Cyber & formal methods publications
-
Adaptive Security in Broadcast Encryption Systems (With Short Ciphertexts)
We present new techniques for achieving adaptive security in broadcast encryption systems. Previous work on fully collusion resistant broadcast encryption systems with very short ciphertexts was limited to considering only static security.
-
A Beginner’s Example of Proc Mixed for the Analysis of Letter Identification Using Reaction Time
-
An Attacker-Defender Game for Honeynets
We formalize the problem of defending honeynets from systematic mapping (a serious threat to their viability) as a simple two-person game.
-
Building Theorem Provers
Abstract This talk discusses some of the challenges of building a usable theorem prover. These include the chasm between theory and code, conflicting requirements, feature interaction, and competitive performance. The…
-
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
Here we demonstrate additional applications that enjoy strong security properties and a high level of efficiency.
-
Intrusion Monitoring in Process Control Systems
Our approach involves a multilayer security architecture for monitoring process control systems to achieve accurate and effective situational awareness.
-
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
We construct public-key cryptosystems that are secure assuming theworst-case hardness of approximating the minimum distance on n-dimensional lattices to within small Poly(n) factors.
-
Certainty Closure: Reliable Constraint Reasoning with Incomplete or Erroneous Data
We present a unifying framework that extends the CP formalism in both model and solutions, to tackle ill-defined combinatorial problems with incomplete or erroneous data.
-
Invariant Checking for Programs with Procedure Calls
We explore the theoretical limits for doing automatic invariant checking and show that invariant checking is decidable for a large class of programs that includes some recursive programs.
-
Planning and Learning Algorithms for Routing in Disruption-Tolerant Networks
We give an overview of algorithms that we have been developing in the DARPA disruption-tolerant networking program, which aims at improving communication in networks with intermittent and episodic connectivity.
-
Information Assurance Aspects of Rapid Software Reprogramming
This paper describes RSR in the context of a general vulnerability management cycle (VMC), familiarizes the reader with the applicable information assurance (IA) properties, and discusses how to use existing…
-
Trust and Automation in Verification Tools
We argue that trust need not be achieved at the expense of automation, and outline a lightweight approach where the results of untrusted verifiers are checked by a trusted offline…