, 101 tweets, 33 min read Read on Twitter
Am about to drop the backlog of arXiv & IACR papers for the past few weeks. If you are not interested mute this thread now :)
T. Xie et al. “The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures” […study of exploring security issues of operational Wi-Fi calling services in three major U.S. operators’…using commodity devices…]

arxiv.org/abs/1811.11274
B. Gulmezoglu et al., “Undermining User Privacy on Mobile Devices Using AI” […we show that these inference attacks are... more practical when combined with… AI techniques...we focus on profiling the activity in the last-level cache of ARM processors…]

arxiv.org/abs/1811.11218
M. Maass et al., “On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market” [… how organizations react to… public "naming and shaming" as an incentive for improvement…]

arxiv.org/abs/1811.12775
P. Gadient et al., “Security Code Smells in Android ICC” [… we have reviewed related research, and identified avoidable ICC vulnerabilities in Android-run devices and the security code smells that indicate their presence …]

arxiv.org/abs/1811.12713
A. Jafari and A. Rasoolzadegan, “Security Patterns: A Systematic Mapping Study” […Security patterns are a means to encapsulate and communicate proven security solutions…systematic mapping study of relevant literature from 1997 until the end of 2017…]

arxiv.org/abs/1811.12715
M. Singh et al., “Recognizing Disguised Faces in the Wild” […a novel Disguised Faces in the Wild (DFW) dataset is proposed which contains over 11000 images of 1000 identities with different types of disguise accessories…]

arxiv.org/abs/1811.08837
A. Haque et al., “Measuring Depression Symptom Severity from Spoken Language and 3D Facial Expressions” […we present a machine learning method for measuring the severity of depressive symptoms…]

arxiv.org/abs/1811.08592
Y. Xiang et al., “Smart wing rotation and ingenious leading edge vortex control modulate the unconventional forces during insects flights” […By analyzing the real wing kinematics of fruit flies, we found that the wing rotation is smart modulated…]

arxiv.org/abs/1811.05275
H. Fukaya, “Why is quantum gravity so difficult (compared to QCD)?” […In this essay we try to treat the gravity as one of many gauge theories, and discuss how it is special and why it is difficult to quantize.]

arxiv.org/abs/1811.11577
M. Streif et al., “Solving Quantum Chemistry Problems with a D-Wave Quantum Annealer” […In this paper we apply a mapping...from a quantum chemistry Hamiltonian to an Ising spin glass formulation and find the ground state energy with a quantum annealer…]

arxiv.org/abs/1811.05256
A. Drukier et al., “Paleo-detectors: Searching for Dark Matter with Ancient Minerals” […paleo-detectors, one would search for the persistent traces left by dark matter-nucleon interactions in ancient minerals…]

arxiv.org/abs/1811.06844
E. Ronen et al., “The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations” […most implementations are still vulnerable to several novel types of attack based on leakage from various microarchitectural side channels…]

eprint.iacr.org/2018/1173
R. Borgaonkar et al., “New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols” […new privacy attack against all variants of the AKA protocol, including 5G AKA, that breaches subscriber privacy more severely than known location privacy attacks do…]

eprint.iacr.org/2018/1175
B. Im et al., “An Historical Analysis of the SEAndroid Policy Evolution” […we perform a measurement study on the SEAndroid repository to understand the evolution of these policies…]

arxiv.org/abs/1812.00920
R. Bhalerao et al., “Towards Automatic Discovery of Cybercrime Supply Chains” […language-agnostic method to automatically extract supply chains from cybercrime forum posts…identify 36% and 58% relevant chains within major English and Russian forums…]

arxiv.org/abs/1812.00381
G. Dessouky et al., “When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs” […microarchitectural security from a hardware designer's perspective by reviewing the existing approaches to detect hw vulns during the design phase…]

arxiv.org/abs/1812.00197
V. Manes et al., “Fuzzing: Art, Science, and Engineering” […To help preserve and bring coherence to the vast literature of fuzzing, this paper presents a unified, general-purpose model of fuzzing together with a taxonomy of the current literature…]

arxiv.org/abs/1812.00140
J. Sousa et al., “Efficient and Secure Outsourcing of Genomic Data Storage” […privacy-preserving algorithm for fully outsourcing storage of large genomic data files to a public cloud & enable researchers to efficiently search for variants of interest…]

eprint.iacr.org/2017/228
616 papers to go...
K. Kafle et al., “A Study of Data Store-based Home Automation”, […we perform a systematic security evaluation of Google's Nest and Philips Hue, that implement home automation "routines”…via manipulation of state variables in a centralized data store]

