Now showing items 1-10 of 29
Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity
(Virginia Tech, 2013-11-01)
A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
Towards Optimal Secure Distributed Storage Systems with Exact Repair
Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem
(Virginia Tech, 2016-04-29)
We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
Secure Coding Practices in Java: Challenges and Vulnerabilities
(Virginia Tech, 2017-09-28)
Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
Radiation Search Operations using Scene Understanding with Autonomous UAV and UGV
(Virginia Tech, 2016-08-31)
Autonomously searching for hazardous radiation sources requires the ability of the aerial and ground systems to understand the scene they are scouting. In this paper, we present systems, algorithms, and experiments to ...
Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore
(Cryptology ePrint Archive, 2010)
This paper discusses a novel direction for multicore cryptographic software, namely the use of multicore to protect a design against side-channel attacks.We present a technique which is based on the principle of dual-rail ...
Terrain classification using intelligent tire
Efficient methods for computing observation impact in 4D-Var data assimilation
Parametric Computational Study on Butterfly-Shaped Hysteretic Dampers
Structural steel plates oriented to resist shear loading can be used as hysteretic dampers in seismic force resisting systems. Some steel plate hysteretic dampers have engineered cut-outs leaving shear links that exhibit ...