Pub Crawl #8

 

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Advanced Persistent Threat 2016   Image removed. Image removed. Image removed. Image removed. Image removed.   (all)

Advanced persistent threats are the subject of considerable research of interest to all of the hard problems for the Science of Security community. The research cited here looks at behavioral as well as technical aspects.

Browser Security 2016   Image removed. Image removed. Image removed.   (all)

Web browser exploits are a common attack vector. Research into browser security has looked at the common browsers and add-ons to address both specific and general problems. Included in the articles cited here are some addressing cross site scripting, hardware virtualization, bothounds, system call monitoring, and phishing detection. For the Science of Security community, this work relates to human factors, resiliency and scalability.

Channel Coding 2016   Image removed. Image removed. Image removed.    (all)

Channel coding, also known as Forward Error Correction, are methods for controlling errors in data transmissions over noisy or unreliable communications channels. For cybersecurity, these methods can also be used to ensure data integrity, as some of the research cited below shows. The work cited here relates to the Science of Security problems of metrics, resiliency, and composability.

Cognitive Radio Security 2016   Image removed.    (all)

Cognitive radio (CR) is a form of dynamic spectrum management--an intelligent radio that can be programmed and configured dynamically to use the best wireless channels near it. Its capability allows for great network resilience.

Compressive Sampling 2016    Image removed. Image removed. Image removed.    (all)

Compressive sampling (or compressive sensing) is an important theory in signal processing. It allows efficient acquisition and reconstruction of a signal and may also be the basis for user identification. For the Science of Security, the topic has implications for resilience, cyber-physical systems, privacy, and composability.

Computational Intelligence 2016   Image removed.    (all)

Computational intelligence includes such constructs as artificial neural networks, evolutionary computation and fuzzy logic. It embraces biologically inspired algorithms such as swarm intelligence and artificial immune systems and includes broader fields such as image processing, data mining, and natural language processing. Its relevance to the Science of Security is related to composability and compositionality, as well as cryptography.

Control Theory and Resiliency 2016   Image removed.    (all)

In the Science of Security, control theory offers methods and approaches to potentially solve hard problems. The research work presented here specifically addresses issues in resiliency.

CPS Modeling and Simulation 2016   Image removed. Image removed. Image removed.    (all)

Modeling and simulation of Cyber-physical systems is a way to develop resiliency, composability, and predictive metrics in a laboratory environment and then test against their algorithms against real world situations. The challenge, of course, is to develop models and simulations that are accurate and realiable.

Edge Detection and Security 2016   Image removed. Image removed. Image removed.    (all)

Edge detection is an important issue in image and signal processing. For the Science of Security community, the subject is relevant to issues in composability, scalability, predictive metrics, and resiliency.

Facial Recognition 2016   Image removed. Image removed. Image removed.   (all)

Facial recognition tools have long been the stuff of action-adventure films. In the real world, they present opportunities and complex problems being examined by researchers. For the Science of Security community, their work relates to the hard problems of human behavior, metrics, and resilience.

False Data Detection 2016   Image removed. Image removed. Image removed.   (all)

False data injection attacks against electric power grids potentially have major consequences. For the Science of Security community, the detection of false data injection is relevant to resiliency, composability, cyber physical systems, and human behavior.

Fuzzy Logic 2016     Image removed. Image removed.    (all)

Fuzzy logic is being used to develop a number of security solutions for data security. The articles cited here include research into fuzzy logic-based security for software defined networks, industrial controls, intrusion response and recovery, wireless sensor networks, and more. They are relevant to cyber physical systems, resiliency, and metrics.

Honey Pots 2016    Image removed. Image removed. Image removed.   (all)

Honeypots area traps set up to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers. With increased network size and complexity, the need for advanced methods is growing. Specifically, cloud and virtual security need advanced methods for malware detection and collection. For the Science of Security community, this work is relevant to resiliency, scalability, and human factors.

Information Assurance 2016   Image removed. Image removed. Image removed. Image removed. Image removed.   (all)

The term “information Assurance” was adopted in the late 1990’s to cover what is often now referred to generically as “cybersecurity.” Many still use the phrase, particularly in the U.S. government, both for teaching and research. Since it is a rather generic phrase, there is a wide area of coverage under this topic. As such, it touches all of the hard problems in the Science of Security.

