisms that provide the divergence distribution privacy. To provide f-divergence distribution privacy, we prove that the perturbation noise should be added proportionally to the Earth mover's distance between the probability distributions that we want to make indistinguishable. Furthermore, we introduce a local obfuscation mechanism, which we call a coupling mechanism, that provides divergence distribution privacy while optimizing the utility of obfuscated data by using exact/approximate auxiliary information on the input distributions we want to protect.
more | pdf | html
Figures
None.
Tweets
dbworld_: https://t.co/e4GvkIu6ZH Local Distribution Obfuscation via Probability Coupling. (arXiv:1907.05991v1 [https://t.co/iAlILLV0QC]) #databases
arxiv_cs_LG: Local Distribution Obfuscation via Probability Coupling. Yusuke Kawamoto and Takao Murakami https://t.co/nz9rOoPVsy
Memoirs: Local Distribution Obfuscation via Probability Coupling. https://t.co/ZB8dvXtlKm
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 9434
Unqiue Words: 1700

2.071 Mikeys
#4. Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers
S Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen
In this paper, we build a speech privacy attack that exploits speech reverberations generated from a smartphone's inbuilt loudspeaker captured via a zero-permission motion sensor (accelerometer). We design our attack, called Spearphone2, and demonstrate that speech reverberations from inbuilt loudspeakers, at an appropriate loudness, can impact the accelerometer, leaking sensitive information about the speech. In particular, we show that by exploiting the affected accelerometer readings and carefully selecting feature sets along with off-the-shelf machine learning techniques, Spearphone can successfully perform gender classification (accuracy over 90%) and speaker identification (accuracy over 80%). In addition, we perform speech recognition and speech reconstruction to extract more information about the eavesdropped speech to an extent. Our work brings to light a fundamental design vulnerability in many currently-deployed smartphones, which may put people's speech privacy at risk while using the smartphone in the loudspeaker...
more | pdf | html
Figures
Tweets
mobilesecurity_: Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers #MobileSecurity [PAPER] https://t.co/2grpTo7Aw6 https://t.co/MvWQzH2tbr
cynicalsecurity: S. Abhishek Anand et al., “Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers” [... can successfully perform gender classification (accuracy over 90%) and speaker identification (accuracy over 80%)…] https://t.co/QWKEFIjlQo
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 5
Total Words: 13281
Unqiue Words: 3302

2.034 Mikeys
#5. Stateful Detection of Black-Box Adversarial Attacks
Steven Chen, Nicholas Carlini, David Wagner
The problem of adversarial examples, evasion attacks on machine learning classifiers, has proven extremely difficult to solve. This is true even when, as is the case in many practical settings, the classifier is hosted as a remote service and so the adversary does not have direct access to the model parameters. This paper argues that in such settings, defenders have a much larger space of actions than have been previously explored. Specifically, we deviate from the implicit assumption made by prior work that a defense must be a stateless function that operates on individual examples, and explore the possibility for stateful defenses. To begin, we develop a defense designed to detect the process of adversarial example generation. By keeping a history of the past queries, a defender can try to identify when a sequence of queries appears to be for the purpose of generating an adversarial example. We then introduce query blinding, a new class of attacks designed to bypass defenses that rely on such a defense approach. We believe...
more | pdf | html
Figures
None.
Tweets
cynicalsecurity: S. Chen et al., “Stateful Detection of Black-Box Adversarial Attacks” […deviate from the implicit assumption made by prior work that a defense must be a stateless function that operates on individual examples… explore… stateful defenses…] https://t.co/mnbIuvpQX0
BrundageBot: Stateful Detection of Black-Box Adversarial Attacks. Steven Chen, Nicholas Carlini, and David Wagner https://t.co/irsZW4q8XF
arxivml: "Stateful Detection of Black-Box Adversarial Attacks", Steven Chen, Nicholas Carlini, David Wagner https://t.co/Ylz4EvLHn1
arxiv_cs_LG: Stateful Detection of Black-Box Adversarial Attacks. Steven Chen, Nicholas Carlini, and David Wagner https://t.co/DMfcLI3Kpl
Memoirs: Stateful Detection of Black-Box Adversarial Attacks. https://t.co/bEU1yJMVY5
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 0
Unqiue Words: 0

2.023 Mikeys
#6. A Survey on Zero Knowledge Range Proofs and Applications
Eduardo Morais, Tommy Koens, Cees van Wijk, Aleksei Koren
In last years, there has been an increasing effort to leverage Distributed Ledger Technology (DLT), including blockchain. One of the main topics of interest, given its importance, is the research and development of privacy mechanisms, as for example is the case of Zero Knowledge Proofs (ZKP). ZKP is a cryptographic technique that can be used to hide information that is put into the ledger, while still allowing to perform validation of this data. In this work we describe different strategies to construct Zero Knowledge Range Proofs (ZKRP), as for example the scheme proposed by Boudot in 2001; the one proposed in 2008 by Camenisch et al, and Bulletproofs, proposed in 2017. We also compare these strategies and discuss possible use cases. Since Bulletproofs is the most efficient construction, we will give a detailed description of its algorithms and optimizations. Bulletproofs is not only more efficient than previous schemes, but also avoids the trusted setup, which is a requirement that is not desirable in the context of Distributed...
more | pdf | html
Figures
None.
Tweets
cynicalsecurity: E. Morais et al., “A Survey on Zero Knowledge Range Proofs and Applications” […describe different strategies to construct Zero Knowledge Range Proofs (ZKRP), ... Boudot in 2001; … in 2008 by Camenisch et al, and Bulletproofs, proposed in 2017…] https://t.co/LARUP9TEDL
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 0
Unqiue Words: 0

