Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- opinionOctober 2024
The Future of Misuse Detection
From lessons learned to new directions.
- research-articleOctober 2020
IoTHound: environment-agnostic device identification and monitoring
- Prashant Anantharaman,
- Liwei Song,
- Ioannis Agadakos,
- Gabriela Ciocarlie,
- Bogdan Copos,
- Ulf Lindqvist,
- Michael E. Locasto
IoT '20: Proceedings of the 10th International Conference on the Internet of ThingsArticle No.: 7, Pages 1–9https://doi.org/10.1145/3410992.3410993As the Internet of Things (IoT) becomes more ingrained in our daily lives and environments, asset enumeration, characterization, and monitoring become crucial, yet challenging tasks. A vast number of gadgets in the market have a smartphone-based ...
- research-articleNovember 2017
Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things
- Ioannis Agadakos,
- Chien-Ying Chen,
- Matteo Campanelli,
- Prashant Anantharaman,
- Monowar Hasan,
- Bogdan Copos,
- Tancrède Lepoint,
- Michael Locasto,
- Gabriela F. Ciocarlie,
- Ulf Lindqvist
CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCyPages 37–48https://doi.org/10.1145/3140241.3140252The proliferation of Internet-of-Things (IoT) devices within homes raises many security and privacy concerns. Recent headlines highlight the lack of effective security mechanisms in IoT devices. Security threats in IoT arise not only from ...
- opinionJanuary 2017
The future of the internet of things
The IoT can become ubiquitous worldwide---if the pursuit of systemic trustworthiness can overcome the potential risks.
- opinionJanuary 2017
Building on the Success of Building Security In
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 15, Issue 4Pages 85–87https://doi.org/10.1109/MSP.2017.3151336IEEE Secure Development Conference (SecDev) is a venue for presenting ideas, research, and experience about how to develop secure systems. Please visit secdev.ieee.org for more information about the upcoming conference in September.
- research-articleJuly 2015
Government-Funded R&D to Drive Cybersecurity Technologies
New and innovative cybersecurity technologies are essential to ensure that information systems and critical infrastructure are secure and resilient. These technologies must also meet the needs of IT professionals and be available via channels acceptable ...
- research-articleMarch 2013
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 11, Issue 2Pages 14–23https://doi.org/10.1109/MSP.2013.31New and innovative technologies will only make a difference if they're deployed and used. It doesn't matter how visionary a technology is unless it meets user needs and requirements and is available as a product via user-acceptable channels. One of the ...
- articleMarch 2012
The IEEE Symposium on Security and Privacy Is Moving to San Francisco
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 10, Issue 2Pages 65–66https://doi.org/10.1109/MSP.2012.51The authors discuss the IEEE Symposium on Security and Privacy, which because of its growing popularity, is moving to a larger venue this year.
- ArticleMay 2009
Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security
SADFE '09: Proceedings of the 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic EngineeringPages 97–98https://doi.org/10.1109/SADFE.2009.11A systematic approach to digital forensic engineering acknowledges the close, intertwine relationship between digital forensics and information security. Just as their technical structures are interrelated, so, too, are issues relating to legal and ...
- ArticleSeptember 2008
A Multi-Sensor Model to Improve Automated Attack Detection
RAID '08: Proceedings of the 11th international symposium on Recent Advances in Intrusion DetectionPages 291–310https://doi.org/10.1007/978-3-540-87403-4_16Most intrusion detection systems available today are using a single audit source for detection, even though attacks have distinct manifestations in different parts of the system. In this paper we investigate how to use the alerts from several audit ...
- research-articleMarch 2008
Key management and secure software updates in wireless process control environments
WiSec '08: Proceedings of the first ACM conference on Wireless network securityPages 100–108https://doi.org/10.1145/1352533.1352550Process control systems using wireless sensor nodes are large and complex environments built to last for a long time. Cryptographic keys are typically preloaded in the wireless nodes prior to deployment and used for the rest of their lifetime. To reduce ...
- ArticleDecember 2007
VEIL: A System for Certifying Video Provenance
Traditionally, a consumer decided how much to trust a piece of data based on its source. As digital video cameras and editors become ubiquitous, an arbitrary video object is increasingly likely to be produced using a range of operations that combine ...
- ArticleAugust 2006
Detecting disruptive routers in wireless sensor networks
ADHOC-NOW'06: Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless NetworksPages 19–31https://doi.org/10.1007/11814764_4In wireless sensor networks, sensor nodes are typically resource constrained and used as routers to forward packets for other nodes. Compromised sensor nodes may be able to cause network-wide denial of service by dropping or corrupting packets. This ...
- ArticleDecember 2001
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert systemthat analyzes Sun Solaris audit trails. Based on manyyears of intrusion detection research, eXpert-BSM's knowledgebase detects a wide range of specific and general formsof misuse, provides ...
- ArticleOctober 2001
Application-Integrated Data Collection for Security Monitoring
RAID '00: Proceedings of the 4th International Symposium on Recent Advances in Intrusion DetectionPages 22–36This paper describes a new approach to collecting real-time transaction information from a server application and forwarding the data to an intrusion detection system. While the few existing application-based intrusion detection systems tend to read log ...
- research-articleJune 1998
A Map of Security Risks Associated with Using COTS
Combining Internet connectivity and COTS-based systems results in increased threats from both external and internal sources. Traditionally, security design has been a matter of risk avoidance. Now more and more members of the security community realize ...
- ArticleMay 1997
How to Systematically Classify Computer Security Intrusions
This paper presents a classification of intrusions with respect to technique as well as to result. The taxonomy is intended to be a step on the road to an established taxonomy of intrusions for use in incident reporting, statistics, warning bulletins, ...