Pub Crawl #55

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

 

6LoWPAN 2021  Image removed.  Image removed.  (all)

6LoWPAN, IPv6 over Low power Wireless Personal Area Networks, is an architecture intended to allow low power devices to participate in the Internet of Things. The IEEE specification allows for operation in either a secure or non-secure mode. For the Science of Security community, the creation of secure process in low power and ad hoc environments relates to the hard problems of resilience and composability. In the IoT context, it also relates to cyber physical system security.

Acoustic Coupling 2021  Image removed.  Image removed.  Image removed.    (all)

Acoustic couplers such as modems bridge the gap between analog voice and electronic communications. At this interface, there is a security gap. For the Science of Security community, this work is relevant to security of cyber-physical systems and to the hard problems of resilience, human behavior, and scalability.

Science of Security 2020  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

Sensor Security 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

Cyber physical system security requires the need to build secure sensors and actuators. The research work here addresses the Science of Security hard problems of human behavior, resiliency, metrics and composability for sensor security.

Signal Processing Security 2020  Image removed.    Image removed.  Image removed.      (all)

Broadly speaking, signal processing covers signal acquisition and reconstruction, quality improvement, signal compression and feature extraction. Each of these processes introduces vulnerabilities into communications and other systems. The research articles cited here explore trust between networks, steganalysis, tracing passwords across networks, and certificates. They address the Science of Security hard problems related to privacy, resilience, metrics, and composability.

Signature Based Defense 2020  Image removed.  Image removed.    (all)

Research into the use of malware signatures to inform defensive methods is a standard research exercise for the Science of Security community. This work addresses issues related to scalability and resilience.

Situational Awareness 2020  Image removed.  Image removed.  Image removed.    (all)

Situational awareness is an important human factor for cyber security that impacts resilience, predictive metrics, and composability.

Smart Grid Consumer Privacy 2020  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Concerns about consumer privacy and electric power usage have impacted utilities fielding of smart-meters. Securing power meter readings in a way that addresses while protecting consumer privacy is a concern of research designed to help alleviate those concerns. For the Science of Security community, privacy is a core topic.

Smart Grid Security 2020  Image removed.    Image removed.  Image removed.      (all)

The primary value of published research in smart grid technologies--the use of cyber-physical systems to coordinate the generation, transmission, and use of electrical power and its sources-- is because of its strategic importance and the consequences of intrusion. Smart grid is of particular importance to the Science of Security and its problems embrace several of the hard problems, notably resiliency, scalability, and metrics.

Social Agents 2020  Image removed.        Image removed.    (all)

Agent-based modeling of human social behavior is an increasingly important research area. Efficient, scalable and robust social systems are difficult to engineer, both from the modeling perspective and the implementation perspective. The work cited here addresses these problems. It is relevant to the Science of Security community relative to human factors and scalability.

Theoretical Cryptography 2020  Image removed.  (all)

Cryptography can only exist if there is a mathematical hardness to it constructed to maintain a desired functionality, even under malicious attempts to change or destroy the prescribed functionality. The foundations of theoretical cryptography are the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural ``security concerns' mathematically using probability-based definitions, various constructions, complexity theoretic primitives and proofs of security. For the Science of Security community, this work is relevant to the broad problem of developing a science, as well as contributing to the solution of the hard problems of composability and compositionality.

Threat Mitigation 2020  Image removed.  Image removed.  Image removed.    (all)

Threat mitigation is a continuous need in cybersecurity. For the Science of Security community, threat mitigation is related to resiliency, metrics, and human behavior.

Threat Vectors 2020  Image removed.    (all)

As systems become larger and more complex, the surface that hackers can attack also grows. Is this set of recent research articles, topics are explored that include smartphone malware, zero-day polymorphic worm detection, source identification, drive-by download attacks, two-factor face authentication, semantic security, and code structures. Of particular interest to the Science of Security community are the research articles focused on measurement and on privacy.

Time Frequency Analysis and Security 2020  Image removed.  Image removed.  Image removed.    (all)

Time-frequency analysis is a useful method that allows simultaneous consideration of both the time and frequency domains. It is useful to the Science of Security community for analysis in cyber-physical systems and toward solving the hard problems of resilience, predictive metrics, and scalability.

Trojan Horse Detection 2020  Image removed.      Image removed.      (all)

Detection and neutralization of hardware-embedded Trojans is a difficult problem. Current research is attempting to find ways to develop detection methods and processes and to automate the process. This research is relevant to cyber physical systems security, resilience and composability, as well as being an issue in supply chain security.

Trust Routing 2020  Image removed.      Image removed.      (all)

Trust routing schemes are a key component for building resilient architectures and for composable and scalable security systems.

Trusted Platform Modules 2020  Image removed.      Image removed.      (all)

A Trusted Platform Module (TPM) is a computer chip that can securely store artifacts used to authenticate a network or platform. These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. Interest in TPMs is growing due to their potential for solving hard problems in security such as composability and cyber-physical system security and resilience.

Trustworthy Systems 2020  Image removed.      Image removed.      (all)

Trust is created in information security to assure the identity of external parties. Trustworthy systems are a key element in the security of cyber physical systems, resiliency, and composability.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on