News
  • "Intelligence-Driven Supply Chain Resilience"
    As system environments and attacks become increasingly more sophisticated, security tactics must place more emphasis on detection and response, rather than the sole implementation of tools to prevent attackers from intrusion. This article discusses ways…
  • "New brain-inspired cybersecurity system detects 'bad apples' 100 times faster"
    Sandia Lab has collaborated with Lewis Rhodes Labs to develop a cybersecurity system that scans for very specific patterns instead of general indicators of an attack. The system in development is inspired by the complexity of the brain as the scanning…
  • "Security for multirobot systems"
    Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory have discovered a new method to protecting communication networks of multirobots. Areas of research are beginning to expand further from communication, control algorithms, and…
  • Farmers Hacking Tractors
    In a previous SoS meeting we learned there is challenge of securing tractors. A recent article published goes into much more detail about how American farmers are buying and installing Ukrainian Firmware for their John Deere tractors.   URL: https…
  • Predatory Journals Recruite Fake Editor
    A research study published in Nature talks about the issue of predatory journals. These journals generally only try to make money from the academic community rather than giving good peer reviwed publications. The researchers created a fake person, Anna…
  • SoS Musings #1 - We are winning the battles but the war is elusive!
    SoS Musings #1 We are winning the battles but the war is elusive!
  • Pub Crawl #3
    ​Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
  • "US-CERT Warns HTTPS Inspection May Degrade TLS Security"
    Research reveals that security is weakened when HTTPS inspection tools are ran in TLS traffic streams, which the Department of Homeland Security has now released a warning about. All HTTPS interception products pose potential dangers of man-in-the-middle…
  • "Machine learning can also aid the cyber enemy: NSA research head"
    Cyber attackers are starting to utilize machine learning technology to launch their attacks. Dr. Deborah Frincke, head of the NSA/CSS Research Directorate talks about potential scenarios in which a malicious user could manipulate the machine learning…
  • “Flaws in MAC address randomization implemented by vendors allow mobile tracking”
    Researchers at the U.S. Naval Academy have discovered a new attack method to manipulate the MAC address randomization system to track mobile devices. The purpose of this system is to protect the privacy of the user by broadcasting an arbitrary Wi-Fi MAC…
  • Cyber Scene #8 - Checking out, out of, and in with the U.S. Senate on Cyber Security
    Cyber Scene March 17, 2017 Cyber Scene is intended to provide an informative, timely backdrop of events, thinking, and developments that feed into technological advancement of SoS Cybersecurity collaborat
  • "Researchers develop automatic security tests for complex systems"
    Researchers at Saarland University are developing ways to efficiently detect security vulnerabilities before they are discovered by hackers. Test data generators are used to rapidly generate test inputs for examined programs, however invalid inputs are…