IoBT 2016    Image removed. Image removed. Image removed. Image removed.   (all)

The Internet of Biometric Things (IoBT) is a term recently coined to cover the profusion of biometric sensors, human networks, and other health related systems that are interconnected and interrelated. These systems have major security and privacy issues and are relevant to the Science of Security community relative to the hard problems of human behavior, resiliency, scalability, and metrics.

Keystroke Analysis 2016   Image removed. Image removed.   (all)

Keystrokes are a basis for behavioral biometrics. The rhythms and patterns of the individual user can become the basis for a unique biological identification. Research into this area of computer security is growing. For the Science of Security, keystroke analysis is relevant to the hard problems of human behavior factors and predictive metrics.

Lightweight Ciphers 2016   Image removed.   (all)

Lightweight cryptography is a major research direction. The release of SIMON in June 2013 generated significant interest and a number of studies evaluating and comparing it to other cipher algorithms. To the Science of Security community, lightweight ciphers can support resilience, especially in cyber physical systems constrained with power and “weight” budgets.

Malware Analysis and Graph Theory 2016    Image removed. Image removed. Image removed. Image removed.   (all)

Malware analysis is generally signature based. Graph theory has the potential to provide more rigor in analyzing malware as a tool for mining large data sets. For the Science of Security community, malware classification is related to privacy, predictive metrics, human behavior and resiliency.

Malware Classification 2016   Image removed. Image removed. Image removed. Image removed.   (all)

Malware classification, along with detection and analysis, is a major issue cybersecurity. For the Science of Security community, malware classification is related to privacy, predictive metrics, human behavior and resiliency.

Natural Language Processing 2016   Image removed. Image removed. Image removed.   (all)

Natural language processing research focuses on developing efficient algorithms to process texts and to make their information accessible to computer applications. Texts can contain information with different complexities ranging from simple word or token-based representations, to rich hierarchical syntactic representations, to high-level logical representations across document collections. For the Science of Security community, this work relates to the problems of resiliency, metrics, and human behavior.

Network Accountability 2016   Image removed. Image removed. Image removed.   (all)

The term “accountability’ suggests that an entity should be held responsible for its own specific actions. Once an event has transpired, the events that took place need to be traceable so that the causes can be determined afterwards. The goal of network accountability research is to provide accountability within networks and computers by building trace files of events. For the Science of Security community, it is relevant to composability, resilience, and metrics.

Network Security Architecture 2016   Image removed. Image removed.    (all)

The requirement for resilience in network security architecture is a large part of the hard problems of resiliency and compositionality in the Science of Security.

Router Systems Security 2016  Image removed. Image removed.    (all)

Routers are among the most ubiquitous electronic devices in use. Basic security from protocols and encryption can be readily achieved, but routing has many leaks. For the Science of Security community, they are related to the hard problems of resiliency and predictive metrics.

Sensor Security 2016   Image removed. Image removed. Image removed.   (all)

Control theory offers a way to address the Science of Security hard problems of scalability, resilience, and human behavior, particularly as they relate to cyber physical systems. The work cited here looks specifically at sensors as an area of security concern.

Signal Processing Security 2016   Image removed. Image removed. Image removed. Image removed. Image removed.   (all)

Broadly speaking, signal processing covers signal acquisition and reconstruction, quality improvement, signal compression and feature extraction. Each of these processes introduces vulnerabilities into communications and other systems. The research articles cited here explore trust between networks, steganalysis, tracing passwords across networks, and certificates. They address the Science of Security hard problems related to privacy, resilience, metrics, and composability.

Spam Detection 2016   Image removed. Image removed. Image removed.   (all)

Spam detection is a general problem in cybersecurity. For the Science of Security community, it is relevant to the problems of scalability, human behavior, and metrics.

Wearables Security 2016   Image removed. Image removed. Image removed. Image removed.   (all)

The proliferation of personal wearable devices to track athletic performance and their adaptation and adaptation for health monitoring presents challenges for security. The small processing power and storage and the potential for compromise have stimulated research. For the Science of Security community, this research is relevant to the hard problems of human behavior and privacy, resiliency, and scalability.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on