
2025-08-28 09:34:41
Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication
Onyinye Okoye
https://arxiv.org/abs/2508.19465 https://
Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication
Onyinye Okoye
https://arxiv.org/abs/2508.19465 https://
Practical Physical Layer Authentication for Mobile Scenarios Using a Synthetic Dataset Enhanced Deep Learning Approach
Yijia Guo, Junqing Zhang, Y. -W. Peter Hong
https://arxiv.org/abs/2508.20861
Cell-Free Massive MIMO-Based Physical-Layer Authentication
Isabella W. G. da Silva, Zahra Mobini, Hien Quoc Ngo, Michail Matthaiou
https://arxiv.org/abs/2508.19931 https://
Really grateful for two factor authentication via email. Nothing better than being unable to sign in to your account because your mail provider is having downtime.
Microsoft now has invented the 10 Factor authentication before you get to a teams. Next: You need to photograph your underwear and send it to them.
from my link log —
Cracking the Vault: flaws in authentication, identity, and authorization in HashiCorp Vault.
https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authe…
First-Place Solution to NeurIPS 2024 Invisible Watermark Removal Challenge
Fahad Shamshad, Tameem Bakr, Yahia Shaaban, Noor Hussein, Karthik Nandakumar, Nils Lukas
https://arxiv.org/abs/2508.21072
Addressing Deepfake Issue in Selfie banking through camera based authentication
Subhrojyoti Mukherjee, Manoranjan Mohanty
https://arxiv.org/abs/2508.19714 https://
huh, i just found this. it is clearly llm generated, and thus riddled with inaccuracies and hallucinations. but on first glance, i am very much impressed by the stuff that doesn't immediately jump at me as wrong: https://deepwiki.com/stef/libopaque and
1Kosmos, which provides identity verification and passwordless authentication software, raised a $57M Series B, including a $10M line of credit (Duncan Riley/SiliconANGLE)
https://siliconangle.com/2025/08/12/1kosm…
Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication
Yaser Baseri, Abdelhakim Senhaji Hafid, Dimitrios Makrakis, Hamidreza Fereidouni
https://arxiv.org/abs/2508.18453 …
Haptic-Based User Authentication for Tele-robotic System
Rongyu Yu, Kan Chen, Zeyu Deng, Chen Wang, Burak Kizilkaya, Liying Emma Li
https://arxiv.org/abs/2506.14116
A Survey of Threats Against Voice Authentication and Anti-Spoofing Systems
Kamel Kamel, Keshav Sood, Hridoy Sankar Dutta, Sunil Aryal
https://arxiv.org/abs/2508.16843 https://…
Israeli cyber and computer science experts phished by Iran-linked APT42 https://therecord.media/israel-cyber-experts-computer-scientists-phished-iran
NRXR-ID: Two-Factor Authentication (2FA) in VR Using Near-Range Extended Reality and Smartphones
Aiur Nanzatov, Lourdes Pe\~na-Castillo, Oscar Meruvia-Pastor
https://arxiv.org/abs/2507.05447
zkPHIRE: A Programmable Accelerator for ZKPs over HIgh-degRee, Expressive Gates
Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt B\"unz, Siddharth Garg, Brandon Reagen
https://arxiv.org/abs/2508.16738
"In the grim darkness of the far future, there is only two factor authentication..."
ZK-SERIES: Privacy-Preserving Authentication using Temporal Biometric Data
Daniel Reijsbergen, Eyasu Getahun Chekole, Howard Halim, Jianying Zhou
https://arxiv.org/abs/2506.19393 …
I was wondering why my SMTP configuration wouldn't work. DNS zone looked fine, SSL/TLS settings correct, authentication enabled, yet it wouldn't budge.
Then I had a moment of enlightenment about the mail subdomain having one lone A record instead of two NS records as it should have been.
It's. ALWAYS. DNS. Dammit.
SOMEONE'S GONNA GET HAAAACKED still unpatched after 6 months...
