Pub Crawl #45

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Acoustic Fingerprints 2020   Image removed.     Image removed.  Image removed.  (all)

Acoustic fingerprints can be used to identify an audio sample or quickly locate similar items in an audio database. As a security tool, fingerprints offer a modality of biometric identification of a user. Current research is exploring various aspects and applications, including the use of these fingerprints for mobile device security, antiforensics, use of image processing techniques, and client side embedding. For the Science of Security community, they are relevant to the problems of resiliency, human behavior and composability.

Actuator Security 2020  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Cyber physical system security requires the need to build secure sensors and actuators. The research work here addresses the Science of Security hard problems of human behavior, resiliency, metrics and composability for actuator security.

Advanced Persistent Threat 2020  Image removed.    Image removed.  Image removed.  Image removed.  (all)

Advanced persistent threats are the subject of considerable research of interest to the Science of Security community. Research areas address the hard problems of human behavior, scalability, resilience, and metrics.

APIs 2020  Image removed.      Image removed.     (all)

Applications Programming Interfaces, APIs, are definitions of interfaces to systems or modules. As code is reused, more and more are modified from earlier code. For the Science of Security community, the problems of compositionality and resilience are direct.

Asymmetric Encryption 2020  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Asymmetric, or public key, encryption is a cornerstone of cybersecurity. The research presented here looks at key distribution, compares symmetric and asymmetric security, and evaluates cryptographic algorithms, among other approaches. For the Science of Security community, encryption is a primary element for resiliency, compositionality, metrics, and behavior.

Attack Graphs 2020  Image removed.  Image removed.  Image removed.  (all)

Security analysts use attack graphs for detection, defense and forensics. An attack graph is defined as a representation of all paths through a system that end in a state where an intruder has successfully breached the system. They are an important tool for the Science of Security related to predictive metrics, resiliency, and composability.

Chaotic Cryptography 2019  Image removed.  Image removed.  Image removed.  (all)

Chaos-based cryptography systems are gaining interest as a way to provide robust protection, especially against statistical attacks. For the Science of Security community, this approach is related to the hard problems of scalability, resilience, metrics.

Chaotic Cryptography 2020  Image removed.  Image removed.  Image removed.  (all)

Chaos-based cryptography systems are gaining interest as a way to provide robust protection, especially against statistical attacks. For the Science of Security community, this approach is related to the hard problems of scalability, resilience, metrics.

Dark Web 2020          Image removed.   (all)

The Dark Web, or Darknet, is a subset of the deep web that is not indexed and requires something special to access it. Much of the activity on it is extra- or illegal, pornographic, or otherwise unseemly. For the Science of Security community, understanding of the activities on the Dark Web related to human behavior issues.

Data Deletion 2020  Image removed.  (all)

Data deletion has many implications for security and for data structures. For the Science of Security community, the problem has implications for privacy and scalability.

DeepFake 2019  Image removed.    Image removed.  Image removed.  Image removed.   (all)

“DeepFakes” are realistic but phony facial images produced by generative adversarial networks (GANs) with manipulated audio and/or video clips. There are many ways to use counterfeit contents for nefarious or unlawful purposes. For the Science of Security community, deepfakes are important to the hard problems of metrics, scalability, resilience, and human factors.

DeepFake 2020  Image removed.    Image removed.  Image removed.  Image removed.   (all)

“DeepFakes” are realistic but phony facial images produced by generative adversarial networks (GANs) with manipulated audio and/or video clips. There are many ways to use counterfeit contents for nefarious or unlawful purposes. For the Science of Security community, deepfakes are important to the hard problems of metrics, scalability, resilience, and human factors.

Deep Packet Inspection 2020  Image removed.  Image removed.  (all)

Deep Packet Inspection offers providers a new range of use cases, some with the potential to eavesdrop on non-public communication. Current research is almost exclusively concerned with raising the capability on a technological level, but critics question it with regard to privacy, net neutrality, and other implications. These latter issues are not being raised within research communities as much as by politically interested groups. For the Science of Security community, it is relevant to scalability and resilience.

Deep Video 2020  Image removed.    Image removed.  Image removed.     (all)

The use of video for surveillance has created a need to be able to process very large volumes of data in very precise ways. Research into these methods is relevant to the Science of Security hard problems of scalability, resilience, and metrics.

Deterrence 2020  Image removed.  Image removed.  Image removed.   (all)

Finding ways both technical and behavioral to provide disincentives to threats is a promising area of research. Since most cybersecurity is “bolt on” rather than embedded, and since detection, response, and forensics are expensive, time-consuming processes, discouraging attacks can be a cost-effective cybersecurity approach. The topic is relevant to the Science of Security hard problems of human behavior, scalability, and resilience.

Differential Privacy 2020  Image removed.  Image removed.  Image removed.   (all)

The theory of differential privacy is an active research area, and there are now differentially private algorithms for a wide range of problems. This research looks at big data and cyber physical systems, as well as theoretic approaches. For the Science of Security community, differential privacy relates to composability and scalability, resiliency, and human behavior.

Fuzzy Cryptography 2019  Image removed.    Image removed.  Image removed.     (all)

Fuzzy cryptology uses fuzzy set theory to be used as a tool in securing cryptosystems. For the Science of Security community, this topic is relevant to the hard problems of scalability, resilience, and metrics.

Fuzzy Cryptography 2020  Image removed.  Image removed.  Image removed.  (all)

Fuzzy cryptology uses fuzzy set theory to be used as a tool in securing cryptosystems. For the Science of Security community, this topic is relevant to the hard problems of scalability, resilience, and metrics.

Science of Security 2019  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on