arxiv.org/abs/1812.01597
M. Wahab et al., “A small and adaptive coprocessor for information flow tracking in ARM SoCs” […DIFT for multi-threaded software, virtual memory protection… and Linux kernel support using an information flow monitor called RFBlare…]

arxiv.org/abs/1812.01541
I. Fouad et al., “Tracking the Pixels: Detecting Web Trackers via Analyzing Invisible Pixels” […we propose an alternative solution to detect trackers by analyzing behavior of invisible pixels that are perfect suspects for tracking…]

arxiv.org/abs/1812.01514
J. Wang et al., “Superion: Grammar-Aware Greybox Fuzzing” […we propose a grammar-aware coverage-based greybox fuzzing approach to fuzz programs that process structured inputs…]

arxiv.org/abs/1812.01197
J. Xu and B. Livshits, “The Anatomy of a Cryptocurrency Pump-and-Dump Scheme” […a case study of a recent pump-and-dump event, investigate 220 pump-and-dump activities organized in Telegram channels from July 21, 2018 to November 18, 2018…]

arxiv.org/abs/1811.10109
S. Mozafari and B. Meyer, “Efficient Performance Evaluation of Multi-core SIMT Processors with Hot Redundancy”

sci-hub.se/10.1109/TETC.2…
B. Cozzi et al., “OLT(RE)2: an On-Line on-demand Testing approach for permanent Radiation Effects in REconfigurable systems“ [...an on-line… approach to test permanent faults induced by radiation in reconfigurable systems used in space missions…]

sci-hub.se/10.1109/TETC.2…
J. Uesato et al, “Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures” […evaluating learning systems in safety critical domains such as autonomous driving, where failures can have catastrophic consequences…]

arxiv.org/abs/1812.01647
S. Sathya et al., “A Review of Homomorphic Encryption Libraries for Secure Computation” […we provide a survey of various libraries for homomorphic encryption…]

arxiv.org/abs/1812.02428
M. Kristensen, “How to find MH370?” […We discuss the scientific difficulties with locating the plane through satellite data and develop an improved analysis using least square curve fitting of analytical non-Euclidean route equations…]

arxiv.org/abs/1811.09315
R. Chen, “Xformer 10: The Atari 800 emulator has gotten a huge update” [via “The Old New Thing”]

…Darek Mihocka and fellow Atari 8-bit developer Danny Miller have released Xformer 10, a massive revamp of their Xformer Atari 800 emulator…

blogs.msdn.microsoft.com/oldnewthing/20…
K. Bhargavan and G. Laurent, “On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN” […we demonstrate two concrete attacks that exploit collisions on short block ciphers…]

eprint.iacr.org/2016/798
A. Gomez-Villa et al., “Convolutional Neural Networks Deceived by Visual Illusions” […we show that CNNs trained for image denoising, image deblurring, and computational color constancy are able to replicate the human response to visual illusions…]

arxiv.org/abs/1811.10565
M. Weiss et al., “A Survey of Mobile Computing for the Visually Impaired” […this paper provides a survey of machine-learning based mobile applications and identifies the most relevant applications…]

arxiv.org/abs/1811.10120
A. Adamatzky, “The dry history of liquid computers”, […A liquid can be used to represent signals,actuate mechanical computing devices and to modify signals via chemical reactions…brief overview of liquid based computing devices over hundreds of years…]

arxiv.org/abs/1811.09989
A. Ahmadzadegan et al., “Quantum Shockwave Communication” […scheme to produce shockwaves in quantum fields by means of pretimed emitters…by suitably pre-entangeling the emitters, the shockwave's energy density can be locally modulated and amplified…]

arxiv.org/abs/1811.10606
D. Soulioti et al., “Super resolution imaging through the human skull” […feasibility of human transcranial super-resolution imaging using a geometrical focusing approach to concentrate energy at the region of interest…]

arxiv.org/abs/1811.10653
Y. Roohani et al., “Predicting Language Recovery after Stroke with Convolutional Networks on Stitched MRI” […we only make use of stitched 2-dimensional cross-sections of raw MRI scans in a deep CNN setup to predict language recovery post-stroke…]

arxiv.org/abs/1811.10520
J. Chen et al., “A Container-based DoS Attack-Resilient Control Framework for Real-Time UAV Systems” […a software framework that offers DoS attack-resilient control for real-time UAV systems using containers: ContainerDrone…]

arxiv.org/abs/1812.02834
A. Hinteregger, B. Haslhofer, “An Empirical Analysis of Monero Cross-Chain Traceability” [...Monero is currently mostly immune to known passive attack vectors and resistant to tracking and tracing methods applied to other cryptocurrencies…]

