Pub Crawl #42

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Automated Secure Software Engineering 2019  Image removed.  Image removed.  (all)

A recurring problem in cybersecurity is the need to automate systems to reduce human effort and error and to be able to react rapidly and accurately to an intrusion or insertion. The articles cited here describe a number of interesting approaches related to the Science of Security hard topics, including resilience and composability.

Blockchain Security 2019  Image removed.  Image removed.  (all)

The blockchain is the “public ledger” of all Bitcoin transactions. It is a so-called “trustless” proof mechanism of all the transactions on the network. Access to it is public. Since the blockchain is the record of all Bitcoin transactions, it has a special need for security. For the Science of Security community, research into this problem is related to resiliency and scalability.

Compositionality 2018  Image removed.           (all)

Compositionality is one of the five hard problems in the Science of Security.

Compositionality 2019  Image removed.           (all)

Compositionality is one of the five hard problems in the Science of Security.

Computing Theory and Privacy 2018  Image removed.  Image removed.  Image removed.   (all)

Getting to the Science of Security will both require and generate fresh looks at computing theory. Privacy, too, is a research area with a theoretical underpinning worth researching. The work cited here is relevant to the Science of Security community problems of human behavior, resilience, and scalability.

Computing Theory and Privacy 2019  Image removed.  Image removed.  Image removed.   (all)

Getting to the Science of Security will both require and generate fresh looks at computing theory. Privacy, too, is a research area with a theoretical underpinning worth researching. The work cited here is relevant to the Science of Security community problems of human behavior, resilience, and scalability.

Computing Theory and Resilience 2019        Image removed.     (all)

The works cited here combine research into computing theory with research into the Science of Security hard problem of resiliency.

Computing Theory and Security Metrics 2019      Image removed.       (all)

The works cited here combine research into computing theory with research into the Science of Security hard problem of security metrics.

Concurrency and Security 2019  Image removed.    Image removed.  Image removed.     (all)

Concurrency, that is, support for simultaneous access, is relevant to the Science of Security hard problems of resiliency, composability, and predictive metrics and to cyberphysical systems in general.

Control Theory and Security 2019  Image removed.     Image removed.  Image removed.   (all)

In the Science of Security, control theory offers methods and approaches to potentially solve hard problems in resiliency. The research work presented here broadly addresses issues in security, touching on the Science of Security hard problems of resiliency, scalability, and human factors.

CPS Privacy 2018  Image removed.   (all)

The research work cited here looks at the Science of Security hard problem of human factors and privacy in the context of cyber physical systems.

CPS Privacy 2019  Image removed.   (all)

The research work cited here looks at the Science of Security hard problem of human factors and privacy in the context of cyber physical systems.

CPS Resilience 2018        Image removed.     (all)

The research work cited here looks at the Science of Security hard problem of resiliency in the context of cyber physical systems.

CPS Resilience 2019  Image removed.  (all)

The research work cited here looks at the Science of Security hard problem of resiliency in the context of cyber physical systems.

Cross Site Scripting 2019  Image removed.  Image removed.  Image removed.   (all)

The research work cited here looks at the Science of Security hard problem of human factors andA type of computer security vulnerability typically found in Web applications, cross-site scripting (XSS) enables attackers to inject client-side script into Web pages viewed by other users. Attackers may use a cross-site scripting vulnerability to bypass access controls such as the same origin policy. Consequences may range from petty nuisance to significant security risk, depending on the value of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner. A frequent method of attack, research is being conducted on methods to prevent, detect, and mitigate XSS attacks. For the Science of Security community, this work is relevant to the hard problems of human behavior, scalability, and resilience.

Dynamic Networks and Security 2018  Image removed.  Image removed.  Image removed.  (all)

Since the Bell System introduced “dynamic routing” several decades ago using the SS-7 signaling system, dynamic networks have been an important tool for network management and intelligence. For the Science of Security community, dynamic methods are useful toward the hard problems of resiliency, metrics, and composability.

Dynamic Networks and Security 2019  Image removed.  Image removed.  Image removed.  (all)

Since the Bell System introduced “dynamic routing” several decades ago using the SS-7 signaling system, dynamic networks have been an important tool for network management and intelligence. For the Science of Security community, dynamic methods are useful toward the hard problems of resiliency, metrics, and composability.

E-government and Cybersecurity 2018    Image removed.    Image removed.  Image removed.   (all)

Electronic government is a growing area for the delivery of services to citizens. However, attacks on government data bases create large problems for a government and its citizens through lost or manipulated information and personal privacy violations. For the Science of Security community, its issues related to human behavior, policy-based governance of information technology systems, and resilience.

E-government and Cybersecurity 2019    Image removed.    Image removed.  Image removed.   (all)

Electronic government is a growing area for the delivery of services to citizens. However, attacks on government data bases create large problems for a government and its citizens through lost or manipulated information and personal privacy violations. For the Science of Security community, its issues related to human behavior, policy-based governance of information technology systems, and resilience.

Expert Systems and Privacy 2019  Image removed.  Image removed.   (all)

Expert systems have potential for efficiency, scalability, and economy in systems security. The research work cited here looks at the problem of privacy. For the Science of Security community, the work is relevant to scalability and human factors.

Expert Systems and Security 2019  Image removed.  Image removed.  Image removed.   (all)

An expert system is an artificial intelligence (AI) application that uses a knowledge base of human expertise for problem solving. Its success is based on the quality of the data and rules obtained from the human expert. Some perform above and some below the level of humans. For the Science of Security, expert systems are relevant to the hard problems of scalability, human behavior, and resilience.

False Data Detection 2019  Image removed.  Image removed.  Image removed.   (all)

False data injection attacks against electric power grids potentially have major consequences. For the Science of Security community, the detection of false data injection is relevant to resiliency, composability, cyber physical systems, and human behavior.

Human Behavior and Cybersecurity 2018  Image removed.   (all)

Human behavior and cybersecurity is one of the five Hard Problems for the Science of Security.

Human Behavior and Cybersecurity 2019  Image removed.   (all)

Human behavior and cybersecurity is one of the five Hard Problems for the Science of Security.

Industrial Control Systems (ICS) Anomaly Detection 2019  Image removed.      Image removed.     (all)

Industrial control systems are a vital part of the critical infrastructure. Anomaly detection in these systems is requirement to successfully build resilient and scalable systems. The work cited here addresses these two hard problems in the Science of Security.

Internet of Vehicles 2019  Image removed.  Image removed.  Image removed.   (all)

The term “Internet of Vehicles” refers to a system of the Internet of Things related to automobiles and other vehicles. It may include Vehicular Ad-hoc Networks (VANETs). For the Science of Security community, it is important relative to cyber physical systems, resilience, human factors and metrics.

Kerberos 2019  Image removed.  Image removed.  Image removed.   (all)

Kerberos supports authentication in distributed systems. Used in intelligent systems, it is an encrypted data structure naming a user and a service the user may access. For the Science of Security community, it is relevant to the broad issues of cryptography and to resilience, human behavior, resiliency, and metrics.

KP-ABE 2019  Image removed.  Image removed.  (all)

Recent works show that the reality of privacy preserving and security in decentralized key policy ABE (KP-ABE) schemes are doubtful. How to construct a decentralized KP-ABE with privacy-preserving and user collusion avoidance remains a challenging problem. For the Science of Security community, the problem relates to resilience and scalability.

Science of Security 2019  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on