Pub Crawl #64

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Command Injection Attacks 2021  Image removed.    Image removed.  Image removed.     (all)

Command or shell injection is one of the most critical vulnerabilities. To the Science of Security community, command injection attacks impact cyber physical systems and are related to composability, resiliency, and metrics.

Compiler Security 2021  Image removed.    Image removed.  Image removed.     (all)

Much of software security focuses on applications, but compiler security should also be an area of concern. Compilers can “correct” secure coding in the name of efficient processing. The works cited here look at various approaches and issues in compiler security. For the Science of Security community, this work relates to resilience, scalability and compositionality, and metrics.

Composability 2021  Image removed.   (all)

Composability of security processes is one of the five hard problems for the Science of Security.

Compositionality 2021  Image removed.   (all)

Compositionality of security processes is one of the five hard problems for the Science of Security.

Compressive Sampling 2021  Image removed.      Image removed.     (all)

Compressive sampling (or compressive sensing) is an important theory in signal processing. It allows efficient acquisition and reconstruction of a signal and may also be the basis for user identification. For the Science of Security, the topic has implications for resilience, cyber-physical systems, privacy, and composability.

Computational Intelligence 2021  Image removed.           (all)

Computational intelligence includes such constructs as artificial neural networks, evolutionary computation, and fuzzy logic. It embraces biologically inspired algorithms such as swarm intelligence and artificial immune systems and includes broader fields such as image processing, data mining, and natural language processing. Its relevance to the Science of Security is related to composability and compositionality, as well as cryptography.

Computing Theory and Trust 2021  Image removed.      Image removed.  Image removed.   (all)

The works cited here combine research into computing theory with research into trust between humans and humans, between humans and computers, and between computers. For the Science of Security community, this work relates to the hard problems of human factors, resiliency, and composability.

Object Oriented Security 2021  Image removed.  Image removed.  Image removed.   (all)

The use of common object-oriented design patterns as a mechanism for access control is called Object-Oriented Security. These mechanisms can be easier to use and more effective than traditional security models. For the Science of Security community, OOP security models are of interest relative to the hard problems of resiliency, composability, and metrics.

Operating Systems Security 2021  Image removed.    Image removed.  Image removed.     (all)

Operating systems security is a component of resiliency, composability, and an area of concern for predictive metrics.

Oscillating Behaviors 2021  Image removed.  Image removed.  Image removed.   (all)

Broadly speaking, signal processing covers signal acquisition and reconstruction, quality improvement, signal compression and feature extraction. Each of these processes introduces vulnerabilities into communications and other systems. The research articles cited here explore trust between networks, steganalysis, tracing passwords across networks, and certificates. They address the Science of Security hard problems related to privacy, resilience, metrics, and composability.

Outsourced Database Security 2021  Image removed.    Image removed.  Image removed.  Image removed.   (all)

The outsourcing of database security adds complexity and risk to the challenges of security. For the Science of Security community, the problems created are related to the hard problems of scalability, human behavior, predictive metrics, and resiliency.

Pattern Locks 2021  Image removed.      Image removed.  Image removed.   (all)

Pattern locks are best known as the access codes using a series of lines connecting dots. Primarily familiar to Android users, research into pattern locks shows promise for many more uses. For the Science of Security community, they are important relative to the hard problems of human behavior, scalability, and resilience.

Power Grid Vulnerability Analysis 2021  Image removed.    Image removed.  Image removed.     (all)

The primary value of published research in power grid technologies--the use of cyber-physical systems to coordinate the generation, transmission, and use of electrical power and its sources-- is because of its strategic importance and the consequences of intrusion. Power grid vulnerability research is of particular importance to the Science of Security and its problems embrace several of the hard problems, notably resiliency, scalability, and metrics.

Science of Security 2020  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

Static Analysis 2019  Image removed.      Image removed.  Image removed.   (all)

Static code analysis is a standard method of testing software prior to production and marketing. Much of the work done in the Science of Security to look at code suggests that these analyses need to address security issues. Methods and practices cited in the research referenced here relate to human behavior, composability, and resiliency.

Static Analysis 2020  Image removed.      Image removed.  Image removed.   (all)

Static code analysis is a standard method of testing software prior to production and marketing. Much of the work done in the Science of Security to look at code suggests that these analyses need to address security issues. Methods and practices cited in the research referenced here relate to human behavior, composability, and resiliency.

Static Analysis 2021  Image removed.      Image removed.  Image removed.   (all)

Static code analysis is a standard method of testing software prior to production and marketing. Much of the work done in the Science of Security to look at code suggests that these analyses need to address security issues. Methods and practices cited in the research referenced here relate to human behavior, composability, and resiliency.

Trusted Platform Modules 2021  Image removed.      Image removed.     (all)

A Trusted Platform Module (TPM) is a computer chip that can securely store artifacts used to authenticate a network or platform. These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. Interest in TPMs is growing due to their potential for solving hard problems in security such as composability and cyber-physical system security and resilience.

Trust Routing 2020  Image removed.      Image removed.     (all)

Trust routing schemes are a key component for building resilient architectures and for composable and scalable security systems.

Trustworthiness 2021  Image removed.           (all)

Trustworthiness is created in information security through cryptography to assure the identity of external parties. They are essential to cybersecurity and to the Science of Security hard problem of composability.

Trustworthy Systems 2021  Image removed.      Image removed.     (all)

Trust is created in information security to assure the identity of external parties. Trustworthy systems are a key element in the security of cyber physical systems, resiliency, and composability.

Two Factor Authentication          Image removed.   (all)

Two factor authentication or 2FA is regarded as a solution to common attacks. However, it sometimes becomes a form of bait for attackers because it is often used to secure high value information. For the Science of Security community, it is relevant to the hard problem of human factors.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on