Employing attack graphs for intrusion detection

F Capobianco, R George, K Huang, T Jaeger… - Proceedings of the new …, 2019 - dl.acm.org
Intrusion detection systems are a commonly deployed defense that examines network traffic,
host operations, or both to detect attacks. However, more attacks bypass IDS defenses each …

Towards indeterminacy-tolerant access control in iot

M Heydari, A Mylonas, V Katos, D Gritzalis - Handbook of Big Data and IoT …, 2019 - Springer
The ultimate goal of any access control system is to assign precisely the necessary level of
access (ie, no more and no less) to each subject. Meeting this goal is challenging in an …

A meta language for cyber-physical systems and threats: Application on autonomous vehicle

S Ouchani, A Khaled - 2019 IEEE/ACS 16th International …, 2019 - ieeexplore.ieee.org
One of the main challenges in the development process of secure systems is how to detect
as early as possible the system's vulnerabilities and weaknesses, and also how to quantify …

HASN: A hierarchical attack surface network for system security analysis

K Huang, L Yang, R Fu, S Zhou… - China …, 2019 - ieeexplore.ieee.org
Attack surfaces, as one of the security models, can help people to analyse the security of
systems in cyberspace, such as risk assessment by utilizing various security metrics or …

PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use

J Criswell, J Zhou, S Gravani… - 2019 49th Annual IEEE …, 2019 - ieeexplore.ieee.org
Operating systems such as Linux break the power of the root user into separate privileges
(which Linux calls capabilities) and give processes the ability to enable privileges only when …