Original post: #cybersecurity
PRZK-Bind: A Physically Rooted Zero-Knowledge Authentication Protocol for Secure Digital Twin Binding in Smart Cities
Yagmur Yigit, Mehmet Ali Erturk, Kerem Gursu, Berk Canberk
https://arxiv.org/abs/2508.17913
Capitalism − Big Tech − single points of failure https://mas.to/@nemo/114676003248609889
Design and analysis of a set of discrete variable protocols for secure quantum communication
Arindam Dutta
https://arxiv.org/abs/2508.06380 https://arxiv.o…
Making REST APIs Agent-Ready: From OpenAPI to Model Context Protocol Servers for Tool-Augmented LLMs
Meriem Mastouri, Emna Ksontini, Wael Kessentini
https://arxiv.org/abs/2507.16044
Active Attack Resilience in 5G: A New Take on Authentication and Key Agreement
Nazatul H. Sultan, Xinlong Guan, Josef Pieprzyk, Wei Ni, Sharif Abuadbba, Hajime Suzuki
https://arxiv.org/abs/2507.17491
😎 Edible microlasers made from food-safe materials can serve as barcodes and biosensors
#optics
Formal Verification of Physical Layer Security Protocols for Next-Generation Communication Networks
Kangfeng Ye, Roberto Metere, Jim Woodcock, Poonam Yadav
https://arxiv.org/abs/2508.19430
GMail:
"Be careful with this message.
This message appears to be sent from your account but Gmail couldn't verify this. Someone might be impersonating your account. If you're not sure the message is from you, use caution when clicking links, downloading attachments, or replying with personal information."
I sent it while logged in to GMail using multiple authentication steps from my home network using a secure laptop. What are they talking about? Serious question: how could they not verify it? It's either an idiotic engineering problem on their end or I'm terrified that security is meaningless. Probably both.
I am very happy to announce that our big architecture paper for the Digidow project on distributed digital identity systems with biometric authentication for physical interaction is now online on arXiv: https://arxiv.org/abs/2508.10185.
While it can't have all the details, it summarizes the main de…
Do I know anyone using /e/OS? I'm interested in knowing if you can do:
* Two factors authentication with Gmail (the usual "a notification has been sent to your mobile, tap Yes bla, bla, bla").
* Paying using contactless methods?
Also, I would like to know about any other possible problems I might have switching from #android to /e/OS.
@…
"2FA Liberapay does not yet support two-factor authentication."
When!? 🤦
#LiberaPay #Privacy
Meta is adding support for passkeys on Facebook's iOS and Android apps "soon", and will begin rolling out passkeys to Messenger "in the coming months" (Emma Roth/The Verge)
https://www.theverge.com/news/689410/facebook-passkey…
Because FIDO-based authentication (Passkeys, YubiKeys, etc.) is so good the only way around it is to trick someone into not using it. That's essentially what a downgrade attack is. As a Microsoft #EntraID administrator you can prevent successful downgrade attack from affecting your users. Here's a few ways to mitigate the risk of downgrade attacks:
1) Have your users delete all MF…
Turns out #synology 's home folders are set to chmod 777 by default!
https://blog.aaronlenoir.com/2018/05/06/ssh-into-synology-nas-with-ssh-key/
Beyond DNS: Unlocking the Internet of AI Agents via the NANDA Index and Verified AgentFacts
Ramesh Raskar, Pradyumna Chari, John Zinky, Mahesh Lambe, Jared James Grogan, Sichao Wang, Rajesh Ranjan, Rekha Singhal, Shailja Gupta, Robert Lincourt, Raghu Bala, Aditi Joshi, Abhishek Singh, Ayush Chopra, Dimitris Stripelis, Bhuwan B, Sumit Kumar, Maria Gorskikh
from my link log —
How attackers are still phishing "phishing-resistant" passkey authentication.
