Pub Crawl #28

 

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Malware Analysis 2018  Image removed.  Image removed.  Image removed.   (all)

Malware analysis, along with detection and classification, is a major issue cybersecurity. For the Science of Security community, malware classification is related to privacy, predictive metrics, human behavior and resiliency.

SCADA Systems Security 2018  Image removed. Image removed.  Image removed.   (all)

SCADA system security issues have been identified as a problem for more than a decade. The work cited here addresses the issue relevant to the Science of Security hard problems of resiliency, compositionality, and human behavior.

Scalable Security 2018  Image removed.    (all)

Scalability is one of the hard problems in the Science of Security. Applied to larger data sets, increases in interoperability, and greater computing capacity, particularly in critical infrastructures and the Internet of Things, the development of effective automated scalable systems is compounded.

Scalable Verification 2018  Image removed.  Image removed.  Image removed.     (all)

Verification of software and its security features can be done statically or dynamically. A challenge is to conduct verifications at scale to determine whether all the features do what they are intended to do. For the Science of Security community, scalable verification relates to scalability and compositionality, resilience, and predictive metrics.

SDN Security 2018  Image removed.   Image removed.     (all)

Software Defined Network (SDN) architectures have been developed to provide improved routing and networking performance for broadband networks by separating the control plain from the data plain. This separation also provides opportunities and challenges for SDN as a security element in IoT and cyberphysical systems. For the Science of Security community, it is relevant to scalability and resilience.

Security Audits 2018  Image removed.   Image removed.  Image removed.   (all)

The ability to conduct automated security audits rapidly and accurately helps to reduce the time between attack and its detection, hopefully reducing the consequences of the attack. Research into security audit methods and techniques supports addressing the hard problem of human behavior, as well as resiliency and scalability.

Security Heuristics 2018  Image removed.  Image removed.     (all)

Heuristic analysis is a method employed by many computer antivirus programs designed to detect “Zero Day” or previously unknown computer viruses and new variants of viruses already “in the wild." It is an expert-based analytic method that uses various decision rules or weighing methods. For the Science of Security community, it is relevant to the hard problems of resilience, scalability, and predictability.

Security Metrics 2018  Image removed.  (all)

Measurement and metrics are one of the five hard problems in the Science of Security.

Security Policies 2018   Image removed.    (all)

Policy-based access controls and security policies are intertwined in most commercial systems. Analytics use abstraction and reduction to improve policy-based security. For the Science of Security community, policy-based governance is one of the five Hard Problems.

Security Risk Management 2018    Image removed.   Image removed.   (all)

Almost all of cybersecurity is a risk management process. Tradeoffs among level of security, overall performance, automation, weight, cost, and other factors can make risk management complicated. For the Science of Security, risk management is related to human factors and governance.

Security Scalability 2018  Image removed.    (all)

Scalability, along with compositionality, is one of the five hard problems for the Science of Security community.

Security Weaknesses 2018  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Attackers need only find one or a few exploitable vulnerabilities to mount a successful attack while defenders must shore up as many weaknesses as practicable. The research presented here covers a range of weaknesses and approaches for identifying and securing against attacks. Many articles focus on key systems, both public and private. Hard problems addressed include human behavior, policy-based governance, resilience and metrics.

Smart Grid Consumer Privacy 2018  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Concerns about consumer privacy and electric power usage have impacted utilities fielding of smart-meters. Securing power meter readings in a way that addresses while protecting consumer privacy is a concern of research designed to help alleviate those concerns. For the Science of Security community, privacy is a core topic.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on