Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for recent submissions

  • Tue, 10 Feb 2026
  • Mon, 9 Feb 2026
  • Fri, 6 Feb 2026
  • Thu, 5 Feb 2026
  • Wed, 4 Feb 2026

See today's new changes

Total of 189 entries : 1-50 51-100 101-150 151-189
Showing up to 50 entries per page: fewer | more | all

Tue, 10 Feb 2026 (showing first 50 of 58 entries )

[1] arXiv:2602.09015 [pdf, html, other]
Title: CIC-Trap4Phish: A Unified Multi-Format Dataset for Phishing and Quishing Attachment Detection
Fatemeh Nejati, Mahdi Rabbani, Mansur Mirani, Gunjan Piya, Igor Opushnyev, Ali A. Ghorbani, Sajjad Dadkhah
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[2] arXiv:2602.08993 [pdf, html, other]
Title: Reverse Online Guessing Attacks on PAKE Protocols
Eloise Christian, Tejas Gadwalkar, Arthur Azevedo de Amorim, Edward V. Zieglar Jr
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:2602.08870 [pdf, html, other]
Title: ZK-Rollup for Hyperledger Fabric: Architecture and Performance Evaluation
Sania Siddiqui, Neha, Hari Babu K
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[4] arXiv:2602.08798 [pdf, html, other]
Title: CryptoGen: Secure Transformer Generation with Encrypted KV-Cache Reuse
Hedong Zhang, Neusha Javidnia, Shweta Pardeshi, Qian Lou, Farinaz Koushanfar
Comments: 13 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2602.08750 [pdf, html, other]
Title: DyMA-Fuzz: Dynamic Direct Memory Access Abstraction for Re-hosted Monolithic Firmware Fuzzing
Guy Farrelly, Michael Chesser, Seyit Camtepe, Damith C. Ranasinghe
Comments: Accepted to ICSE 2026
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[6] arXiv:2602.08744 [pdf, html, other]
Title: Empirical Evaluation of SMOTE in Android Malware Detection with Machine Learning: Challenges and Performance in CICMalDroid 2020
Diego Ferreira Duarte, Andre Augusto Bortoli
Comments: 20 pages, 5 figures, 4 tables
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:2602.08741 [pdf, html, other]
Title: Large Language Lobotomy: Jailbreaking Mixture-of-Experts via Expert Silencing
Jona te Lintelo, Lichao Wu, Stjepan Picek
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:2602.08668 [pdf, html, other]
Title: Retrieval Pivot Attacks in Hybrid RAG: Measuring and Mitigating Amplified Leakage from Vector Seeds to Graph Expansion
Scott Thornton
Comments: 18 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG)
[9] arXiv:2602.08422 [pdf, html, other]
Title: LLMs + Security = Trouble
Benjamin Livshits
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[10] arXiv:2602.08384 [pdf, html, other]
Title: Towards Real-World Industrial-Scale Verification: LLM-Driven Theorem Proving on seL4
Jianyu Zhang, Fuyuan Zhang, Jiayi Lu, Jilin Hu, Xiaoyi Yin, Long Zhang, Feng Yang, Yongwang Zhao
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2602.08170 [pdf, html, other]
Title: Evasion of IoT Malware Detection via Dummy Code Injection
Sahar Zargarzadeh, Mohammad Islam
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[12] arXiv:2602.08165 [pdf, html, other]
Title: A Transfer Learning Approach to Unveil the Role of Windows Common Configuration Enumerations in IEC 62443 Compliance
Miguel Bicudo, Estevão Rabello, Daniel Menasché, Paulo Segal, Claudio Segal, Anton Kocheturov, Priyanjan Sharma
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:2602.08072 [pdf, html, other]
Title: IssueGuard: Real-Time Secret Leak Prevention Tool for GitHub Issue Reports
Md Nafiu Rahman, Sadif Ahmed, Zahin Wahab, Gias Uddin, Rifat Shahriyar
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[14] arXiv:2602.08023 [pdf, html, other]
Title: CyberExplorer: Benchmarking LLM Offensive Security Capabilities in a Real-World Attacking Simulation Environment
Nanda Rani, Kimberly Milner, Minghao Shao, Meet Udeshi, Haoran Xi, Venkata Sai Charan Putrevu, Saksham Aggarwal, Sandeep K. Shukla, Prashanth Krishnamurthy, Farshad Khorrami, Muhammad Shafique, Ramesh Karri
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[15] arXiv:2602.08014 [pdf, html, other]
Title: ICBAC: an Intelligent Contract-Based Access Control framework for supply chain management by integrating blockchain and federated learning
Sadegh Sohani, Salar Ghazi, Farnaz Kamranfar, Sahar Pilehvar Moakhar, Mohammad Allahbakhsh, Haleh Amintoosi, Kaiwen Zhang
Comments: 19 pages, 6 Figures, 3 Tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[16] arXiv:2602.07936 [pdf, html, other]
Title: Privacy-Preserving Covert Communication Using Encrypted Wearable Gesture Recognition
Tasnia Ashrafi Heya, Sayed Erfan Arefin
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:2602.07918 [pdf, html, other]
Title: CausalArmor: Efficient Indirect Prompt Injection Guardrails via Causal Attribution
Minbeom Kim, Mihir Parmar, Phillip Wallis, Lesly Miculicich, Kyomin Jung, Krishnamurthy Dj Dvijotham, Long T. Le, Tomas Pfister
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Methodology (stat.ME)
[18] arXiv:2602.07878 [pdf, html, other]
Title: Rethinking Latency Denial-of-Service: Attacking the LLM Serving Framework, Not the Model
Tianyi Wang, Huawei Fan, Yuanchao Shu, Peng Cheng, Cong Wang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[19] arXiv:2602.07725 [pdf, html, other]
Title: Leveraging the Power of Ensemble Learning for Secure Low Altitude Economy
Yaoqi Yang, Yong Chen, Jiacheng Wang, Geng Sun, Dusit Niyato, Zhu Han
Comments: 7 pages, 2 figures
Journal-ref: IEEE Communications Magazine, vol. 64, no. 2, pp. 164-171, Feb. 2026
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:2602.07722 [pdf, html, other]
Title: IPBAC: Interaction Provenance-Based Access Control for Secure and Privacy-Aware Systems
Sharif Noor Zisad, Ragib Hasan
Comments: This article is accepted and presented in IEEE Consumer Communications & Networking Conference (CCNC 2026) as a poster
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:2602.07666 [pdf, html, other]
Title: SoK: DARPA's AI Cyber Challenge (AIxCC): Competition Design, Architectures, and Lessons Learned
Cen Zhang, Younggi Park, Fabian Fleischer, Yu-Fu Fu, Jiho Kim, Dongkwan Kim, Youngjoon Kim, Qingxiao Xu, Andrew Chin, Ze Sheng, Hanqing Zhao, Brian J. Lee, Joshua Wang, Michael Pelican, David J. Musliner, Jeff Huang, Jon Silliman, Mikel Mcdaniel, Jefferson Casavant, Isaac Goldthwaite, Nicholas Vidovich, Matthew Lehman, Taesoo Kim
Comments: Version 1.0 (February 2026). Systematization of Knowledge and post-competition analysis of DARPA AIxCC (2023-2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[22] arXiv:2602.07656 [pdf, html, other]
Title: AirCatch: Effectively tracing advanced tag-based trackers
Abhishek Kumar Mishra, Swadeep, Guevara Noubir, Mathieu Cunche
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:2602.07652 [pdf, html, other]
Title: Agent-Fence: Mapping Security Vulnerabilities Across Deep Research Agents
Sai Puppala, Ismail Hossain, Md Jahangir Alam, Yoonpyo Lee, Jay Yoo, Tanzim Ahad, Syed Bahauddin Alam, Sajedul Talukder
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[24] arXiv:2602.07572 [pdf, html, other]
Title: SoK: Credential-Based Trust Management in Decentralized Ledger Systems
Yanna Jiang, Haiyu Deng, Qin Wang, Guangsheng Yu, Xu Wang, Yilin Sai, Shiping Chen, Wei Ni, Ren Ping Liu
Comments: Appear at Trustcom'25 (DOI: https://doi.org/10.1109/Trustcom66490.2025.00197)
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:2602.07517 [pdf, other]
Title: MemPot: Defending Against Memory Extraction Attack with Optimized Honeypots
Yuhao Wang, Shengfang Zhai, Guanghao Jin, Yinpeng Dong, Linyi Yang, Jiaheng Zhang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Databases (cs.DB)
[26] arXiv:2602.07513 [pdf, html, other]
Title: SPECA: Specification-to-Checklist Agentic Auditing for Multi-Implementation Systems -- A Case Study on Ethereum Clients
Masato Kamba, Akiyoshi Sannai
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:2602.07422 [pdf, other]
Title: Secure Code Generation via Online Reinforcement Learning with Vulnerability Reward Model
Tianyi Wu, Mingzhe Du, Yue Liu, Chengran Yang, Terry Yue Zhuo, Jiaheng Zhang, See-Kiong Ng
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[28] arXiv:2602.07398 [pdf, html, other]
Title: AgentSys: Secure and Dynamic LLM Agents Through Explicit Hierarchical Memory Management
Ruoyao Wen, Hao Li, Chaowei Xiao, Ning Zhang
Comments: 21 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[29] arXiv:2602.07379 [pdf, html, other]
Title: Aegis: Towards Governance, Integrity, and Security of AI Voice Agents
Xiang Li, Pin-Yu Chen, Wenqi Wei
Subjects: Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[30] arXiv:2602.07291 [pdf, html, other]
Title: ACORN-IDS: Adaptive Continual Novelty Detection for Intrusion Detection Systems
Sean Fuhrman, Onat Gungor, Tajana Rosing
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:2602.07287 [pdf, html, other]
Title: Patch-to-PoC: A Systematic Study of Agentic LLM Systems for Linux Kernel N-Day Reproduction
Juefei Pu, Xingyu Li, Haonan Li, Zhengchuan Liang, Jonathan Cox, Yifan Wu, Kareem Shehada, Arrdya Srivastav, Zhiyun Qian
Comments: 17 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[32] arXiv:2602.07249 [pdf, html, other]
Title: Beyond Crash: Hijacking Your Autonomous Vehicle for Fun and Profit
Qi Sun, Ahmed Abdo, Luis Burbano, Ziyang Li, Yaxing Yao, Alvaro Cardenas, Yinzhi Cao
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[33] arXiv:2602.07240 [pdf, html, other]
Title: Hydra: Robust Hardware-Assisted Malware Detection
Eli Propp, Seyed Majid Zahedi
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:2602.07200 [pdf, html, other]
Title: BadSNN: Backdoor Attacks on Spiking Neural Networks via Adversarial Spiking Neuron
Abdullah Arafat Miah, Kevin Vu, Yu Bi
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[35] arXiv:2602.07197 [pdf, html, other]
Title: Lite-BD: A Lightweight Black-box Backdoor Defense via Reviving Multi-Stage Image Transformations
Abdullah Arafat Miah, Yu Bi
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:2602.07152 [pdf, other]
Title: Trojans in Artificial Intelligence (TrojAI) Final Report
Kristopher W. Reese, Taylor Kulp-McDowall, Michael Majurski, Tim Blattner, Derek Juba, Peter Bajcsy, Antonio Cardone, Philippe Dessauw, Alden Dima, Anthony J. Kearsley, Melinda Kleczynski, Joel Vasanth, Walid Keyrouz, Chace Ashcraft, Neil Fendley, Ted Staley, Trevor Stout, Josh Carney, Greg Canal, Will Redman, Aurora Schmidt, Cameron Hickert, William Paul, Jared Markowitz, Nathan Drenkow, David Shriver, Marissa Connor, Keltin Grimes, Marco Christiani, Hayden Moore, Jordan Widjaja, Kasimir Gabert, Uma Balakrishnan, Satyanadh Gundimada, John Jacobellis, Sandya Lakkur, Vitus Leung, Jon Roose, Casey Battaglino, Farinaz Koushanfar, Greg Fields, Xihe Gu, Yaman Jandali, Xinqiao Zhang, Akash Vartak, Tim Oates, Ben Erichson, Michael Mahoney, Rauf Izmailov, Xiangyu Zhang, Guangyu Shen, Siyuan Cheng, Shiqing Ma, XiaoFeng Wang, Haixu Tang, Di Tang, Xiaoyi Chen, Zihao Wang, Rui Zhu, Susmit Jha, Xiao Lin, Manoj Acharya, Wenchao Li, Chao Chen
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:2602.07107 [pdf, html, other]
Title: ShallowJail: Steering Jailbreaks against Large Language Models
Shang Liu, Hanyu Pei, Zeyan Liu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[38] arXiv:2602.07090 [pdf, html, other]
Title: Concept-Aware Privacy Mechanisms for Defending Embedding Inversion Attacks