https://www.bleepingcomputer.com/news/security/how-attackers-are-still-phishing-phishing-resistant-au…
Finnish bank fails to send #email to me, finally succeeds to a different address but
Authentication-Results: mx.mail.ovh.net;
arc=fail (as.1.microsoft.com=pass, ams.1.microsoft.com=fail (body has been altered)) smtp.remote-ip=a.b.c.d;
Now this inspires confidence. /s
#Microsoft
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
Shayesta Naziri, Xu Wang, Guangsheng Yu, Christy Jie Liang, Wei Ni
https://arxiv.org/abs/2508.17043
Currently working on implementing Matrix's new 'Matrix Authentication Service' for our NZ-based instance... non-trivial. But it's such an impressive system (it's doing far more than competitors like Salesforce Slack and Microsoft Teams).
A Comprehensive Re-Evaluation of Biometric Modality Properties in the Modern Era
Rouqaiah Al-Refai, Pankaja Priya Ramasamy, Ragini Ramesh, Patricia Arias-Cabarcos, Philipp Terh\"orst
https://arxiv.org/abs/2508.13874
@… I can think of ways you might do it by getting people to set a DNS CNAME, for example, so they own the domain *but* authentication is controlled by a service. In theory, this allows ownership because you can replace it with a competitor.
AP is probably harder, but I don't think it's impossible, based on my cursory reading of the …
Physical Layer Challenge-Response Authentication between Ambient Backscatter Devices
Yifan Zhang, Yongchao Dang, Masoud Kaveh, Zheng Yan, Riku J\"antti, Zhu Han
https://arxiv.org/abs/2506.18767
Ja, krunchyfoods.in, dir vertraue ich ganz bestimmt meine Kreditkarteninformation zur Aktivierung der 2-Factor-Authentication auf einem Zahlungsdienst an, den ich nicht verwende.
Anomaly Detection for Sensing Security
Stefan Roth, Aydin Sezgin
https://arxiv.org/abs/2506.10718 https://arxiv.org/pdf/2506.10718
It sounds like that Tea app vulnerability (not the one where they had data just open to the world on Firebase, but a second problem) is what I describe in the first paragraph of this post.
You *can’t* rely on user-controlled devices to safely hold credentials that work for more than that one user—especially if the credentials live outside of something like a hardware security module, which they almost certainly do if your app is storing them.
The Passwordless Authentication with Passkey Technology from an Implementation Perspective
Lien Tran, Boyuan Zhang, Ratchanon Pawanja, Rashid Hussain Khokhar
https://arxiv.org/abs/2508.11928
Physical-Layer Signal Injection Attacks on EV Charging Ports: Bypassing Authentication via Electrical-Level Exploits
Hetian Shi, Yi He, Shangru Song, Jianwei Zhuge, Jian Mao
https://arxiv.org/abs/2506.16400
remember when you could do this and just have free #WiFi
A Federated Learning-based Lightweight Network with Zero Trust for UAV Authentication
Hao Zhang, Fuhui Zhou, Wei Wang, Qihui Wu, Chau Yuen
https://arxiv.org/abs/2507.05111
Deep Learning Models for Robust Facial Liveness Detection
Oleksandr Kuznetsov, Emanuele Frontoni, Luca Romeo, Riccardo Rosati, Andrea Maranesi, Alessandro Muscatello
https://arxiv.org/abs/2508.09094
Know Me by My Pulse: Toward Practical Continuous Authentication on Wearable Devices via Wrist-Worn PPG
Wei Shao, Zequan Liang, Ruoyu Zhang, Ruijie Fang, Ning Miao, Ehsan Kourkchi, Setareh Rafatirad, Houman Homayoun, Chongzhou Fang
https://arxiv.org/abs/2508.13690
Day 16
Just published a deep dive into building a secure login page with Next.js, NestJS, JWT, and PostgreSQL.
- Email verification
- Role-based access control
- Subscription enforcement
- Token decoding in frontend
- SQL-level inserts for system roles
Includes full code snippets and explanation of the entire flow.
Perfect if you're working on full-stack apps with JavaScript, TypeScript, and SQL.
