Pub Crawl #51

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

 

AI Poisoning 2020  Image removed.  Image removed.  Image removed.    (all)

Adversaries have an incentive to manipulate artificial intelligence (AI) and machine learning (ML) to their advantage. One way is through a poisoning attack in which the adversary feeds carefully crafted poisonous data points into the training set. For the Science of Security community, poisoning attacks are relevant to the hard problems of scalability, resilience, and human behavior.

Augmented Reality 2020  Image removed.      Image removed.  Image removed.    (all)

Augmented Reality (AR) offers a combination of physical and virtual objects. It differs from virtual reality by allowing users to sight the real world enhanced with virtual objects. In certain applications, security breaches could morph those enhancements into liabilities. For the Science of Security community, research into this subject is relevant to the hard problems of scalability, resilience, privacy, and human behavior.

Automated Response Actions 2020  Image removed.  Image removed.  (all)

A recurring problem in cybersecurity is the need to automate systems to reduce human effort and error and to be able to react rapidly and accurately to an intrusion or insertion. The articles cited here describe a number of interesting approaches related to the Science of Security hard topics, including resilience and composability.

Automated Secure Software Engineering 2020  Image removed.      Image removed.      (all)

Automation of secure software engineering holds promise for reducing coding errors that can be exploited. For the Science of Security community, such processes can be keys to composability and resiliency.

Autonomic Security 2020  Image removed.      Image removed.      (all)

A recurring problem in cybersecurity is the need to automate systems to reduce human effort and error and to be able to react rapidly and accurately to an intrusion or insertion. The articles cited here describe a number of interesting approaches related to the Science of Security hard topics, including resilience and composability.

Black Box Attacks 2020  Image removed.  Image removed.  Image removed.  (all)

Black box attacks occur against “security of a cryptographic algorithm studied in the ‘black-box’ model: e.g., for symmetric encryption, the attacker is given access to a "device" which runs the encryption algorithm with a given key, and can submit plaintexts and ciphertexts, the goal of the attacker being to be able to decrypt a given block without submitting that exact block as ciphertext.” For the Science of Security community, back box cryptography is important to composability, metrics, and resilience.

Computing Theory and Privacy 2020  Image removed.  (all)

The work cited here combine research into computing theory with research into the Science of Security hard problem of privacy.

Computing Theory and Resilience 2020  Image removed. Image removed. (all)

The work cited here combine research into computing theory with research into the Science of Security hard problem of composability and compositionality.

False Data Detection 2020  Image removed.      Image removed.  Image removed.    (all)

False data injection attacks against electric power grids potentially have major consequences. For the Science of Security community, the detection of false data injection is relevant to resiliency, composability, cyber physical systems, and human behavior.

False Trust 2020  Image removed.  Image removed.  Image removed.  (all)

If malware creates a trust situation which is not real, that is, false, a series of security issues are created. For the Science of Security community, this situation is relevant to policy-based governance, scalability, and resilience.

Fog Computing and Security 2020  Image removed.  Image removed.  (all)

Fog computing is a concept that extends the Cloud concept to the end user. As with most new technologies, a survey of the scope and types of security problems is necessary. Much of this research relates to the Internet of Things. For the Science of Security community, it is relevant to the hard problems of resilience and scalability.

Forward Error Correction and Security 2020  Image removed.    Image removed.  Image removed.      (all)

Forward Error Correction, also known as Channel coding, are methods for controlling errors in data transmissions over noisy or unreliable communications channels. For cybersecurity, these methods can also be used to ensure data integrity, as some of the research cited below shows. The work cited here relates to the Science of Security problems of metrics, resiliency, and composability.

Intellectual Property Security 2020  Image removed.  Image removed.  Image removed.  (all)

Intellectual Property protection continues to be a matter of major research interest. The topic is related to the Science of Security regarding resilience, policy-based governance, and composability.

Intelligent Data and Security 2020  Image removed.      Image removed.      (all)

The term “intelligent data” refers to data that directly feeds decision-making processes. It has real time critical importance and therefore needs a high degree of integrity. For the Science of Security community, it is important to the hard problems of resilience, scalability, and compositionality.

Internet of Vehicles Security 2020      Image removed.  Image removed.  Image removed.    (all)

The term “Internet of Vehicles” refers to a system of the Internet of Things related to automobiles and other vehicles. It may include Vehicular Ad-hoc Networks (VANETs). For the Science of Security community, it is important relative to cyber physical systems, resilience, human factors and metrics.

Science of Security 2019  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

Two Factor Authentication 2020          Image removed.    (all)

Two factor authentication or 2FA is regarded as a solution to common attacks. However, it sometimes becomes a form of bait for attackers because it is often used to secure high value information. For the Science of Security community, it is relevant to the hard problem of human factors.

Ubiquitous Computing Security 2020  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Ubiquitous computing is a concept in software engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. Incorporating all aspects of the cyber world, including the internet, the processor, the Cloud, and so on, ubiquitous computing has significant security challenges. The Science of Security community, the work cited here is relevant to scalability, metrics, human factors and resilience.

Underwater Networks Security 2020  Image removed.    Image removed.  Image removed.      (all)

Underwater networks have some unique security issues related to the environment they operate in. For the Science of security community, the research conducted and presented here is relevant to cyber-physical systems and work on resiliency, metrics, and scalability.

User Privacy in the Cloud 2020  Image removed.    Image removed.  Image removed.      (all)

Privacy is a major problem for distributed file systems, that is, in the Cloud. For the Science of Security community, this work is relevant to scalability, resilience, and metrics.

Video Surveillance 2020  Image removed.  Image removed.  Image removed.    (all)

Video surveillance is a fast-growing area of public security. With it have come policy issues related to privacy. Technical issues and opportunities have also arisen, including the potential to use advanced methods to provide positive identification, abnormal behaviors in crowds, intruder detection, and information fusion with other data. For the Science of Security community, it is relevant to human behavior, metrics, and resiliency.

Virtualization Privacy 2020  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Virtualization is seen as a means of enhancing security by maintaining a gap between the end user and the host. But privacy or virtual data is a growing problem, especially when the virtual system is in the Cloud. For the Science of Security community, virtualization privacy is related to the hard problems of resilience, composability, metrics, and privacy, an issue in human behavior.

Virtual Machine Security 2020  Image removed.      Image removed.      (all)

Arguably, virtual machines are more secure than actual machines. This idea is based on the notion that an attacker cannot jump the gap between the virtual and the actual. The growth of interest in cloud computing suggests it is time for a fresh look at the vulnerabilities in virtual machines. In the articles presented below, security concerns are addressed in some interesting ways. For the Science of Security community, virtualization is related to composability, resiliency, cyber physical systems, and cryptography.

 

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on