Advances in Cybersecurity and Cryptography

The field of cybersecurity and cryptography is rapidly evolving, with a focus on developing innovative solutions to protect against increasingly sophisticated threats. Recent research has explored the use of machine learning and artificial intelligence to enhance intrusion detection systems and prevent attacks. Additionally, there has been a significant emphasis on developing secure and efficient cryptographic protocols, including homomorphic encryption and private information retrieval. Noteworthy papers in this area include the proposal of a novel backdoor attack on object detection in machine learning-based advanced driver assistance systems, and the development of a unified impartial-game framework for RSA and AES. Furthermore, research has also focused on improving the security and privacy of various systems, including IoT networks, DNS, and cloud computing.

Sources

ShrinkBox: Backdoor Attack on Object Detection to Disrupt Collision Avoidance in Machine Learning-based Advanced Driver Assistance Systems

How to Copy-Protect Malleable-Puncturable Cryptographic Functionalities Under Arbitrary Challenge Distributions

Virtual local area network over HTTP for launching an insider attack

On the Security of a Code-Based PIR Scheme

Enhancing IoT Intrusion Detection Systems through Adversarial Training

Product-Congruence Games: A Unified Impartial-Game Framework for RSA ($\phi$-MuM) and AES (poly-MuM)

Sparse Regression Codes for Secret Key Agreement: Achieving Strong Secrecy and Near-Optimal Rates for Gaussian Sources

Collusion Resistant DNS With Private Information Retrieval

Characterizing the Sensitivity to Individual Bit Flips in Client-Side Operations of the CKKS Scheme

Intelligent ARP Spoofing Detection using Multi-layered Machine Learning (ML) Techniques for IoT Networks

HexaMorphHash HMH- Homomorphic Hashing for Secure and Efficient Cryptographic Operations in Data Integrity Verification

Leveraging Trustworthy AI for Automotive Security in Multi-Domain Operations: Towards a Responsive Human-AI Multi-Domain Task Force for Cyber Social Security

Privacy-Preserving Anonymization of System and Network Event Logs Using Salt-Based Hashing and Temporal Noise

Malleability-Resistant Encrypted Control System with Disturbance Compensation and Real-Time Attack Detection

Polynomial Lattices for the BIKE Cryptosystem

Built with on top of