Pub Crawl #6

 

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Analogies 2016  Image removed.  (all)

The use of analogies and simulations is used to overcome fixed ways of viewing particular problems or objects to achieve break-through thinking. The topic relates to the hard problem of human factors in the Science of Security. 

Artificial Intelligence Security 2016   Image removed. Image removed. Image removed. Image removed.  (all)

John McCarthy, coined the term "Artificial Intelligence" in 1955 and defined it as "the science and engineering of making intelligent machines." (as quoted in Poole, Mackworth & Goebel, 1998) AI research is highly technical and specialized, and has been characterized as "deeply divided into subfields that often fail to communicate with each other." (McCorduck, Pamela (2004), Machines Who Think (2nd ed.)) These divisions are attributed to both technical and social factors. For the Science of Security community, AI research has implications for resilience, composability, metrics, and human behavior. 

Big Data Privacy 2016   Image removed. Image removed. Image removed.  (all)

Privacy issues related to Big Data are a growing area of interest for researchers. For the Science of Security community, this work is relevant to scalability, resilience, human behavior, and compositionality. The work presented here addresses methodologies to protect personal information using both technical and policy solutions. 

Data Deletion 2016   Image removed.  Image removed.  Image removed.  (all)

Data deletion has many implications for security and for data structures. For the Science of Security community, the problem has implications for privacy and scalability. 

DNA Security 2016    Image removed.  Image removed. Image removed.   (all)

DNA-based cryptography is a developing interdisciplinary area combining cryptography, mathematical modeling, biochemistry and molecular biology as the basis for encryption. It is important to the Science of Security community relative to the problems of composability, resilience, and metrics. 

Identity Management 2016   Image removed.  Image removed. Image removed.  Image removed. (all)

The term identity management refers to the management of individual identities, their roles, authentication, authorizations and privileges within or across systems. One of the core competencies for cybersecurity, the increasingly complex IT world demands smarter identity management solutions. Research in this area relates to the Science of Security issues of scalability, resilience, metrics, and human behavior. 

Immersive Systems and Security 2016   Image removed.  Image removed. Image removed. (all)

Immersive systems, commonly known as “virtual reality”, are used for a variety of functions such as gaming, rehabilitation, and training. These systems mix the virtual with the actual, and have implications for cybersecurity because attackers may make the jump from virtual to actual systems. For the Science of Security community, this work is relevant to resilience, human factors, cyber physical systems, privacy, and composability. 

Information Forensics 2016   Image removed.  Image removed.  Image removed. Image removed. Image removed.  (all)

Forensics is an important tool for tracking and evaluating past attacks and using the information gained to resolve hard problems in the science of security. The work cited here, looks at policies, methodologies, and tools.

IPv6 Security 2016    Image removed.  Image removed.  Image removed. Image removed.   (all)

Internet Protocol Version 6 is slowly being adopted as the replacement for version 4. Touted as a more secure protocol with increased address space, portability, and greater privacy, research into this and other related protocols has increased, particularly in the context of smart grid, mobile communications, and cloud computing. For the Science of Security community, it is relevant to resiliency, composability, metrics, and policy-based governance. 

Linux Operating Systems Security 2016   Image removed.  Image removed. Image removed.  (all)

Operating system security is a component of resiliency, composability, and an area of concern for predictive metrics. This research focused on the Linux operating system. 

MANET Privacy 2016   Image removed.  Image removed. Image removed.  (all)

Mobile Ad Hoc Networks (MANETS) and Vehicle Ad Hoc Networks (VANETS) are cyber and cyberphysical systems of interest to the Science of Security community. Privacy issues are related to the problems of human behavior, scalability and resilience. 

MANET Security 2016   Image removed.  Image removed. Image removed. Image removed. Image removed. (all)

Mobile Ad Hoc Networks (MANETS) and Vehicle Ad Hoc Networks (VANETS) are cyber and cyberphysical systems of interest to the Science of Security community. All five hard problems have relevant issues related to MANET security. 

Moving Target Defenses 2016   Image removed.  Image removed. Image removed. (all)

Moving Target Defense (MTD) research focuses on the presentation of a dynamic attack surface to an adversary, increasing the work factor necessary to successfully attack and exploit a cyber target. For the Science of Security community, MTD is related to scalability, resilience and predictive metrics. The works cited here were presented in 2015.

Object Oriented Security 2016   Image removed.  Image removed. Image removed.  (all)

The use of common object-oriented design patterns as a mechanism for access control is called Object-Oriented Security. These mechanisms can be easier to use and more effective than traditional security models. For the Science of Security community, OOP security models are of interest relative to the hard problems of resiliency, composability, and metrics. 

Peer to Peer Security 2016   Image removed.  Image removed.  Image removed. Image removed. Image removed.  (all)

In a peer-to-peer (P2P) network, tasks such as searching for files or streaming audio or video are shared among multiple interconnected nodes--peers-- who share resources with other network participants without the need for centralized coordination by servers. Peer-to-peer systems pose considerable challenges for computer security. Like other forms of software, P2P applications can contain vulnerabilities, but what makes security particularly dangerous for P2P software is that peer-to-peer applications act as servers as well as clients, making them more vulnerable to remote exploits. 

Random Key Generation 2016   Image removed. Image removed. Image removed. Image removed.  (all)

Random and pseudorandom numbers can be used for the generation, exchange, storage, use, and replacement of keys, key servers, cryptographic protocols, and user procedures. For researchers, random key generation is a challenge to create larger scale and faster systems to operate within the cloud and other complex environments, while ensuring validity and not adding weight to the process. For the Science of Security community, it is relevant to scalability, resilience, metrics, and human behavior. 

Relational Database Security 2016   Image removed.  Image removed. Image removed. Image removed.  (all)

A majority of enterprises store their most sensitive data in relational databases, including personally identifiable information (PII), financial records, and supply chain information. These databases are also the most frequently hacked. For the Science of Security community, relational database security is important for resilience, composability human behavior, and metrics. 

Searchable Encryption 2016    Image removed.  Image removed.  (all)

Searchable encryption allows one to store encrypted data externally, but still allow for easy data searches that do not require the search to download everything before decrypting and to allow others to search data without having access to plaintext. As an application, it is becoming increasingly important in the Cloud environment. For the Science of Security community, it is an area of research related to cryptography, resilience, and composability. 

Self-healing Networks 2016   Image removed.  Image removed.  (all)

Self-healing networks are an important goal for cyber physical systems. Resiliency and composability are essential elements. 

SDN Security 2016   Image removed.  Image removed.  (all)

Software Defined Network (SDN) architectures have been developed to provide improved routing and networking performance for broadband networks by separating the control plain from the data plain. This separation also provides opportunities and challenges for SDN as a security element in IoT and cyberphysical systems. For the Science of Security community, it is relevant to scalability, resilience, and scalability. 

Software Assurance 2016    Image removed. (all)

Software assurance is an essential element in the development of scalable and composable systems. For a complete system to be secure, each subassembly must be secure. 

Taint Analysis 2016   Image removed.  Image removed.  (all)

Taint analysis is an important method for analyzing software to determine possible paths for exploitation. As such, it relates to the problems of composability and metrics. 

User Privacy in the Cloud 2016   Image removed.  Image removed. Image removed. (all)

Privacy is a major problem for distributed file systems, that is, in the Cloud. For the Science of Security community, this work is relevant to scalability, resilience, and metrics. 

Windows Operating Systems Security 2016   Image removed.  Image removed. Image removed.   (all)

Operating system security is a component of resiliency, composability, and an area of concern for predictive metrics. This research focused on the Windows operating system. 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on