arxiv.org/abs/1812.02808
T. Orekondy et al., “Knockoff Nets: Stealing Functionality of Black-Box Models” […we ask to what extent can an adversary steal functionality of such "victim" models based solely on blackbox interactions: image in, predictions out…]

arxiv.org/abs/1812.02766
I. Abbassi et al., “TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint” […undetectable HTs can be realized with zero impact on the power and area footprint of the original circuit…]

arxiv.org/abs/1812.02770
A. Drozov et al., “Superconductivity at 250 K in lanthanum hydride under high pressures” […we report superconductivity with a record Tc ~ 250 K within the Fm-3m structure of LaH10 at a pressure P ~ 170 GPa…]

arxiv.org/abs/1812.01561
A. Keliris and M. Maniatakos, “ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries” […automates the reverse engineering process for ICS binaries taking into account their unique domain-specific characteristics…]

arxiv.org/abs/1812.03478
T. Nguyen et al., “Intelligence-based Cybersecurity Awareness Training- an Exploratory Project” […new and novel model for conducting cybersecurity training… Powered by IBM Watson Knowledge Studio platform…]

arxiv.org/abs/1812.04234
P. Zuo et al., “Bandwidth and Energy Efficient Image Sharing for Situation Awareness in Disasters” […energy-aware adaptive schemes in AIS to… quantitatively determine the tradeoffs between the quality of computation results and efficiency…]

sci-hub.se/10.1109/TPDS.2…
M. Ansari et al., “Peak Power Management to Meet Thermal Design Power in Fault-Tolerant Embedded Systems“ […we study how the use of passive redundancy (especially for Triple Modular redundancy) can violate TDP on multicore platforms…]

sci-hub.se/10.1109/TPDS.2…
S. Yin et al., “Parana: A Parallel Neural Architecture Considering Thermal Problem of 3D Stacked Memory” […we propose a neural processor called Parana for hybrid-NN acceleration in consideration of thermal problem of 3D DRAM…]

sci-hub.se/10.1109/TPDS.2…
A. Lebre et al., “Putting the Next 500 VM Placement Algorithms to the Acid Test” […new placement algorithms are thus continuously being proposed without actually identifying their benefits with respect to the state of the art…]

sci-hub.se/10.1109/TPDS.2…
A. Barenghi et al., “Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree” […we analyze the X.509 standard and provide a grammar description of it amenable to the automated generation of a parser with strong termination guarantees…]
arxiv.org/abs/1812.04959
S. Gueron et al., “AES-GCM-SIV: Specification and Analysis” (revised 14 DEC 2018)

eprint.iacr.org/2017/168
R. Howl et al., “Exploring the unification of quantum theory and general relativity with a Bose-Einstein condensate” […we consider using a Bose-Einstein condensate (BEC) to search for clues…]

arxiv.org/abs/1812.04630
G. Chiribella and H. Kristjánsson, “A second-quantised Shannon theory” […we propose a second level of quantisation where both the information and its propagation in spacetime is treated quantum mechanically…]

arxiv.org/abs/1812.05292
A. Madaan et al., “A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines” […new socio-technical systems, which we term Cyber-Physical Social Machines…and considers the associated challenges of security and privacy…]

arxiv.org/abs/1809.05904
L. Lomelí, “Langlands Program and Ramanujan Conjecture: a survey” […We look at modern approaches to the generalized Ramanujan conjecture, which is an open problem over number fields, and present known cases over function fields…]

arxiv.org/abs/1812.05203
M. Pęśko et al., “Comixify: Transform video into a comics” […we propose a solution¹ to transform a video into a comics…]

arxiv.org/abs/1812.03473

__
¹ comixify.ii.pw.edu.pl
A. Sen et al., “Training Set Camouflage” […We introduce a form of steganography in the domain of machine learning which we call training set camouflage…]

arxiv.org/abs/1812.05725
C. Kuhn et al., “On Privacy Notion in Anonymous Communication” […we formalize privacy goals as notions and identify their building blocks…]

arxiv.org/abs/1812.05638
A. Garcia-Recuero et al., “Trollslayer: Crowdsourcing and Characterization of Abusive Birds in Twitter” […custom crawler that we use to collect a new dataset from Twitter with the aim of characterizing the nature of abusive users in the wild…]

arxiv.org/abs/1812.06156
L. De Meyer et al., “M&M: Masks and Macs against Physical Attacks” […we introduce a new combined countermeasure M&M that combines Masking with information-theoretic MAC tags and infective computation…]

