Zobrazeno 1 - 10
of 3 488
pro vyhledávání: '"D.4.6"'
Our work aims to minimize interaction in secure computation due to the high cost and challenges associated with communication rounds, particularly in scenarios with many clients. In this work, we revisit the problem of secure aggregation in the singl
Externí odkaz:
http://arxiv.org/abs/2410.22303
The audio watermarking technique embeds messages into audio and accurately extracts messages from the watermarked audio. Traditional methods develop algorithms based on expert experience to embed watermarks into the time-domain or transform-domain of
Externí odkaz:
http://arxiv.org/abs/2409.19627
Ransomware and other forms of malware cause significant financial and operational damage to organizations by exploiting long-standing and often difficult-to-detect software vulnerabilities. To detect vulnerabilities such as buffer overflows in compil
Externí odkaz:
http://arxiv.org/abs/2409.17513
To address unfairness issues in federated learning (FL), contemporary approaches typically use frequent model parameter updates and transmissions between the clients and server. In such a process, client-specific information (e.g., local dataset size
Externí odkaz:
http://arxiv.org/abs/2409.09532
Autor:
Otal, Hakan T., Canbaz, M. Abdullah
The rapid evolution of cyber threats necessitates innovative solutions for detecting and analyzing malicious activity. Honeypots, which are decoy systems designed to lure and interact with attackers, have emerged as a critical component in cybersecur
Externí odkaz:
http://arxiv.org/abs/2409.08234
Autor:
Güldenring, Benjamin, Roth, Volker
Phishing websites are a common phenomenon among Tor onion services, and phishers exploit that it is tremendously difficult to distinguish phishing from authentic onion domain names. Operators of onion services devised several strategies to protect th
Externí odkaz:
http://arxiv.org/abs/2408.07787
Autor:
Tripunitara, Mahesh
Bottom-up role-mining is the determination of a set of roles given as input a set of users and the permissions those users possess. It is well-established in the research literature, and in practice, as an important problem in information security. A
Externí odkaz:
http://arxiv.org/abs/2407.15278
As emerging software vulnerabilities continuously threaten enterprises and Internet services, there is a critical need for improved security research capabilities. This paper introduces the Security Exploit Telemetry Collection (SETC) framework - an
Externí odkaz:
http://arxiv.org/abs/2406.05942
Autor:
Wollman, Alex, Hastings, John
Unikernels, an evolution of LibOSs, are emerging as a virtualization technology to rival those currently used by cloud providers. Unikernels combine the user and kernel space into one "uni"fied memory space and omit functionality that is not necessar
Externí odkaz:
http://arxiv.org/abs/2406.01872
Detecting vulnerabilities within compiled binaries is challenging due to lost high-level code structures and other factors such as architectural dependencies, compilers, and optimization options. To address these obstacles, this research explores vul
Externí odkaz:
http://arxiv.org/abs/2405.20611