DynoStore: A wide-area distribution system for the management of data over heterogeneous storage
Dante D. Sanchez-Gallegos, J. L. Gonzalez-Compean, Maxime Gonthier, Valerie Hayot-Sasson, J. Gregory Pauloski, Haochen Pan, Kyle Chard, Jesus Carretero, Ian Foster
https://arxiv.org/abs/2507.00576
AirSignatureDB: Exploring In-Air Signature Biometrics in the Wild and its Privacy Concerns
Marta Robledo-Moreno, Ruben Vera-Rodriguez, Ruben Tolosana, Javier Ortega-Garcia, Andres Huergo, Julian Fierrez
https://arxiv.org/abs/2508.08502
Quantum-Inspired Audio Unlearning: Towards Privacy-Preserving Voice Biometrics
Shreyansh Pathak, Sonu Shreshtha, Richa Singh, Mayank Vatsa
https://arxiv.org/abs/2507.22208 https…
Bidirectional Biometric Authentication Using Transciphering and (T)FHE
Joon Soo Yoo, Tae Min Ahn, Ji Won Yoon
https://arxiv.org/abs/2506.12802 https://
Secure Hybrid Key Growing via Coherence Witnessing and Bipartite Encoding
Pol Juli\`a Farr\'e, Chris Aaron Schneider, Christian Deppe
https://arxiv.org/abs/2508.06294 https:…
Bidirectional Biometric Authentication Using Transciphering and (T)FHE
Joon Soo Yoo, Tae Min Ahn, Ji Won Yoon
https://arxiv.org/abs/2506.12802 https://
Nutzt du Client Authentication mit TLS-Zertifikaten?
#TLS #letsencrypt #EKU #X509
Exposing #OTelCollector in #Kubernetes with #GatewayAPI & #mTLS
Advancing Offline Handwritten Text Recognition: A Systematic Review of Data Augmentation and Generation Techniques
Yassin Hussein Rassul, Aram M. Ahmed, Polla Fattah, Bryar A. Hassan, Arwaa W. Abdulkareem, Tarik A. Rashid, Joan Lu
https://arxiv.org/abs/2507.06275
VeriPHY: Physical Layer Signal Authentication for Wireless Communication in 5G Environments
Clifton Paul Robinson, Salvatore D'Oro, Tommaso Melodia
https://arxiv.org/abs/2508.09213
An LLM Agent for Functional Bug Detection in Network Protocols
Mingwei Zheng, Chengpeng Wang, Xuwei Liu, Jinyao Guo, Shiwei Feng, Xiangyu Zhang
https://arxiv.org/abs/2506.00714
Perfect message authentication codes are robust to small deviations from uniform key distributions
Boris Ryabko
https://arxiv.org/abs/2508.09783 https://ar…
Challenges in GenAI and Authentication: a scoping review
Wesley dos Reis Bezerra, Lais Machado Bezerra, Carlos Becker Westphall
https://arxiv.org/abs/2507.11775
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication
Christopher Battarbee, Christoph Striecks, Ludovic Perret, Sebastian Ramacher, Kevin Verhaeghe
Wireless Home Automation Using Social Networking Websites
Divya Alok Gupta, Dwith Chenna, B. Aditya Vighnesh Ramakanth
https://arxiv.org/abs/2506.22482 htt…
Day 4
TL;DR: Full Swagger docs JWT auth with registration and login are live.
Today’s work focused on two key improvements.
1. Swagger documentation was extended across all API layers. DTOs, entities, and controllers were enriched with `@ApiTags`, `@ApiOperation`, `@ApiResponse`, and detailed `@ApiBody` annotations — including real-life examples for request bodies.