2.012 Mikeys
#7. CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs
Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici
Using the keyboard LEDs to send data optically was proposed in 2002 by Loughry and Umphress [1] (Appendix A). In this paper we extensively explore this threat in the context of a modern cyber-attack with current hardware and optical equipment. In this type of attack, an advanced persistent threat (APT) uses the keyboard LEDs (Caps-Lock, Num-Lock and Scroll-Lock) to encode information and exfiltrate data from airgapped computers optically. Notably, this exfiltration channel is not monitored by existing data leakage prevention (DLP) systems. We examine this attack and its boundaries for today's keyboards with USB controllers and sensitive optical sensors. We also introduce smartphone and smartwatch cameras as components of malicious insider and 'evil maid' attacks. We provide the necessary scientific background on optical communication and the characteristics of modern USB keyboards at the hardware and software level, and present a transmission protocol and modulation schemes. We implement the exfiltration malware, discuss its...
more | pdf | html
Figures
Tweets
cynicalsecurity: M. Guri et al.,”CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs” […examine this attack and its boundaries for today's keyboards...introduce smartphone and smartwatch cameras as components of malicious insider… attacks…] https://t.co/TOEOFjRGXo
mortendahlcs: I'm a sucker for these papers: "data can be leaked from air-gapped computers via the keyboard LEDs at a maximum bit rate of 3000 bit/sec per LED given a light sensor as a receiver, and more than 120 bit/sec if smartphones are used." https://t.co/9xRXkUmIeQ
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 7664
Unqiue Words: 2371

2.004 Mikeys
#8. A Federated Lightweight Authentication Protocol for the Internet of Things
Maria L. B. A. Santos, Jessica C. Carneiro, Antonio M. R. Franco, Fernando A. Teixeira, Marco A. Henriques, Leonardo B. Oliveira
Considering the world's IoT development and market, it is necessary to guarantee the security of the developed IoT applications as well as the privacy of their end users. In this sense, Federated Identity Management (FIdM) systems can be of great help as they improve user authentication and privacy. In this paper, we claim that traditional FIdM are mostly cumbersome and then ill-suited for IoT. As a solution to this problem, we come up with a federated identity authentication protocol exclusively tailored to IoT. Federated Lightweight Authentication of Things (FLAT), our solution, replaces weighty protocols and asymmetric cryptographic primitives used in traditional FIdM by lighter ones. For instance, FLAT synergistically combines symmetric cryptosystems and Implicit Certificates. The results show that FLAT can reduce the data exchange overhead by around 31% when compared to a baseline solution. FLAT's Client is also more efficient than the baseline solution in terms of data transmitted, data received, total data exchange, and...
more | pdf | html
Figures
None.
Tweets
arxiv_org: A Federated Lightweight Authentication Protocol for the Internet of Things. https://t.co/Zq2sgKVCAj https://t.co/cUxaBwQMmf
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 6
Total Words: 0
Unqiue Words: 0

2.004 Mikeys
#9. Summary: Multi-modal Biometric-based Implicit Authentication of Wearable Device Users
Sudip Vhaduri, Christian Poellabauer
The Internet of Things (IoT) is increasingly empowering people with an interconnected world of physical objects ranging from smart buildings to portable smart devices such as wearables. With recent advances in mobile sensing, wearables have become a rich collection of portable sensors and are able to provide various types of services including tracking of health and fitness, making financial transactions, and unlocking smart locks and vehicles. Most of these services are delivered based on users' confidential and personal data, which are stored on these wearables. Existing explicit authentication approaches (i.e., PINs or pattern locks) for wearables suffer from several limitations, including small or no displays, risk of shoulder surfing, and users' recall burden. Oftentimes, users completely disable security features out of convenience. Therefore, there is a need for a burden-free (implicit) authentication mechanism for wearable device users based on easily obtainable biometric data. In this paper, we present an implicit...
more | pdf | html
Figures
None.
Tweets
arxiv_cshc: Summary: Multi-modal Biometric-based Implicit Authentication of Wearable Device Users https://t.co/xY6FMViRo7
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 0
Unqiue Words: 0

