Pub Crawl #54

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

 

Multicore Computing Security 2020  Image removed.    Image removed.  Image removed.      (all)

As high performance computing has evolved into larger and faster computing solutions, new approaches to security have been identified. The articles cited here focus on security issues related to multicore environments. Multicore computing relates to the Science of Security hard topics of scalability, resilience, and metrics.

Multifactor Authentication 2020      Image removed.  Image removed.  Image removed.    (all)

Multifactor authentication is of general interest within cryptography. For the Science of Security community, it relates to human factors, resilience, and metrics.

Multiple Fault Diagnosis 2020      Image removed.  Image removed.  Image removed.    (all)

According to Shakeri, “the computational complexity of solving the optimal multiple-fault isolation problem is super exponential.” Most processes and procedures assume that there will be only one fault at any given time. Many algorithms are designed to do sequential diagnostics. With the growth of cloud computing and multicore processors and the ubiquity of sensors, the problem of multiple fault diagnosis has grown even larger. For the Science if Security community, multiple fault diagnosis is relevant to cyber physical systems, resiliency, metrics, and human factors.

Networked Control Systems Security 2020  Image removed.  Image removed.  Image removed.  (all)

Network control systems (NCS) offer a relatively inexpensive way for communications networks to provide diagnostics, flexibility, and robustness. To the Science of Security community, NCS research is relevant to the hard problems of resiliency, composability, and predictive metrics.

Network on Chip Security 2020  Image removed.  Image removed.  Image removed.  (all)

Network on chip (NoC or NOC) is a communication subsystem on an integrated circuit. NOC technology applies networking theory and methods to on-chip communication and brings improvements over conventional interconnections. From a Science of Security perspective, NOC security is relevant to scalability, resilience, and metrics.

Network Security Architecture 2020        Image removed.      (all)

The requirement for security and resilience in network security architecture is one of the hard problems in the Science of Security.

Neural Network Security 2020  Image removed.  Image removed.  Image removed.  (all)

Artificial neural networks have been used to solve a wide variety of tasks that are hard to solve using ordinary rule-based programming. What has attracted much interest in neural networks is the possibility of learning. Tasks such as function approximation, classification pattern and sequence recognition, anomaly detection, filtering, clustering, blind source separation and compression and controls all have security implications. Cyber physical systems, resiliency, policy-based governance and metrics are the Science of Security interests.

Object Oriented Security 2020  Image removed.    Image removed.  Image removed.      (all)

The use of common object-oriented design patterns as a mechanism for access control is called Object-Oriented Security. These mechanisms can be easier to use and more effective than traditional security models. For the Science of Security community, OOP security models are of interest relative to the hard problems of resiliency, composability, and metrics.

Operating Systems Security 2020  Image removed.    Image removed.  Image removed.      (all)

Operating system security is a component of resiliency, composability, and an area of concern for predictive metrics.

Oscillating Behaviors 2020  Image removed.    Image removed.  Image removed.      (all)

Broadly speaking, signal processing covers signal acquisition and reconstruction, quality improvement, signal compression and feature extraction. Each of these processes introduces vulnerabilities into communications and other systems. The research articles cited here explore trust between networks, steganalysis, tracing passwords across networks, and certificates. They address the Science of Security hard problems related to privacy, resilience, metrics, and composability.

Outsourced Database Security 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

The outsourcing of database security adds complexity and risk to the challenges of security. For the Science of Security community, the problems created are related to the hard problems of scalability, human behavior, predictive metrics, and resiliency.

Pattern Locks 2020  Image removed.  Image removed.  Image removed.    (all)

Pattern locks are best known as the access codes using a series of lines connecting dots. Primarily familiar to Android users, research into pattern locks shows promise for many more uses. For the Science of Security community, they are important relative to the hard problems of human behavior, scalability, and resilience.

Peer to Peer Security 2020  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Peer-to-peer systems pose considerable challenges for computer security. Like other forms of software, P2P applications can contain vulnerabilities, but what makes security particularly dangerous for P2P software is that peer-to-peer applications act as servers as well as clients, making them more vulnerable to remote exploits. For the Science of Security community, this work is relevant to the hard problems of scalability, resilience, metrics, and human factors.

Pervasive Computing Security 2020  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Also called ubiquitous computing, pervasive computing is the concept that all man-made and some natural products will have embedded hardware and software technology and connectivity. This evolution has been proceeding exponentially as computing devices become progressively smaller and more powerful. For the Science of Security community, work in this area is related to resilience, scalability, human factors, and metrics.

Power Grid Vulnerability 2020  Image removed.    Image removed.  Image removed.      (all)

Cyber-Physical Systems such as the power grid are complex networks linked with cyber capabilities. The complexity and potential consequences of cyber-attacks on the grid make them an important area for scientific research. For the Science of Security community, this research is relevant to composability, resilience, and predictive metrics.

Predictive Security Metrics 2020      Image removed.        (all)

Measurement is at the core of science. The development of accurate metrics is a major element for achieving a true Science of Security. It is also one of the hard problems to solve.

Privacy Policies 2020  Image removed.        Image removed.    (all)

The technical implementation of privacy problems is fraught with challenges. For the Science of Security community, this research is relevant to the hard problems of scalability and to human behavior.

Privacy Policies and Measurement 2020  Image removed.    Image removed.    Image removed.    (all)

Measuring the impact and technical implementation of privacy problems is fraught with challenges. For the Science of Security community, this research is relevant to the hard problems of metrics, scalability and to human behavior.

Protocol Verification 2020  Image removed.  Image removed.    (all)

Verifying the accuracy of security protocols is a primary goal of cybersecurity. Research into the area has sought to identify new and better algorithms and to identify better methods for verifying security protocols in myriad applications and environments. Verification has implications for compositionality and composability and for policy–based collaboration, as well as for privacy alone.

Provable Security 2020  Image removed.  Image removed.  Image removed.  (all)

The term “provable security” refers to those security methods which can be confirmed mathematically through a formal process. For the Science of Security community, these methods are important to solving the problems of resiliency, predictive metrics, and compositionality.

Provenance 2020  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Provenance refers to information about the origin and activities of system data and processes. With the growth of shared services and systems, including social media, cloud computing, and service-oriented architectures, finding tamperproof methods for tracking files is a major challenge. Provenance is important to the Science of Security relative to human behavior, metrics, resilience, and composability.

Science of Security 2020  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

 

 

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on