Pub Crawl #65

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

 

Computing Theory and Resilience 2021  Image removed.           (all)

The work cited here combine research into computing theory with research into the Science of Security hard problem of composability and compositionality.

Computing Theory and Security 2021      Image removed.       (all)

The works cited here combine research into computing theory with research into the Science of Security hard problem of security metrics.

Computing Theory and Security Metrics 2021      Image removed.       (all)

The works cited here combine research into computing theory with research into the Science of Security hard problem of security metrics.

Concurrency and Security 2021  Image removed.    Image removed.  Image removed.     (all)

Concurrency, that is, support for simultaneous access, is relevant to the Science of Security hard problems of resiliency, composability, and predictive metrics and to cyberphysical systems in general.

Confinement 2021  Image removed.      Image removed.     (all)

In photonics, confinement is important to loss avoidance. In quantum theory, it relates to energy levels. Containment is important in the contexts of cyber-physical systems, privacy, resiliency, and composability.

Control Theory and Privacy 2021  Image removed.      Image removed.  Image removed.   (all)

Control theory offers a way to address the Science of Security hard problems of scalability, resilience, and human behavior, particularly as they relate to cyber physical systems. The research work presented here specifically addresses issues in privacy.

Control Theory and Resilience 2021  Image removed.      Image removed.  Image removed.   (all)

In the Science of Security, control theory offers methods and approaches to potentially solve hard problems in resiliency. The research work presented here broadly addresses issues in security, touching on the Science of Security hard problems of resiliency, scalability, and human factors.

Control Theory and Security 2021  Image removed.      Image removed.  Image removed.   (all)

In the Science of Security, control theory offers methods and approaches to potentially solve hard problems in security. The research work presented here broadly addresses issues in security, touching on the Science of Security hard problems of resiliency, scalability, and human factors.

Controller Area Network Security 2021  Image removed.   (all)

Controller area networks connect the main electrical units in automobiles. They are relevant to the Science of Security because of their relationship to cyber-physical systems, resiliency, and the internet of Things.

Conversational Agents 2021  Image removed.  Image removed.  Image removed.   (all)

Conversational agents are being developed to allow for fully automated interactions between humans and computers using voice, gestures, and other attributes. For the Science of Security community, this work is relevant to the hard problems in human behavior, scalability, and metrics.

Coupled Congestion Control 2021  Image removed.  Image removed.   (all)

Congestion control algorithms are used to quickly restore normal operation of a network when congestion occurs. For the Science of Security community, this work is relevant to resilience and scalability.

Dynamical Systems 2020  Image removed.  Image removed.  Image removed.   (all)

Research into dynamical systems cited here focuses on non-linear and chaotic dynamical systems and in proving abstractions of dynamical systems through numerical simulations. Many of the applications studied are cyber-physical systems and are relevant to the Science of Security hard problems of resiliency, predictive metrics and composability.

Dynamical Systems 2021  Image removed.  Image removed.  Image removed.   (all)

Research into dynamical systems cited here focuses on non-linear and chaotic dynamical systems and in proving abstractions of dynamical systems through numerical simulations. Many of the applications studied are cyber-physical systems and are relevant to the Science of Security hard problems of resiliency, predictive metrics and composability.

Embedded Systems 2021  Image removed.  Image removed.  Image removed.  (all)

Embedded Systems Security aims for a comprehensive view of security across hardware, platform software (including operating systems and hypervisors), software development processes, data protection protocols (both networking and storage), and cryptography. Critics say embedded device manufacturers often lack maturity when it comes to designing secure embedded systems. They say vendors in the embedded device and critical infrastructure market are starting to conduct classic threat modeling and risk analysis on their equipment, but they've not matured to the point of developing formal secure development standards. Research is beginning to bridge the gap between promise and performance, as the articles cited here suggest. For the Science of Security, this research addresses resilience, composability, and metrics.

Expert Systems and Privacy 2021  Image removed.   Image removed.   (all)

Expert systems have potential for efficiency, scalability, and economy in systems security. The research work cited here looks at the problem of privacy. For the Science of Security community, the work is relevant to scalability and human factors.

Expert Systems and Security 2021  Image removed.   Image removed.  Image removed.   (all)

An expert system is an artificial intelligence (AI) application that uses a knowledge base of human expertise for problem solving. Its success is based on the quality of the data and rules obtained from the human expert. Some perform above and some below the level of humans. For the Science of Security, expert systems are relevant to the hard problems of scalability, human behavior, and resilience.

False Trust 2021  Image removed.  Image removed.    Image removed.     (all)

If malware creates a trust situation which is not real, that is, false, a series of security issues are created. For the Science of Security community, this situation is relevant to policy-based governance, scalability, and resilience.

Fog Computing and Security 2021  Image removed.      Image removed.     (all)

Fog computing is a concept that extends the Cloud concept to the end user. As with most new technologies, a survey of the scope and types of security problems is necessary. Much of this research relates to the Internet of Things. For the Science of Security community, it is relevant to the hard problems of resilience and scalability.