eprint.iacr.org/2018/1195
N. Belleville et al., “Automated software protection for the masses against side-channel attacks” […protection mechanism is based on code polymorphism…]

eprint.iacr.org/2018/1197
T. Ming et al., “How fish power swimming: a 3D computational fluid dynamics study” […we use a 3D CFD model coupled to the motion of the fish with prescribed deformation to study the basic mechanical quantities along the fish's body…]

arxiv.org/abs/1812.02410
M. Guarnieri et al., “SPECTECTOR: Principled Detection of Speculative Information Flows” […We develop SPECTECTOR, an algorithm based on symbolic execution for automatically proving speculative non-interference, or detecting violations…]

arxiv.org/abs/1812.08639
I. Learmonth and K. Loesing, “Towards Modernising Data Collection and Archive for the Tor Network” […CollecTor is developed by Tor Project's Metrics Team for the purpose of archiving data relating to the public Tor network…]

arxiv.org/abs/1812.08429
Y. Li and T. Wang, “Next Hit Predictor - Self-exciting Risk Modeling for Predicting Next Locations of Serial Crimes” […a predictive model… that finds the most likely location of the next serial crime via a carefully designed risk model…]

arxiv.org/abs/1812.05224
I. Korkin, “Divide et Impera: MemoryRanger Runs Drivers in Isolated Kernel Spaces” […The proposed hypervisor-based system (MemoryRanger) tackles this issue by executing drivers in separate kernel enclaves with specific memory attributes…]

arxiv.org/abs/1812.09920
T. Bourgeat et al., “MI6: Secure Enclaves in a Speculative Out-of-Order Processor” […an architecture with an aggressive, speculative out-of-order processor capable of providing secure enclaves…]

arxiv.org/abs/1812.09822
N.F. Bogachenko, “The Equivalent Conversions of the Role-Based Access Control Model” […The algorithms of a local optimization of the RBAC model are defined and justified…]

arxiv.org/abs/1812.09721
K. Redmond et al., “A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis” […a joint learning approach to generating instruction embeddings … semantics (and) also their semantic relationships…]

arxiv.org/abs/1812.09652
V. Vilches et al., “Volatile memory forensics for the Robot Operating System” […This article discusses volatile memory forensics for the Robot Operating System (ROS)…]

arxiv.org/abs/1812.09492
R. Gao and K. Grauman, “2.5D Visual Sound” […We propose to convert common monaural audio into binaural audio by leveraging video…we show the self-supervised representation… benefits audio-visual source separation¹…]

arxiv.org/abs/1812.04204
__
¹ vision.cs.utexas.edu/projects/2.5D_…
Y. Cao et al., “Quantum Chemistry in the Age of Quantum Computing” […manipulating quantum states of matter, quantum computers promise to efficiently deliver accurate results for many important problems in quantum chemistry…]

arxiv.org/abs/1812.09976
T. Karras et al., “A Style-Based Generator Architecture for Generative Adversarial Networks” […We propose an alternative generator architecture for generative adversarial networks, borrowing from style transfer literature…]

arxiv.org/abs/1812.04948
B. Zhang et al., “The Entropy of Artificial Intelligence and a Case Study of AlphaZero from Shannon's Perspective” […the concept of intelligence entropy and the Unified Intelligence-Communication Model is proposed…]

arxiv.org/abs/1812.05794
P. Saha et al., “Hateminers : Detecting Hate speech against Women”, […We present the machine learning models¹ developed for the Automatic Misogyny Identification (AMI) shared task at EVALITA 2018…]

arxiv.org/abs/1812.06700
__
¹ github.com/punyajoy/Hatem…
I. Lebedev et al., “Sanctorum: A lightweight security monitor for secure enclaves” […small trusted code base, consisting of a generic enclave-capable system, which is sufficient to implement secure enclaves akin to the primitive offered by Intel's SGX…]

arxiv.org/abs/1812.10605
M. Robinson et al., “Developing Cyber Buffer Zones” […practicalities of starting up a cyber peacekeeping component and setting up a Cyber Buffer Zone (CBZ)...]

