Cyber & formal methods publications
-
New Techniques for Private Stream Searching
A system for private stream searching, introduced by Ostrovsky and Skeith, allows a client to provide an untrusted server with an encrypted search query.
-
What Were You Thinking? Filling in Missing Dataflow Through Inference in Learning from Demonstration
This paper addresses the problem of learning from demonstrations involving unobservable (e.g., mental) actions. We explore the use of knowledge base inference to complete missing dataflow and investigate the approach…
-
Combining Equational Reasoning
Given a theory 𝕋T, a set of equations E, and a single equation e, the uniform word problem (UWP) is to determine if 𝐸⇒𝑒E⇒e in the theory 𝕋T.
-
Malware Characterization Through Alert Pattern Discovery
We present a novel alert correlation approach based on the factor analysis statistical technique for malware characterization. Our approach involves mechanically computing a set of abstract quantities, called factors, for expressing…
-
System Support for Forensic Inference
This paper argues for the development of a formal framework for constructing “digital artifacts” that can serve as proxies for physical evidence; a system so imbued would facilitate sound digital…
-
Unification and Narrowing in Maude 2.4
This paper introduces novel features of Maude 2.4 including support for unification and narrowing. Unification is supported in Core Maude, the core rewriting engine of Maude, with commands and metalevel…
-
Adaptive Security in Broadcast Encryption Systems (With Short Ciphertexts)
We present new techniques for achieving adaptive security in broadcast encryption systems. Previous work on fully collusion resistant broadcast encryption systems with very short ciphertexts was limited to considering only static security.
-
A Beginner’s Example of Proc Mixed for the Analysis of Letter Identification Using Reaction Time
-
An Attacker-Defender Game for Honeynets
We formalize the problem of defending honeynets from systematic mapping (a serious threat to their viability) as a simple two-person game.
-
Information Assurance Aspects of Rapid Software Reprogramming
This paper describes RSR in the context of a general vulnerability management cycle (VMC), familiarizes the reader with the applicable information assurance (IA) properties, and discusses how to use existing…
-
Planning and Learning Algorithms for Routing in Disruption-Tolerant Networks
We give an overview of algorithms that we have been developing in the DARPA disruption-tolerant networking program, which aims at improving communication in networks with intermittent and episodic connectivity.
-
An Intrusion Detection System for Wireless Process Control Systems
In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS.