Pub Crawl #43

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

 

AI Poisoning 2019  Image removed.      Image removed.  Image removed.   (all)

Adversaries have an incentive to manipulate artificial intelligence (AI) and machine learning (ML) to their advantage. One way is through a poisoning attack in which the adversary feeds carefully crafted poisonous data points into the training set. For the Science of Security community, poisoning attacks are relevant to the hard problems of scalability, resilience, and human behavior.

Computing Theory and Compositionality 2019  Image removed.  Image removed.   (all)

The works cited here combine research into computing theory with research into the Science of Security hard problem of trust between humans and humans, humans and computers, and between computers.

Cybersecurity Education 2018  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

As a discipline in higher education, cybersecurity is less than two decades old. But because of the large number of qualified professionals needed, many universities offer cybersecurity education in a variety of delivery formats—live, online, and hybrid. To date, much of the curriculum has been driven by NSTISSI standards written in the early 1990s. The articles cited here look at aspects of curriculum, methods, evaluation, and support technologies. For the Science of Security community, these items are relevant to the areas of hard problems, privacy and cyber-physical systems.

Cybersecurity Education 2019  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

As a discipline in higher education, cybersecurity is less than two decades old. But because of the large number of qualified professionals needed, many universities offer cybersecurity education in a variety of delivery formats—live, online, and hybrid. To date, much of the curriculum has been driven by NSTISSI standards written in the early 1990s. The articles cited here look at aspects of curriculum, methods, evaluation, and support technologies. For the Science of Security community, these items are relevant to the areas of hard problems, privacy and cyber-physical systems.

Information Reuse and Security 2018  Image removed.  Image removed.  (all)

The objective of information reuse is to maximize the value of information by creating simple, rich, and reusable knowledge representations and integrating it into systems and applications. With reuse comes inherent security risk. For the Science of Security community, this problem is relevant to compositionality and resiliency.

Information Reuse and Security 2019  Image removed.  Image removed.  (all)

The objective of information reuse is to maximize the value of information by creating simple, rich, and reusable knowledge representations and integrating it into systems and applications. With reuse comes inherent security risk. For the Science of Security community, this problem is relevant to compositionality and resiliency.

Intellectual Property Security 2018  Image removed.  Image removed.    Image removed.     (all)

Intellectual Property protection continues to be a matter of major research interest. The topic is related to the Science of Security regarding resilience, policy-based governance, and composability.

Intellectual Property Security 2019  Image removed.  Image removed.    Image removed.     (all)

Intellectual Property protection continues to be a matter of major research interest. The topic is related to the Science of Security regarding resilience, policy-based governance, and composability.

Internet of Vehicles 2018      Image removed.  Image removed.  Image removed.   (all)

The term “Internet of Vehicles” refers to a system of the Internet of Things related to automobiles and other vehicles. It may include Vehicular Ad-hoc Networks (VANETs). For the Science of Security community, it is important relative to cyber physical systems, resilience, human factors and metrics.

IoBT 2018  Image removed.      Image removed.  Image removed.   (all)

The Internet of Battlefield Things (IoBT) is distinct from the general Internet of Things due to the nature of the hardened specific networks employed under battlefield conditions. For the Science of Security community, this work is relevant to scalability, resilience, and human factors.

IoBT 2019  Image removed.      Image removed.  Image removed.   (all)

The Internet of Battlefield Things (IoBT) is distinct from the general Internet of Things due to the nature of the hardened specific networks employed under battlefield conditions. For the Science of Security community, this work is relevant to scalability, resilience, and human factors.

I/O Systems Security 2018  Image removed.           (all)

Management of I/O devices is a critical part of the operating system. Entire I/O subsystems are devoted to its operation. These subsystems contend both with the movement towards standard interfaces for a wide range of devices to makes it easier to add newly developed devices to existing systems, and the development of entirely new types of devices for which existing standard interfaces can be difficult to apply. Typically, when accessing files, a security check is performed when the file is created or opened. The security check is typically not done again unless the file is closed and reopened. If an opened file is passed to an untrusted caller, the security system can, but is not required to prevent the caller from accessing the file. The research is relevant to the Science of Security problem of scalability.

I/O Systems Security 2019  Image removed.           (all)

Management of I/O devices is a critical part of the operating system. Entire I/O subsystems are devoted to its operation. These subsystems contend both with the movement towards standard interfaces for a wide range of devices to makes it easier to add newly developed devices to existing systems, and the development of entirely new types of devices for which existing standard interfaces can be difficult to apply. Typically, when accessing files, a security check is performed when the file is created or opened. The security check is typically not done again unless the file is closed and reopened. If an opened file is passed to an untrusted caller, the security system can, but is not required to prevent the caller from accessing the file. The research is relevant to the Science of Security problem of scalability.