Forward Error Correction and Security 2021  Image removed.    Image removed.  Image removed.     (all)

Forward Error Correction, also known as Channel coding, are methods for controlling errors in data transmissions over noisy or unreliable communications channels. For cybersecurity, these methods can also be used to ensure data integrity, as some of the research cited below shows. The work cited here relates to the Science of Security problems of metrics, resiliency, and composability.

Fuzzy Cryptography 2021  Image removed.    Image removed.  Image removed.     (all)

Fuzzy cryptology uses fuzzy set theory to be used as a tool in securing cryptosystems. For the Science of Security community, this topic is relevant to the hard problems of scalability, resilience, and metrics.

Fuzzy Logic and Security 2021      Image removed.  Image removed.     (all)

Fuzzy logic is being used to develop a number of security solutions for data security. The articles cited here include research into fuzzy logic-based security for software defined networks, industrial controls, intrusion response and recovery, wireless sensor networks, and more. They are relevant to cyber physical systems, resiliency, and metrics.

Science of Security 2020  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

Static Analysis 2019  Image removed.      Image removed.  Image removed.   (all)

Static code analysis is a standard method of testing software prior to production and marketing. Much of the work done in the Science of Security to look at code suggests that these analyses need to address security issues. Methods and practices cited in the research referenced here relate to human behavior, composability, and resiliency.

Static Analysis 2020  Image removed.      Image removed.  Image removed.   (all)

Static code analysis is a standard method of testing software prior to production and marketing. Much of the work done in the Science of Security to look at code suggests that these analyses need to address security issues. Methods and practices cited in the research referenced here relate to human behavior, composability, and resiliency.

Static Analysis 2021  Image removed.      Image removed.  Image removed.   (all)

Static code analysis is a standard method of testing software prior to production and marketing. Much of the work done in the Science of Security to look at code suggests that these analyses need to address security issues. Methods and practices cited in the research referenced here relate to human behavior, composability, and resiliency.

Stylometry 2021      Image removed.    Image removed.   (all)

Stylometry is a method of tracking user behavior across platforms and using techniques such as writing style and keystrokes. If holds some promise as a tool for insider threat detection. For the Science of Security community, it is relevant to human behavior issues and predictive metrics.

Supply Chain Risk Assessment 2020      Image removed.       (all)

Threats to the supply chain in terms of delivery, integrity, content and the provenance of components and parts appear to be growing. The research cited here looks at methods to analyze risk to the security of the supply chain from multiple perspectives in order to develop accurate predictive metrics.

Supply Chain Risk Assessment 2021      Image removed.       (all)

Threats to the supply chain in terms of delivery, integrity, content and the provenance of components and parts appear to be growing. The research cited here looks at methods to analyze risk to the security of the supply chain from multiple perspectives in order to develop accurate predictive metrics.

Supply Chain Security 2020        Image removed.     (all)

Threats to the supply chain in terms of delivery, integrity, content and the provenance of components and parts appear to be growing. The research cited here looks at the security in the supply chain from multiple perspectives, including resilient architectures.

Supply Chain Security 2021       Image removed.     (all)

Threats to the supply chain in terms of delivery, integrity, content and the provenance of components and parts appear to be growing. The research cited here looks at the security in the supply chain from multiple perspectives, including resilient architectures.

Time Frequency Analysis and Security 2021  Image removed.    Image removed.  Image removed.     (all)

Time-frequency analysis is a useful method that allows simultaneous consideration of both the time and frequency domains. It is useful to the Science of Security community for analysis in cyber-physical systems and toward solving the hard problems of resilience, predictive metrics, and scalability.

Trusted Platform Modules 2021  Image removed.      Image removed.     (all)

A Trusted Platform Module (TPM) is a computer chip that can securely store artifacts used to authenticate a network or platform. These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. Interest in TPMs is growing due to their potential for solving hard problems in security such as composability and cyber-physical system security and resilience.

Trust Routing 2020  Image removed.      Image removed.     (all)

Trust routing schemes are a key component for building resilient architectures and for composable and scalable security systems.

Trustworthiness 2021  Image removed.           (all)

Trustworthiness is created in information security through cryptography to assure the identity of external parties. They are essential to cybersecurity and to the Science of Security hard problem of composability.

Trustworthy Systems 2021  Image removed.      Image removed.     (all)

Trust is created in information security to assure the identity of external parties. Trustworthy systems are a key element in the security of cyber physical systems, resiliency, and composability.

Two Factor Authentication          Image removed.   (all)

Two factor authentication or 2FA is regarded as a solution to common attacks. However, it sometimes becomes a form of bait for attackers because it is often used to secure high value information. For the Science of Security community, it is relevant to the hard problem of human factors.

Virtualization Privacy 2021  Image removed.    Image removed.  Image removed.  Image removed.   (all)

Virtualization is seen as a means of enhancing security by maintaining a gap between the end user and the host. But privacy or virtual data is a growing problem, especially when the virtual system is in the Cloud. For the Science of Security community, virtualization privacy is related to the hard problems of resilience, composability, metrics, and privacy, an issue in human behavior.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on