arxiv.org/abs/1812.11900
V. Duddu et al., “Stealing Neural Networks via Timing Side Channels” […black box neural network extraction attack by exploiting the timing side channels to infer the depth of the network has been proposed…]

arxiv.org/abs/1812.11720
G. Martelloni et al., “Pattern Analysis of World Conflicts over the past 600 years” […We analyze the database prepared by Brecke (Brecke 2011) for violent conflict, covering some 600 years of human history…]

arxiv.org/abs/1812.08071
H. Yu et al., “Forgetting in order to Remember Better” […we use a simple mathematical model to explain the mechanism of forgetting based on rearrangement inequality and get a general formalism for short-term and long-term memory…]

arxiv.org/abs/1812.05668
T. Özkan and H.-W. Lin, “Quantum 3: Learning QCD through Intuitive Play” […create a QCD game that will raise public interest in QCD, especially among K-12 girls, and increase interest in coding among girls…]

arxiv.org/abs/1901.00022
D. Gruss et al., “Page Cache Attacks”, […We present a new hardware-agnostic side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache…]

arxiv.org/abs/1901.01161
Y. Li et al., “V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing” […we design and implement a vulnerability-oriented evolutionary fuzzing prototype named V-Fuzz, which aims to find bugs efficiently and quickly in a limited time…]

arxiv.org/abs/1901.01142
K. Drakonakis et al., “Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data” […we present LPAuditor, a tool that conducts a comprehensive evaluation of the privacy loss caused by publicly available location metadata…]

arxiv.org/abs/1901.00897
J. Nurse and M. Bada, “The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations” […identifies the platforms that online groups, use to interact, and considers groups as both perpetrators and victims of cybercrime…]

arxiv.org/abs/1901.01914
S. Valizadeh and M. van Dijk, “Toward a Theory of Cyber Attacks” […methodology for analyzing defender-attacker based "games" in which we model such games as Markov models…analyze how defensive and adversarial strategies impact security…]

arxiv.org/abs/1901.01598
M. Morbitzer et al., “Extracting Secrets from Encrypted Virtual Machines” […an approach that allows a malicious hypervisor quick identification and theft of secrets, such as TLS, SSH or FDE keys, from encrypted virtual machines on current SEV hardware…]

arxiv.org/abs/1901.01759
E. Agostini and M. Bernaschi, “BitCracker: BitLocker meets GPUs” […we present a solution, to attempt the decryption, by means of a dictionary attack, of memory units encrypted by BitLocker with a user supplied password or the recovery password…]

arxiv.org/abs/1901.01337
K. Wu and B. Lagesse, “Do You See What I See? Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation”

arxiv.org/abs/1901.02818
M. Bada et al., “Cyber Security Awareness Campaigns: Why do they fail to change behaviour?” […we extract essential components for an awareness campaign as well as factors which can lead to a campaign's success or failure…]

arxiv.org/abs/1901.02672
S. Admati et al., “Wikibook-Bot - Automatic Generation of a Wikipedia Book” […We propose Wikibook-Bot, a machine-learning based technique for automatically generating high quality Wikibooks based on a concept provided by the user…]

arxiv.org/abs/1812.10937
V. Mohanty et al., “Auditing Indian Elections” […Indian Electronic Voting Machines (EVMs) will be fitted with printers that produce Voter-Verifiable Paper Audit Trails (VVPATs) in time for the 2019 general election…]

arxiv.org/abs/1901.03108
T. Krafft et al., “What did you see? Personalization, regionalization and the question of the filter bubble in Google's search engine” [… the risk of algorithm-based filter bubble formation or reinforcement by the leader in the search engine market…]

arxiv.org/abs/1812.10943
A. Dendukuri and K. Luu, “Image Processing in Quantum Computers” […we explore and compare a number of quantum image models and then implement simulate a quantum image using a classical computer…]

arxiv.org/abs/1812.11042
S. Pastrana and G. Suarez-Tangil, “A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth” […we conduct the largest measurement of crypto-mining malware to date, over a period of twelve years from 2007 to 2018…]

arxiv.org/abs/1901.00846
J. Lindsey et al., “A Unified Theory of Early Visual Representations from Retina to Cortex through Anatomically Constrained Deep CNNs”

arxiv.org/abs/1901.00945
Y. Mirsky et al., “CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning”, […we show how an attacker can use deep learning to add or remove evidence of medical conditions from volumetric (3D) medical scans…]

arxiv.org/abs/1901.03597
S. Gorski et al., “ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware” […ACMiner, a framework for evaluating the correctness of Android's access control enforcement through consistency analysis of authorization checks..]

arxiv.org/abs/1901.03603
E. Petagna et al., “Peel the onion: Recognition of Android apps behind the Tor Network” […we show that Tor is vulnerable to app deanonymization attacks on Android devices through network traffic analysis…]

arxiv.org/abs/1901.04434
G. Grispos et al., “A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices”

arxiv.org/abs/1901.03724
Well folks, you are now current with arXiv :)
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Arrigo Triulzi
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!