Yu-Che Tsai, Hsiang Hsiao, Kuan-Yu Chen, Shou-De Lin
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[39] arXiv:2602.07073 [pdf, html, other]
Title: Pro-ZD: A Transferable Graph Neural Network Approach for Proactive Zero-Day Threats Mitigation
Nardine Basta, Firas Ben Hmida, Houssem Jmal, Muhammad Ikram, Mohamed Ali Kaafar, Andy Walker
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[40] arXiv:2602.08989 (cross-list from cs.NI) [pdf, html, other]
Title: Zero Trust for Multi-RAT IoT: Trust Boundary Management in Heterogeneous Wireless Network Environments
Jonathan Shelby
Comments: 17 pages, 2 figures, 6 tables
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[41] arXiv:2602.08934 (cross-list from cs.LG) [pdf, html, other]
Title: StealthRL: Reinforcement Learning Paraphrase Attacks for Multi-Detector Evasion of AI-Text Detectors
Suraj Ranganath, Atharv Ramesh
Comments: Expanded version of a workshop submission. Code available
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[42] arXiv:2602.08874 (cross-list from cs.CL) [pdf, other]
Title: Is Reasoning Capability Enough for Safety in Long-Context Language Models?
Yu Fu, Haz Sameen Shahgir, Huanli Gong, Zhipeng Wei, N. Benjamin Erichson, Yue Dong
Comments: 25 pages, 7 figures
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[43] arXiv:2602.08762 (cross-list from cs.LG) [pdf, html, other]
Title: HoGS: Homophily-Oriented Graph Synthesis for Local Differentially Private GNN Training
Wen Xu, Zhetao Li, Yong Xiao, Pengpeng Qiao, Mianxiong Dong, Kaoru Ota
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[44] arXiv:2602.08723 (cross-list from cs.LG) [pdf, html, other]
Title: Data Reconstruction: Identifiability and Optimization with Sample Splitting
Yujie Shen, Zihan Wang, Jian Qian, Qi Lei
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[45] arXiv:2602.08690 (cross-list from cs.LG) [pdf, html, other]
Title: SoK: The Pitfalls of Deep Reinforcement Learning for Cybersecurity
Shae McFadden, Myles Foley, Elizabeth Bates, Ilias Tsingenopoulos, Sanyam Vyas, Vasilios Mavroudis, Chris Hicks, Fabio Pierazzi
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[46] arXiv:2602.08679 (cross-list from cs.LG) [pdf, html, other]
Title: Dashed Line Defense: Plug-And-Play Defense Against Adaptive Score-Based Query Attacks
Yanzhang Fu, Zizheng Guo, Jizhou Luo
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[47] arXiv:2602.08621 (cross-list from cs.LG) [pdf, html, other]
Title: Sparse Models, Sparse Safety: Unsafe Routes in Mixture-of-Experts LLMs
Yukun Jiang, Hai Huang, Mingjie Li, Yage Zhang, Michael Backes, Yang Zhang
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[48] arXiv:2602.08563 (cross-list from cs.LG) [pdf, html, other]
Title: Stateless Yet Not Forgetful: Implicit Memory as a Hidden Channel in LLMs
Ahmed Salem, Andrew Paverd, Sahar Abdelnabi
Comments: Accepted at IEEE SaTML 2026
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[49] arXiv:2602.08449 (cross-list from cs.AI) [pdf, html, other]
Title: When Evaluation Becomes a Side Channel: Regime Leakage and Structural Mitigations for Alignment Assessment
Igor Santos-Grueiro
Comments: 25 pages, 4 figures,
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[50] arXiv:2602.08446 (cross-list from cs.LG) [pdf, html, other]
Title: RIFLE: Robust Distillation-based FL for Deep Model Deployment on Resource-Constrained IoT Networks
Pouria Arefijamal, Mahdi Ahmadlou, Bardia Safaei, Jörg Henkel
Comments: This paper has been accepted for publication in IEEE ICC 2026 and will be indexed in the IEEE Xplore Digital Library
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
Total of 189 entries : 1-50 51-100 101-150 151-189
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status