Science of Security

A body of knowledge containing laws, axioms and provable theories relating to some aspect of system security.
file

Visible to the public Measuring Security

This presentation was given at the 2008 Science of Security Workshop.  It addresses the following topics:

Is there a scientific way to measure security?

How should/do we measure security?

file

Visible to the public Biology is the Science of Security

A presentation made by Stephanie Forrest at the 2008 NSF/IARPA/NSA Workshop on the Science of Security at UC Berkeley.

file

Visible to the public Final Report: 2008 Berkeley SoS Workshop

The NSF/IARPA/NSA Workshop on the Science of Security was held November 17-18, 2008 in Berkeley, CA.  This meeting brought together over 40 government and academic professionals from computer security and a wide variety of other relevant fields to consider the state of scientific research in computer security and to identify steps toward establishing a stronger scientific basis for computer system security.

group

Visible to the public Science of Security VO

License: 
Creative Commons 2.5
The SoS VO is an online community to advance cyber-security science

Virtually every computing system today is at risk from some form of cyber attack. The problem continues to grow in scope, in part because there does not exist today a foundational science of security. While the community is certainly making improvements in the security of many systems, progress is often ad-hoc, muddled, and difficult to measure with respect to actual progress being made.

file

Visible to the public Design of Networked Control Systems for Chemical Processes

Augmenting dedicated control systems with
 real-time sensor 
and actuator networks poses a number of new challenges in control system design that cannot be addressed with traditional process 
control methods, including: a) the handling of additional, potentially
 asynchronous and/or delayed
 measurements in the overall networked control system, and b) the
 substantial increase in the number of process state variables, manipulated inputs, and measurements which may impede the ability of
 centralized control systems to carry out real-time calculations within th
file

Visible to the public Establishing Integrity in Dynamic Networks of Cyber Physical Devices

Dynamic networks allow cyber physical devices to connect opportunistically to share and process data gathered from the physical world. This project concerns dynamic networks of emerging cyber physical devices, such as smart phones and on-board embedded computing devices that combine sensors with general-purpose computing environments. These dynamic networks provide a powerful platform of networked devices with significant computation, communication and storage capabilities.