Now showing items 1-10 of 40
Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity
(Virginia Tech, 2013-11-01)
A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
Towards Optimal Secure Distributed Storage Systems with Exact Repair
Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem
(Virginia Tech, 2016-04-29)
We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
Secure Coding Practices in Java: Challenges and Vulnerabilities
(Virginia Tech, 2017-09-28)
Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
A Stakeholder Analysis of Infant Mortality in Ohio: Key Behaviors and Their Formulations
This document reports stakeholder behaviors considered for modeling the impact of progesterone therapy on infant mortality in the state of Ohio and describes the formula used in the model. In part I, we present seven classes ...
Radiation Search Operations using Scene Understanding with Autonomous UAV and UGV
(Virginia Tech, 2016-08-31)
Autonomously searching for hazardous radiation sources requires the ability of the aerial and ground systems to understand the scene they are scouting. In this paper, we present systems, algorithms, and experiments to ...
Opinion: Mathematical models: A key tool for outbreak response
The 2014 outbreak of Ebola in West Africa is unprecedented in its size and geographic range, and demands swift, effective action from the international community. Understanding the dynamics and spread of Ebola is critical ...
Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore
(Cryptology ePrint Archive, 2010)
This paper discusses a novel direction for multicore cryptographic software, namely the use of multicore to protect a design against side-channel attacks.We present a technique which is based on the principle of dual-rail ...
Terrain classification using intelligent tire