Biblio

Found 19604 results

2016-12-16
Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania, Sean Smith, Dartmouth College.  2013.  Circumvention of Security: Good Users Do Bad Things.

Conventional wisdom is that the textbook view describes reality, and only bad people (not good people trying to get their jobs done) break the rules. And yet it doesn't, and good people circumvent.
 

Published in IEEE Security & Privacy, volume 11, issue 5, September - October 2013.

2015-02-23
Robert Zager, John Zager.  2013.  Combat Identification in Cyberspace.

This article discusses how a system of Identification: Friend or Foe (IFF) can be implemented in email to make users less susceptible to phishing attacks.

2018-05-23
Anitha Murugesan, Michael W. Whalen, Sanjai Rayadurgam, Mats Per Erik Heimdahl.  2013.  Compositional verification of a medical device system. Proceedings of the 2013 {ACM} SIGAda annual conference on High integrity language technology, {HILT} 2013. :51–64.
2018-05-27
Cem Aksoylar, George K. Atia, Venkatesh Saligrama.  2013.  Compressive sensing bounds through a unifying framework for sparse models. {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2013, Vancouver, BC, Canada, May 26-31, 2013. :5524–5528.
2018-05-25
Zhang, Desheng, Li, Ye, Zhang, Fan, Lu, Mingming, Liu, Yunhuai, He, Tian.  2013.  coRide: Carpool Service with a Win-win Fare Model for Large-scale Taxicab Networks. Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems. :9:1–9:14.
2018-06-04
Gerdes, Ryan M, Winstead, Chris, Heaslip, Kevin.  2013.  CPS: an efficiency-motivated attack against autonomous vehicular transportation. Proceedings of the 29th Annual Computer Security Applications Conference. :99–108.
2018-05-25
Sirajum Munir, John A. Stankovic, Chieh-Jan Mike Liang, Shan Lin.  2013.  Cyber Physical System Challenges for Human-in-the-Loop Control. Presented as part of the 8th International Workshop on Feedback Computing.
2018-06-17
Hu, Fei.  2013.  Cyber-physical systems: integrated computing and engineering design.

Cyber-Physical Systems: Integrated Computing and Engineering Design supplies comprehensive coverage of the principles and design of CPSs. It addresses the many challenges that must be overcome and outlines a roadmap of how to get there.

  • Emphasizes the integration of cyber computing and physical objects control
  • Covers important CPS theory foundations and models
  • Includes interesting case studies of several important civilian and health care applications that illustrate the CPS design process
  • Addresses the collaboration of the sensing and controlling of a physical system with robust software architecture
  • Explains how to account for random failure events that can occur in a real CPS environment

Presented in a systematic manner, the book begins by discussing the basic concept underlying CPSs and examining some challenging design issues. It then covers the most important design theories and modeling methods for a practical CPS. Next, it moves on to sensor-based CPSs, which use embedded sensors and actuators to interact with the physical world.

The text presents concrete CPS designs for popular civilian applications, including building and energy management. Reflecting the importance of human health care in society, it includes CPS examples of rehabilitation applications such as virtual reality-based disability recovery platforms.

2020-01-20
Musca, Constantin, Mirica, Emma, Deaconescu, Razvan.  2013.  Detecting and Analyzing Zero-Day Attacks Using Honeypots. 2013 19th International Conference on Control Systems and Computer Science. :543–548.

Computer networks are overwhelmed by self propagating malware (worms, viruses, trojans). Although the number of security vulnerabilities grows every day, not the same thing can be said about the number of defense methods. But the most delicate problem in the information security domain remains detecting unknown attacks known as zero-day attacks. This paper presents methods for isolating the malicious traffic by using a honeypot system and analyzing it in order to automatically generate attack signatures for the Snort intrusion detection/prevention system. The honeypot is deployed as a virtual machine and its job is to log as much information as it can about the attacks. Then, using a protected machine, the logs are collected remotely, through a safe connection, for analysis. The challenge is to mitigate the risk we are exposed to and at the same time search for unknown attacks.

2018-05-14
David Broman, Christopher X. Brooks, Lev Greenberg, Edward A. Lee, Michael Masin, Stavros Tripakis, Michael Wetter.  2013.  Determinate composition of FMUs for co-simulation. Proceedings of the International Conference on Embedded Software, {EMSOFT} 2013, Montreal, QC, Canada, September 29 - Oct. 4, 2013. :2:1–2:12.
2018-05-23
R. Mangharam, M. Pajic.  2013.  Distributed Control for Cyber-Physical Systems. Journal of the Indian Institute of Science, Special Issue on Cyber-Physical Systems. 93
2018-05-27
Weicong Ding, Prakash Ishwar, Venkatesh Saligrama.  2013.  Dynamic topic discovery through sequential projections. 2013 Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, November 3-6, 2013. :1100–1104.
2018-05-14
2015-12-02
Gul Agha, University of Illinois at Urbana-Champaign.  2013.  Euclidean Model Checking: A Scalable Method for Verifying Quantitative Properties in Probabilistic Systems. 5th International Conference on Algebraic Informatics.

