Pub Crawl #26

 

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Dynamical Systems 2018  Image removed.   Image removed.  Image removed.     (all)

Research into dynamical systems cited here focuses on non-linear and chaotic dynamical systems and in proving abstractions of dynamical systems through numerical simulations. Many of the applications studied are cyber-physical systems and are relevant to the Science of Security hard problems of resiliency, predictive metrics and composability.

Edge Detection and Security 2018  Image removed.    Image removed.  Image removed.    (all)

Edge detection is an important issue in image and signal processing. For the Science of Security community, the subject is relevant to issues in composability, scalability, predictive metrics, and resiliency.

Elliptic Curve Cryptography 2018  Image removed.  Image removed.  Image removed.     (all)

Elliptic curve cryptography is a major research area globally. It is relevant to solving the hard problems of interest to the Science of Security community of scalability, resilience, and metrics.

Embedded Systems 2018  Image removed.   Image removed.  Image removed.     (all)

Embedded Systems Security aims for a comprehensive view of security across hardware, platform software (including operating systems and hypervisors), software development processes, data protection protocols (both networking and storage), and cryptography. Critics say embedded device manufacturers often lack maturity when it comes to designing secure embedded systems. They say vendors in the embedded device and critical infrastructure market are starting to conduct classic threat modeling and risk analysis on their equipment, but they've not matured to the point of developing formal secure development standards. Research is beginning to bridge the gap between promise and performance, as the articles cited here suggest. For the Science of Security, this research addresses resilience, composability, and metrics.

Fuzzy Logic and Security 2018  Image removed.  Image removed.     (all)

Fuzzy logic is being used to develop a number of security solutions for data security. The articles cited here include research into fuzzy logic-based security for software defined networks, industrial controls, intrusion response and recovery, wireless sensor networks, and more. They are relevant to cyber physical systems, resiliency, and metrics.

Generative Adversarial Learning 2018  Image removed.    Image removed.  Image removed.     (all)

AI and Machine Learning are being used to develop a wide range of applications including visual, audio, and text. The use of these methods has large security implications. Research into the security aspects is relevant to the Science of Security hard problems of resilience, predictive metrics, and scalability.

Industrial Control Systems 2018  Image removed.   Image removed.   (all)

Industrial control systems are a vital part of the critical infrastructure. Anomaly detection in these systems is requirement to successfully build resilient and scalable systems. The work cited here addresses these two hard problems in the Science of Security.

Information Forensics 2018  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Forensics is an important tool for tracking and evaluating past attacks and using the information gained to resolve hard problems in the Science of Security related to resilience, metrics, human behavior, and scalability.

Information Theoretic Security 2018  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

A cryptosystem is said to be information-theoretically secure if its security derives purely from information theory and cannot be broken even when the adversary has unlimited computing power. For example, the one-time pad is an information-theoretically secure cryptosystem proven by Claude Shannon, inventor of information theory, to be secure. Information-theoretically secure cryptosystems are often used for the most sensitive communications such as diplomatic cables and high-level military communications, because of the great efforts enemy governments expend toward breaking them. Because of this importance, methods, theory and practice in information theory security also remains high. It is fundamentally related to the concept of Science of Security and all the hard problems.

Insider Threat 2018   Image removed.  Image removed.  Image removed.  Image removed.   (all)

Insider threats are a difficult problem. The research cited here looks at both intentional and accidental threats, including the effects of social engineering, and methods of identifying potential threats. For the Science of Security, insider threat relates to human behavior, as well as metrics, policy-based governance and resilience.

IoT Security 2018   Image removed.  Image removed.  Image removed.  Image removed.   (all)

The term Internet of Things (IT) refers to advanced connectivity of the Internet with devices, systems and services that include both machine-to-machine communications (M2M) and a variety of protocols, domains and applications. Since the concept incorporates literally billions of devices, the security implications are huge. For the Science of Security community, this work is relevant to the hard problems of resilience, composability, human behavior, and metrics.

Kerberos 2018   Image removed.  Image removed.  Image removed.   (all)

Kerberos supports authentication in distributed systems. Used in intelligent systems, it is an encrypted data structure naming a user and a service the user may access. For the Science of Security community, it is relevant to the broad issues of cryptography and to resilience, human behavior, resiliency, and metrics.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on