IP Piracy 2018  Image removed.  Image removed.  Image removed.  (all)

Theft of Intellectual Property, that is, piracy, continues to be a matter of major research interest. The topic is related to the Science of Security regarding resilience, policy-based governance, and composability.

IP Piracy 2019  Image removed.  Image removed.  Image removed.  (all)

Theft of Intellectual Property, that is, piracy, continues to be a matter of major research interest. The topic is related to the Science of Security regarding resilience, policy-based governance, and composability.

Linux Operating System Security 2019  Image removed.  Image removed.  Image removed.   (all)

Operating system security is a component of resiliency, composability, and an area of concern for predictive metrics. This research focuses on the Linux kernel.

Location Privacy in Wireless Networks 2018  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Privacy services on mobile devices are a major issue in cybersecurity. For the Science of Security community, the problem relates to resiliency, metrics, human behavior, and compositionality.

Location Privacy in Wireless Networks 2019  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Privacy services on mobile devices are a major issue in cybersecurity. For the Science of Security community, the problem relates to resiliency, metrics, human behavior, and compositionality.

Malware Analysis 2019  Image removed.  Image removed.  Image removed.   (all)

Malware analysis, along with detection and classification, is a major issue cybersecurity. For the Science of Security community, malware classification is related to privacy, predictive metrics, human behavior and resiliency.

Malware Classification 2019      Image removed.  Image removed.  Image removed.   (all)

Malware classification, along with detection and analysis, is a major issue cybersecurity. For the Science of Security community, malware classification is related to privacy, predictive metrics, human behavior and resiliency.

MANET Attack Detection 2019   Image removed.  Image removed.  Image removed.     (all)

Security is an important research issue for mobile ad hoc networks (MANETs). The work cited here looks at attack detection. For the Science of Security community, this work relates to the hard problems of resilience, metrics, and compositionality.

MANET Attack Prevention 2019  Image removed.  Image removed.  Image removed.     (all)

Security is an important research issue for mobile ad hoc networks (MANETs). The work cited here looks at attack prevention. For the Science of Security community, this work relates to the hard problems of resilience, metrics, and compositionality.

MANET Privacy 2018  Image removed.  Image removed.  Image removed.     (all)

Privacy is an important research issues for mobile ad hoc networks (MANETs). For the Science of Security community, this work relates to the hard problems of resilience, metrics, and compositionality.

MANET Privacy 2019  Image removed.  Image removed.  Image removed.     (all)

Privacy is an important research issues for mobile ad hoc networks (MANETs). For the Science of Security community, this work relates to the hard problems of resilience, metrics, and compositionality.

Measurement and Metrics Testing 2018  Image removed.  (all)

Measurement and metrics are hard problems in the Science of Security. The research cited here looks at methods and techniques for testing the validity of measurement and metrics techniques.

Measurement and Metrics Testing 2019  Image removed.  (all)

Measurement and metrics are hard problems in the Science of Security. The research cited here looks at methods and techniques for testing the validity of measurement and metrics techniques.

Operating Systems Security 2018  Image removed.    Image removed.  Image removed.     (all)

Operating system security is a component of resiliency, composability, and an area of concern for predictive metrics.

Outsourced Database Integrity 2019  Image removed.  Image removed.  Image removed.  (all)

The growth of distributed storage systems such as the Cloud has produced novel security problems. The works cited here address untrusted servers, generic trusted data, trust extension on commodity computers, defense against frequency-based attacks in wireless networks, and other topics. For the Science of Security community, these topics relate to composability, metrics, and resilience.

Resilient Security Architectures 2018  Image removed.  (all)

The development of resilient security architectures is one of the five hard problems for the Science of Security.

Resilient Security Architectures 2019  Image removed.  (all)

The development of resilient security architectures is one of the five hard problems for the Science of Security.

Science of Security 2019  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

Security Policies Analysis 2018    Image removed.         (all)

Policy-based access controls and security policies are intertwined in most commercial systems. Analytics use abstraction and reduction to improve policy-based security. For the Science of Security community, policy-based governance is one of the five Hard Problems.

Security Policies Analysis 2019    Image removed.         (all)

Policy-based access controls and security policies are intertwined in most commercial systems. Analytics use abstraction and reduction to improve policy-based security. For the Science of Security community, policy-based governance is one of the five Hard Problems.

Smart Grid Consumer Privacy 2019  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Concerns about consumer privacy and electric power usage have impacted utilities fielding of smart-meters. Securing power meter readings in a way that addresses while protecting consumer privacy is a concern of research designed to help alleviate those concerns. For the Science of Security community, privacy is a core topic.

Stochastic Computing Security 2019  Image removed.      Image removed.     (all)

Although stochastic computing was historically considered a failure, it may still remain relevant for solving certain problems, including machine learning and control, stochastic decoding, which applies stochastic computing to the decoding of error correcting codes, and image processing tasks such as edge detection and image thresholding. For the Science of Security community, it is of interest relative to resilience and scalability.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on