Pub Crawl #61

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

 

Decomposition 2021  Image removed.    Image removed.       (all)

Mathematical decomposition is often used to address network flows. For the Science of Security community, decomposition is a useful method of dealing with cyber physical systems issues, metrics, and compositionality.

DeepFake 2021  Image removed.    Image removed.  Image removed.  Image removed.   (all)

“DeepFakes” are realistic but phony facial images produced by generative adversarial networks (GANs) with manipulated audio and/or video clips. There are many ways to use counterfeit contents for nefarious or unlawful purposes. For the Science of Security community, deepfakes are important to the hard problems of metrics, scalability, resilience, and human factors.

Deep Packet Inspection 2021  Image removed.      Image removed.     (all)

Deep Packet Inspection offers providers a new range of use cases, some with the potential to eavesdrop on non-public communication. Current research is almost exclusively concerned with raising the capability on a technological level, but critics question it with regard to privacy, net neutrality, and other implications. These latter issues are not being raised within research communities as much as by politically interested groups. For the Science of Security community, it is relevant to scalability and resilience.

Deep Video 2021  Image removed.    Image removed.  Image removed.     (all)

The use of video for surveillance has created a need to be able to process very large volumes of data in very precise ways. Research into these methods is relevant to the Science of Security hard problems of scalability, resilience, and metrics.

Deterrence 2021  Image removed.      Image removed.  Image removed.   (all)

Finding ways both technical and behavioral to provide disincentives to threats is a promising area of research. Since most cybersecurity is “bolt on” rather than embedded, and since detection, response, and forensics are expensive, time-consuming processes, discouraging attacks can be a cost-effective cybersecurity approach. The topic is relevant to the Science of Security hard problems of human behavior, scalability, and resilience.

Differential Privacy 2021  Image removed.      Image removed.  Image removed.   (all)

The theory of differential privacy is an active research area, and there are now differentially private algorithms for a wide range of problems. This research looks at big data and cyber physical systems, as well as theoretic approaches. For the Science of Security community, differential privacy relates to composability and scalability, resiliency, and human behavior.

Digital Signatures 2021  Image removed.      Image removed.     (all)

A digital signature is one of the most common ways to authenticate. Using a mathematical scheme, the signature assures the reader that the message was created and sent by a known sender. But not all signature schemes are secure. The research challenge is to find new and better ways to protect, transfer, and utilize digital signatures. For the Science of Security community, this work is relevant to scalability and resilience.

DNA Cryptography 2021      Image removed.  Image removed.  Image removed.   (all)

DNA-based cryptography is a developing interdisciplinary area combining cryptography, mathematical modeling, biochemistry and molecular biology as the basis for encryption. For the Science of Security committee, it is relevant to the hard problems of human behavior, resilience, predictive metrics, and privacy.

Dynamical Systems Security 2021  Image removed.    Image removed.  Image removed.     (all)

Research into dynamical systems cited here focuses on non-linear and chaotic dynamical systems and in proving abstractions of dynamical systems through numerical simulations. Many of the applications studied are cyber-physical systems and are relevant to the Science of Security hard problems of resiliency, predictive metrics and composability.

Edge Detection and Security 2021  Image removed.    Image removed.  Image removed.     (all)

Edge detection is an important issue in image and signal processing. For the Science of Security community, the subject is relevant to issues in composability, scalability, predictive metrics, and resiliency.

Efficient Encryption 2021  Image removed.      Image removed.     (all)

The term "efficient encryption" generally refers to the speed of an algorithm, that is, the time needed to complete the calculations to encrypt or decrypt a coded text. The research cited here shows a broader concept and looks both at hardware and software, as well as power consumption. The research relates to cyber physical systems, resilience and composability.

Elliptic Curve Cryptography 2021  Image removed.    Image removed.  Image removed.     (all)

Elliptic curve cryptography is a major research area globally. It is relevant to solving the hard problems of interest to the Science of Security community of scalability, resilience, and metrics.

Encryption Audits 2021  Image removed.  Image removed.  Image removed.   (all)

Encryption audits not only test the validity and effectiveness of protection schemes, they also potentially provide data for developing and improving metrics about data security. For the Science of Security community, this work is relevant to helping solve the hard problems of predictive metrics, compositionality, resiliency.

Expandability 2021  Image removed.  Image removed.   (all)

The expansion of a network to more nodes creates security problems. For the Science of Security community, expandability relates to resilience and compositionality.

Science of Security 2020  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

Taint Analysis 2021  Image removed.  Image removed.   (all)

Taint analysis is an important method for analyzing software to determine possible paths for exploitation. As such, it relates to the problems of composability and metrics.

