AFOSR: Information, Operations, and Security Program Review (Oct '12)
page
Submitted by Katie Dey on Sun, 10/21/2012 - 7:08pm
page
Submitted by Katie Dey on Sun, 10/21/2012 - 7:03pm
The interaction between language-based security mechanisms and operating system security mechanisms has remained largely unexamined, and unexploited. Language-based information security uses programming language abstractions and techniques to reason about and enforce information security, and can provide strong fine-grained application-specific information security guarantees.
page
Submitted by Katie Dey on Sun, 10/21/2012 - 6:41pm
page
Submitted by Katie Dey on Sun, 10/21/2012 - 6:38pm
page
Submitted by Katie Dey on Sun, 10/21/2012 - 6:35pm
ABSTRACT
Timing can provide a new degree of freedom for communication and causal inference, but it may also be exploited to learn or leak information by adversaries. We investigate the power of timing analysis in three scenarios. First, we quantify the amount of information leakage in timing side channels and provide some counter measures. Second, we present robust and transparent steganographic timing codes. Finally, we introduce efficient algorithms for causal inference in networks.
page
Submitted by Katie Dey on Sun, 10/21/2012 - 6:32pm
page
Submitted by Katie Dey on Sun, 10/21/2012 - 6:27pm
ABSTRACT
We initiate a study of the security of cryptographic primitives in the presence of efficient tampering attacks to the randomness of honest parties. More precisely, we consider p-tampering attackers that may tamper with each bit of the honest parties' random tape with probability p, but have to do so
in an "online" fashion. We present both positive and negative results:
page
Submitted by Katie Dey on Sun, 10/21/2012 - 5:50pm
page
Submitted by Katie Dey on Sun, 10/21/2012 - 5:39pm
ABSTRACT
Controlling complex networks is relevant to many areas of science and engineering, and has the potential to generate technological breakthroughs. The aim of the talk is to discuss recent results from AFOSR sponsored research on complex networks at Arizona State University: (1) optimization of network controllability and (2) energy required for controlling complex networks.
page
Submitted by Katie Dey on Sun, 10/21/2012 - 5:33pm