2. JWT-based authentication was implemented. A secure registration flow was added, with password hashi…
Noise-Driven AI Sensors: Secure Healthcare Monitoring with PUFs
Christiana Chamon, Abhijit Sarkar, A. Lynn Abbott
https://arxiv.org/abs/2506.05135 https://…
Building a robust OAuth token based API Security: A High level Overview
Senthilkumar Gopal
https://arxiv.org/abs/2507.16870 https://arxiv.org/pdf/2507.1687…
#4 👥 Leverage built-in authentication with #Breeze, #Fortify or #Jetstream
🗝️ Store passwords securely using
DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond
Guanjie Li, Tom H. Luan, Chengzhe Lai, Jinkai Zheng, Rongxing Lu
https://arxiv.org/abs/2506.11669
Next Generation Authentication for Data Spaces: An Authentication Flow Based On Grant Negotiation And Authorization Protocol For Verifiable Presentations (GNAP4VP)
Rodrigo Men\'endez, Andres Munoz-Arcentales, Joaqu\'in Salvach\'ua, Carlos Aparicio, Irene Plaza, Gabriel Huecas
https://arxiv.org/abs/2505.24698
Social-Sensor Identity Cloning Detection Using Weakly Supervised Deep Forest and Cryptographic Authentication
Ahmed Alharbi, Hai Dong, Xun Yi
https://arxiv.org/abs/2508.09665 ht…
Authentication and authorization in Data Spaces: A relationship-based access control approach for policy specification based on ODRL
Irene Plaza-Ortiz, Andres Munoz-Arcentales, Joaqu\'in Salvach\'ua, Carlos Aparicio, Gabriel Huecas, Enrique Barra
https://arxiv.org/abs/2505.24742 …
Physical Layer-Based Device Fingerprinting for Wireless Security: From Theory to Practice
Junqing Zhang, Francesco Ardizzon, Mattia Piana, Guanxiong Shen, Stefano Tomasin
https://arxiv.org/abs/2506.09807
AuthenTree: A Scalable MPC-Based Distributed Trust Architecture for Chiplet-based Heterogeneous Systems
Ishraq Tashdid, Tasnuva Farheen, Sazadur Rahman
https://arxiv.org/abs/2508.13033
SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning
S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka
https://arxiv.org/abs/2508.02438
MEraser: An Effective Fingerprint Erasure Approach for Large Language Models
Jingxuan Zhang, Zhenhua Xu, Rui Hu, Wenpeng Xing, Xuhong Zhang, Meng Han
https://arxiv.org/abs/2506.12551
This https://arxiv.org/abs/2405.12042 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCR_…
Identity and Access Management for the Computing Continuum
Chalima Dimitra Nassar Kyriakidou, Athanasia Maria Papathanasiou, Vasilios A. Siris, Nikos Fotiou, George C. Polyzos, Eduardo C\'anovas Mart\'inez, Antonio Skarmeta
https://arxiv.org/abs/2506.09559
README: Robust Error-Aware Digital Signature Framework via Deep Watermarking Model
Hyunwook Choi, Sangyun Won, Daeyeon Hwang, Junhyeok Choi
https://arxiv.org/abs/2507.04495
A Comparative Study and Implementation of Key Derivation Functions Standardized by NIST and IEEE
Abel C. H. Chen
https://arxiv.org/abs/2507.06244 https://
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- Privacy-Enhanced Adaptive Authentication: User Profiling with Privacy Guarantees
Yaser Baseri, Abdelhakim Senhaji Hafid, Dimitrios Makrakis
This https://arxiv.org/abs/2505.19301 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCR_…
Cyber Attacks Detection, Prevention, and Source Localization in Digital Substation Communication using Hybrid Statistical-Deep Learning
Nicola Cibin, Bas Mulder, Herman Carstens, Peter Palensky, Alexandru \c{S}tefanov
https://arxiv.org/abs/2507.00522
GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection
Hyeong Seon Kim, Huy Kang Kim
https://arxiv.org/abs/2507.21640 https://…
Digital identity management system with blockchain:An implementation with Ethereum and Ganache
Andr\'e Davi Lopes, Tais Mello, Wesley dos Reis Bezerra
https://arxiv.org/abs/2507.21398