1.995 Mikeys
#10. Towards a Verified Model of the Algorand Consensus Protocol in Coq
Musab A. Alturki, Jing Chen, Victor Luchangco, Brandon Moore, Karl Palmskog, Lucas Peña, Grigore Roşu
The Algorand blockchain is a secure and decentralized public ledger based on pure proof of stake rather than proof of work. At its core it is a novel consensus protocol with exactly one block certified in each round: that is, the protocol guarantees that the blockchain does not fork. In this paper, we report on our effort to model and formally verify the Algorand consensus protocol in the Coq proof assistant. Similar to previous consensus protocol verification efforts, we model the protocol as a state transition system and reason over reachable global states. However, in contrast to previous work, our model explicitly incorporates timing issues (e.g., timeouts and network delays) and adversarial actions, reflecting a more realistic environment faced by a public blockchain. Thus far, we have proved asynchronous safety of the protocol: two different blocks cannot be certified in the same round, even when the adversary has complete control of message delivery in the network. We believe that our model is sufficiently general and other...
more | pdf | html
Figures
None.
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 7
Total Words: 2681
Unqiue Words: 1018

About

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 158,360 papers.

Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Categories
All
Astrophysics
Cosmology and Nongalactic Astrophysics
Earth and Planetary Astrophysics
Astrophysics of Galaxies
High Energy Astrophysical Phenomena
Instrumentation and Methods for Astrophysics
Solar and Stellar Astrophysics
Condensed Matter
Disordered Systems and Neural Networks
Mesoscale and Nanoscale Physics
Materials Science
Other Condensed Matter
Quantum Gases
Soft Condensed Matter
Statistical Mechanics
Strongly Correlated Electrons
Superconductivity
Computer Science
Artificial Intelligence
Hardware Architecture
Computational Complexity
Computational Engineering, Finance, and Science
Computational Geometry
Computation and Language
Cryptography and Security
Computer Vision and Pattern Recognition
Computers and Society
Databases
Distributed, Parallel, and Cluster Computing
Digital Libraries
Discrete Mathematics
Data Structures and Algorithms
Emerging Technologies
Formal Languages and Automata Theory
General Literature
Graphics
Computer Science and Game Theory
Human-Computer Interaction
Information Retrieval
Information Theory
Machine Learning
Logic in Computer Science
Multiagent Systems
Multimedia
Mathematical Software
Numerical Analysis
Neural and Evolutionary Computing
Networking and Internet Architecture
Other Computer Science
Operating Systems
Performance
Programming Languages
Robotics
Symbolic Computation
Sound
Software Engineering
Social and Information Networks
Systems and Control
Economics
Econometrics
General Economics
Theoretical Economics
Electrical Engineering and Systems Science
Audio and Speech Processing
Image and Video Processing
Signal Processing
General Relativity and Quantum Cosmology
General Relativity and Quantum Cosmology
High Energy Physics - Experiment
High Energy Physics - Experiment
High Energy Physics - Lattice
High Energy Physics - Lattice
High Energy Physics - Phenomenology
High Energy Physics - Phenomenology
High Energy Physics - Theory
High Energy Physics - Theory
Mathematics
Commutative Algebra
Algebraic Geometry
Analysis of PDEs
Algebraic Topology
Classical Analysis and ODEs
Combinatorics
Category Theory
Complex Variables
Differential Geometry
Dynamical Systems
Functional Analysis
General Mathematics
General Topology
Group Theory
Geometric Topology
History and Overview
Information Theory
K-Theory and Homology
Logic
Metric Geometry
Mathematical Physics
Numerical Analysis
Number Theory
Operator Algebras
Optimization and Control
Probability
Quantum Algebra
Rings and Algebras
Representation Theory
Symplectic Geometry
Spectral Theory
Statistics Theory
Mathematical Physics
Mathematical Physics
Nonlinear Sciences
Adaptation and Self-Organizing Systems
Chaotic Dynamics
Cellular Automata and Lattice Gases
Pattern Formation and Solitons
Exactly Solvable and Integrable Systems
Nuclear Experiment
Nuclear Experiment
Nuclear Theory
Nuclear Theory
Physics
Accelerator Physics
Atmospheric and Oceanic Physics
Applied Physics
Atomic and Molecular Clusters
Atomic Physics
Biological Physics
Chemical Physics
Classical Physics
Computational Physics
Data Analysis, Statistics and Probability
Physics Education
Fluid Dynamics
General Physics
Geophysics
History and Philosophy of Physics
Instrumentation and Detectors
Medical Physics
Optics
Plasma Physics
Popular Physics
Physics and Society
Space Physics
Quantitative Biology
Biomolecules
Cell Behavior
Genomics
Molecular Networks
Neurons and Cognition
Other Quantitative Biology
Populations and Evolution
Quantitative Methods
Subcellular Processes
Tissues and Organs
Quantitative Finance
Computational Finance
Economics
General Finance
Mathematical Finance
Portfolio Management
Pricing of Securities
Risk Management
Statistical Finance
Trading and Market Microstructure
Quantum Physics
Quantum Physics
Statistics
Applications
Computation
Methodology
Machine Learning
Other Statistics
Statistics Theory
Feedback
Online
Stats
Tracking 158,360 papers.