Tamper Resistance 2021  Image removed.    Image removed.  Image removed.   (all)

Tamper resistance is an important element for composability of software systems and for security of cyber physical system resilience. For the Science of Security community, it is also relevant to scalability, metrics, and human factors.

Text Analytics 2021  Image removed.    Image removed.    Image removed.   (all)

The term “text analytics” refers to linguistic, statistical, and machine learning techniques that model and structure the information content of textual sources for intelligence, exploratory data analysis, research, or investigation. The research cited here focuses on large volumes of text mined to identify insider threats, intrusions, and malware detection. It is of interest to the Science of Security community relative to metrics, scalability and composability, and human factors.

Theoretical Cryptography 2021  Image removed.           (all)

Cryptography can only exist if there is a mathematical hardness to it constructed to maintain a desired functionality, even under malicious attempts to change or destroy the prescribed functionality. The foundations of theoretical cryptography are the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural ``security concerns' mathematically using probability-based definitions, various constructions, complexity theoretic primitives and proofs of security. For the Science of Security community, this work is relevant to the broad problem of developing a science, as well as contributing to the solution of the hard problems of composability and compositionality.

Threat Mitigation 2021      Image removed.  Image removed.  Image removed.   (all)

Threat mitigation is a continuous need in cybersecurity. For the Science of Security community, threat mitigation is related to resiliency, metrics, and human behavior.

Threat Vectors 2021      Image removed.       (all)

As systems become larger and more complex, the surface that hackers can attack also grows. Is this set of recent research articles, topics are explored that include smartphone malware, zero-day polymorphic worm detection, source identification, drive-by download attacks, two-factor face authentication, semantic security, and code structures. Of particular interest to the Science of Security community are the research articles focused on measurement and on privacy.

Trojan Horse Detection 2021  Image removed.      Image removed.  Image removed.   (all)

Detection and neutralization of hardware-embedded Trojans is a difficult problem. Current research is attempting to find ways to develop detection methods and processes and to automate the process. This research is relevant to cyber physical systems security, resilience and composability, as well as being an issue in supply chain security.

Ubiquitous Computing 2021  Image removed.    Image removed.  Image removed.  Image removed.   (all)

Ubiquitous computing is a concept in software engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. Incorporating all aspects of the cyber world, including the internet, the processor, the Cloud, and so on, ubiquitous computing has significant security challenges. The Science of Security community, the work cited here is relevant to scalability, metrics, human factors and resilience.

Underwater Networks Security 2021  Image removed.    Image removed.  Image removed.     (all)

Underwater networks have some unique security issues related to the environment they operate in. For the Science of security community, the research conducted and presented here is relevant to cyber-physical systems and work on resiliency, metrics, and scalability.

User Privacy in the Cloud 2021  Image removed.    Image removed.  Image removed.     (all)

Privacy is a major problem for distributed file systems, that is, in the Cloud. For the Science of Security community, this work is relevant to scalability, resilience, and metrics.

Video Surveillance 2021      Image removed.  Image removed.  Image removed.   (all)

Video surveillance is a fast-growing area of public security. With it have come policy issues related to privacy. Technical issues and opportunities have also arisen, including the potential to use advanced methods to provide positive identification, abnormal behaviors in crowds, intruder detection, and information fusion with other data. For the Science of Security community, it is relevant to human behavior, metrics, and resiliency.

Virtual Machine Security 2021  Image removed.      Image removed.   (all)

Arguably, virtual machines are more secure than actual machines. This idea is based on the notion that an attacker cannot jump the gap between the virtual and the actual. The growth of interest in cloud computing suggest it is time for a fresh look at the vulnerabilities in virtual machines. In the articles presented below, security concerns are addressed in some interesting ways. For the Science of Security community, virtualization is related to composability, resiliency, cyber physical systems, and cryptography.

Visible Light Communications Security 2021  Image removed.    Image removed.  Image removed.   (all)

Visible light communication (VLC) offers an unregulated and free light spectrum and potentially could be a solution for overcoming overcrowded radio spectrum, especially for wireless communication systems, and doing it securely. For the Science of Security community, this work is relevant to resiliency, scalability, and metrics.

Vulnerability Detection 2021  Image removed.    Image removed.  Image removed.  Image removed.   (all)

Vulnerability detection is a topic for which a great deal of research is being done. For the Science of Security community, vulnerability detection research is relevant to human behavior, resiliency, compositionality, and metrics.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on