Pub Crawl - November 2023

Selections by dgoff

Pub Crawl summarizes, by hard problems, sets of publications that have been peer-reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Information Centric Networks 2022      (all)

The move from host-centric to information-centric network security has major implications for the Science of Security community relative to scalability and resilience.

Information Forensics 2022          (all)

Forensics is an important tool for tracking and evaluating past attacks and using the information gained to resolve hard problems in the Science of Security related to resilience, metrics, human behavior, and scalability.

Information Theoretic Security 2022            (all)

A cryptosystem is said to be information-theoretically secure if its security derives purely from information theory and cannot be broken even when the adversary has unlimited computing power. For example, the one-time pad is an information-theoretically secure cryptosystem proven by Claude Shannon, inventor of information theory, to be secure. Information-theoretically secure cryptosystems are often used for the most sensitive communications such as diplomatic cables and high-level military communications, because of the great efforts enemy governments expend toward breaking them. Because of this importance, methods, theory and practice in information theory security also remains high. It is fundamentally related to the concept of Science of Security and all the hard problems.

Network Control Systems Security 2022        (all)

Network control systems (NCS) offer a relatively inexpensive way for communications networks to provide diagnostics, flexibility, and robustness. To the Science of Security community, NCS research is relevant to the hard problems of resiliency, composability, and predictive metrics.

Network Reconnaissance 2022      (all)

The capacity to survey, analyze and assess a network is a critical aspect of developing resilient systems. The work cited here addresses multiple methods and approaches to network reconnaissance. These are related to the Science of Security hard problems of resilience and scalability.

Network Security Architecture 2022    (all)

The requirement for security and resilience in network security architecture is one of the hard problems in the Science of Security.

Network Security Resiliency 2022    (all)

Security Resiliency is one of the five hard problems in the Science of Security.

Neural Network Resiliency 2022    (all)

Artificial neural networks have been used to solve a wide variety of tasks that are hard to solve using ordinary rule-based programming. What has attracted much interest in neural networks is the possibility of learning. Resilience is the Science of Security interest referenced here.

Neural Network Security 2022        (all)

Artificial neural networks have been used to solve a wide variety of tasks that are hard to solve using ordinary rule-based programming. What has attracted much interest in neural networks is the possibility of learning. Tasks such as function approximation, classification pattern and sequence recognition, anomaly detection, filtering, clustering, blind source separation and compression and controls all have security implications. Cyber physical systems, resiliency, policy-based governance and metrics are the Science of Security interests.

Neural Style Transfer 2022        (all)

Neural style transfer is receiving significant attention and showing results. One approach trains by defining and optimizing perceptual loss functions in feed-forward convolutional neural networks. Work in this area addresses security issues relative to AI and ML and the hard problems of scalability, resilience, and predictive metrics.

Object Oriented Security 2022        (all)

The use of common object-oriented design patterns as a mechanism for access control is called Object-Oriented Security. These mechanisms can be easier to use and more effective than traditional security models. For the Science of Security community, OOP security models are of interest relative to the hard problems of resiliency, composability, and metrics.

Operating Systems Security 2022        (all)

Operating system security is a component of resiliency, composability, and an area of concern for predictive metrics.

Oscillating Behaviors 2022        (all)

Broadly speaking, signal processing covers signal acquisition and reconstruction, quality improvement, signal compression and feature extraction. Each of these processes introduces vulnerabilities into communications and other systems. The research articles cited here explore trust between networks, steganalysis, tracing passwords across networks, and certificates. They address the Science of Security hard problems related to privacy, resilience, metrics, and composability.

Outsourced Database Security 2022          (all)

The outsourcing of database security adds complexity and risk to the challenges of security. For the Science of Security community, the problems created are related to the hard problems of scalability, human behavior, predictive metrics, and resiliency.

Predictive Security Metrics 2022    (all)

Measurement is at the core of science. The development of accurate metrics is a major element for achieving a true Science of Security. It is also one of the hard problems to solve.

Privacy Policies 2022      (all)

The technical implementation of privacy problems is fraught with challenges. For the Science of Security community, this research is relevant to the hard problems of scalability and to human behavior.

Privacy Policies and Measurement 2022        (all)

Measuring the impact and technical implementation of privacy problems is fraught with challenges. For the Science of Security community, this research is relevant to the hard problems of metrics, scalability and to human behavior.

Protocol Verification 2022      (all)

Verifying the accuracy of security protocols is a primary goal of cybersecurity. Research into the area has sought to identify new and better algorithms and to identify better methods for verifying security protocols in myriad applications and environments. Verification has implications for compositionality and composability and for policy–based collaboration, as well as for privacy alone.

Provable Security 2022        (all)

The term “provable security” refers to those security methods which can be confirmed mathematically through a formal process. For the Science of Security community, these methods are important to solving the problems of resiliency, predictive metrics, and compositionality.

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer-reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

The Principal Investigators (PIs) of the Science of Security Lablets in collaboration with NSA Research, developed the 5 Hard Problems as a measure to establish the beginnings of a common language and gauge progress. These 5 were selected for their level of technical challenge, their potential operational significance,  and  their  likelihood  of  benefiting  from emphasis  on scientific  research  methods and improved measurement capabilities. The five are not intended to be all inclusive of everything that needs to be done in cybersecurity but rather five specific areas that need scientific progress. The five problems are: Scalability and Composability; Policy-Governed Secure Collaboration; Security Metrics Driven Evaluation, Design, Development, and Deployment; Resilient Architectures; and Understanding and Accounting for Human Behavior. 

 Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.

   Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.

   Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.

   Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.

   Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.

Submitted by grigby1 CPVI on