In this lecture, I will focus on an alternate method for addressing the problem of large state spaces. For many purposes, it may not be necessary to consider the global state as a cross-product of the states of individual actors. We take our inspiration from statistical physics where macro properties of a system may be related to the properties of individual molecules using probability distributions on the states of the latter. Consider a simple example. Suppose associated with each state is the amount of energy a node consumes when in that state (such an associated value mapping is called the reward function of the state). Now, if we have a frequency count of the nodes in each state, we can estimate the total energy consumed by the system. This suggests a model where the global state is a vector of probability mass functions (pmfs). In the above example, the size of the vector would be 5, one element for each possible state of a node. Each element of the vector represents the probability that any node is in the particular state corresponding to entry.

This was an invited talk to the 5th International Conference on Algebraic Informatics.

2018-05-23
Kohl, Benjamin A., Chen, Sanjian, Mullen-Fortino, Margaret, Lee, Insup.  2013.  Evaluation and Enhancement of an Intraoperative Insulin Infusion Protocol via In-Silico Simulation. Proceedings of the 2013 IEEE International Conference on Healthcare Informatics (ICHI '13). :307–316.
2018-06-04
2017-11-03
Dietrich, Christian J., Rossow, Christian, Pohlmann, Norbert.  2013.  Exploiting Visual Appearance to Cluster and Detect Rogue Software. Proceedings of the 28th Annual ACM Symposium on Applied Computing. :1776–1783.

Rogue software, such as Fake A/V and ransomware, trick users into paying without giving return. We show that using a perceptual hash function and hierarchical clustering, more than 213,671 screenshots of executed malware samples can be grouped into subsets of structurally similar images, reflecting image clusters of one malware family or campaign. Based on the clustering results, we show that ransomware campaigns favor prepay payment methods such as ukash, paysafecard and moneypak, while Fake A/V campaigns use credit cards for payment. Furthermore, especially given the low A/V detection rates of current rogue software – sometimes even as low as 11% – our screenshot analysis approach could serve as a complementary last line of defense.

2017-02-09
Mohammad Hossein Manshaei, Isfahan University of Technology, Quanyan Zhu, University of Illinois at Urbana-Champaign, Tansu Alpcan, University of Melbourne, Tamer Başar, University of Illinois at Urbana-Champaign, Jean-Pierre Hubaux, Ecole Polytechnique Federal de Lausanne.  2013.  Game Theory Meets Network Security and Privacy. ACM Computing Surveys. 45(3):06/2013.

This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying gametheoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

2018-05-23
Z. Jiang, S.Radhakrishnan, V.Sampath, S.Sarode, R. Mangharam.  2013.  Heart-on-a-Chip: A Closed-loop Testing Platform for Implantable Pacemakers. Third Workshop on Design, Modeling and Evaluation of Cyber Physical Systems (CyPhy'13).
2018-06-04
2018-05-27
Mohammad H. Rohban, Prakash Ishwar, Burkay Orten, William Clement Karl, Venkatesh Saligrama.  2013.  An impossibility result for high dimensional supervised learning. 2013 {IEEE} Information Theory Workshop, {ITW} 2013, Sevilla, Spain, September 9-13, 2013. :1–5.
2016-12-06
Bernardo Toninho, Luis Caires, Frank Pfenning.  2013.  Inductive and Coinductive Session Types in Higher-Order Concurrent Programs.

We develop a theory of inductive and coinductive session types in a computational interpretation of linear logic, enabling the representation of potentially infinite interactions in a compositionally sound way that preserves logical soundness, a major stepping stone towards a full dependent type theory for expressing and reasoning about session-based concurrent higher order distributed programs. The language consists of a λ-calculus with inductive types and a contextual monadic type encapsulating session-based concurrency, treating monadic values as first-class objects. We consider general fixpoint and cofixpoint constructs, subject to natural syntactic constraints, as a means of producing inductive and coinductive definitions of session-typed processes, that until now have only been considered using general recursion, which is incompatible with logical consistency and introduces compositional divergence. We establish a type safety result for our language, including protocol compliance and progress of concurrent computation, and also show, through a logical relations argument, that all well-typed programs are compositionally non-divergent. Our results entail the logical soundness of the framework, and enable compositional reasoning about useful infinite interactive behaviors, while ruling out unproductive infinite behavior.

2018-06-04