Pub Crawl #3

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

 

Android Encryption 2016  Image removed. Image removed. Image removed. Image removed. Image removed. (all)
The proliferation and increased capability of “smart phones” has also increased security issues for users.  For the Science of Security community, these small computing platforms have the same hard problems to solve as main frames, data centers, or desktops--all five Hard Problems. The research cited here looked at encryption issues specific to the Android operating system.  

Attribution 2016 Image removed. Image removed. Image removed. (all)
Attribution of the source of an attack or the author of malware is a continuing problem in computer forensics.  For the Science of Security community, it is an important issue related to human behavior, metrics, and composability. 

Coding Theory and Security 2016 Image removed. Image removed. Image removed.  (all)
Coding theory examines the properties of codes and their aptness for a specific application.  For the Science of Security, coding theory is relevant to compositionality, resilience, and metrics.  

Command Injection Attacks 2016 Image removed. Image removed. Image removed.  (all)
Command or shell injection is one of the most critical vulnerabilities. To the Science of Security community, command injection attacks impact cyber physical systems and are related to composability, resiliency, and metrics.  

Composability 2016 Image removed. (all)
Composability is one of the five Hard Problems for the Science of Security. The term refers to the capacity to build a security framework from components and have the security of each retained in the final product. 

iOS Encryption 2016 Image removed. Image removed. Image removed. Image removed. Image removed. (all)
The proliferation and increased capability of “smart phones” has also increased security issues for users.  For the Science of Security community, these small computing platforms have the same hard problems to solve as main frames, data centers, or desktops--all five Hard Problems. The research cited here looked at encryption issues specific to Apple's iOS operating system.  

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on