Pub Crawl #20

 

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Augmented Reality 2017   Image removed.   Image removed.  Image removed.   (all)

Augmented Reality (AR) offers a combination of physical and virtual objects. It differs from virtual reality by allowing users to sight the real world enhanced with virtual objects. In certain applications, security breaches could morph those enhancements into liabilities. For the Science of Security community, research into this subject is relevant to the hard problems of scalability, resilience, privacy, and human behavior.

Cryptojacking 2018    Image removed.  Image removed.  Image removed.   (all)

Cryptojacking is a new method criminals are using to take over computers and using the hijacked processing power to earn cryptocurrency. For the Science of Security community, this new attack vector is relevant to resiliency, metrics, and human behavior.

Deep Video 2017  Image removed.   Image removed.  Image removed.     (all)

The use of video for surveillance has created a need to be able to process very large volumes of data in very precise ways. Research into these methods is relevant to the Science of Security hard problems of scalability, resilience, and metrics.

Encryption Audits 2017   Image removed.   Image removed.  Image removed.   (all)

Encryption audits not only test the validity and effectiveness of protection schemes, they also potentially provide data for developing and improving metrics about data security. For the Science of Security community, this work is relevant to helping solve the hard problems of predictive metrics, compositionality and resilience.

Expandability 2017  Image removed.   Image removed.   (all)

The expansion of a network to more nodes creates security problems. For the Science of Security community, expandability relates to resilience and compositionality.

Expert Systems and Privacy 2017  Image removed.   Image removed.   (all)

Expert systems have potential for efficiency, scalability, and economy in systems security. The research work cited here looks at the problem of privacy. For the Science of Security community, the work is relevant to scalability and human factors.

Expert Systems and Security 2017  Image removed.  Image removed.  Image removed.   (all)

An expert system is an artificial intelligence (AI) application that uses a knowledge base of human expertise for problem solving. Its success is based on the quality of the data and rules obtained from the human expert. Some perform above and some below the level of humans. For the Science of Security, expert systems are relevant to the hard problems of scalability, human behavior, and resilience.

Generative Adversarial Learning 2017  Image removed.   Image removed.  Image removed.     (all)

AI and Machine Learning are being used to develop a wide range of applications including visual, audio, and text. The use of these methods has large security implications. Research into the security aspects is relevant to the Science of Security hard problems of resilience, predictive metrics, and scalability.

Honey Pots 2017  Image removed.   Image removed.  Image removed.   (all)

Honeypots area traps set up to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers. With increased network size and complexity, the need for advanced methods is growing. Specifically, cloud and virtual security need advanced methods for malware detection and collection. For the Science of Security community, this work is relevant to resiliency, scalability, and human factors.

Human Behavior 2017   Image removed.   (all)

Human behavior and its impact on cybersecurity is one of the five hard problems for the Science of Security community.

Neural Style Transfer 2017  Image removed.  Image removed.  Image removed.     (all)

Neural style transfer is receiving significant attention and showing results. One approach trains by defining and optimizing perceptual loss functions in feed-forward convolutional neural networks. Work in this area addresses security issues relative to AI and ML and the hard problems of scalability, resilience, and predictive metrics.

Smart Grid Sensors 2017  Image removed.   Image removed.  Image removed.   (all)

Sensors represent are both a point of vulnerability in the Smart Grid and a means of detection of intrusions. For the Science of Security community, research work into these industrial control systems is relevant to resiliency, compositionality, and human factors.

Visible Light Communications Security 2017  Image removed.   Image removed.  Image removed.     (all)

Visible light communication (VLC) offers an unregulated and free light spectrum and potentially could be a solution for overcoming overcrowded radio spectrum, especially for wireless communication systems, and doing it securely. For the Science of Security community, this work is relevant to resiliency, scalability, and metrics.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on