A Research Ecosystem for Secure Computing
- URL: http://arxiv.org/abs/2101.01264v1
- Date: Mon, 4 Jan 2021 22:42:28 GMT
- Title: A Research Ecosystem for Secure Computing
- Authors: Nadya Bliss, Lawrence A. Gordon, Daniel Lopresti, Fred Schneider, and
Suresh Venkatasubramanian
- Abstract summary: Security of computers, systems, and applications has been an active area of research in computer science for decades.
Challenges range from security and trust of the information ecosystem to adversarial artificial intelligence and machine learning.
New incentives and education are at the core of this change.
- Score: 4.212354651854757
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Computing devices are vital to all areas of modern life and permeate every
aspect of our society. The ubiquity of computing and our reliance on it has
been accelerated and amplified by the COVID-19 pandemic. From education to work
environments to healthcare to defense to entertainment - it is hard to imagine
a segment of modern life that is not touched by computing. The security of
computers, systems, and applications has been an active area of research in
computer science for decades. However, with the confluence of both the scale of
interconnected systems and increased adoption of artificial intelligence, there
are many research challenges the community must face so that our society can
continue to benefit and risks are minimized, not multiplied. Those challenges
range from security and trust of the information ecosystem to adversarial
artificial intelligence and machine learning.
Along with basic research challenges, more often than not, securing a system
happens after the design or even deployment, meaning the security community is
routinely playing catch-up and attempting to patch vulnerabilities that could
be exploited any minute. While security measures such as encryption and
authentication have been widely adopted, questions of security tend to be
secondary to application capability. There needs to be a sea-change in the way
we approach this critically important aspect of the problem: new incentives and
education are at the core of this change. Now is the time to refocus research
community efforts on developing interconnected technologies with security
"baked in by design" and creating an ecosystem that ensures adoption of
promising research developments. To realize this vision, two additional
elements of the ecosystem are necessary - proper incentive structures for
adoption and an educated citizenry that is well versed in vulnerabilities and
risks.
Related papers
- Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Confronting the Reproducibility Crisis: A Case Study of Challenges in Cybersecurity AI [0.0]
A key area in AI-based cybersecurity focuses on defending deep neural networks against malicious perturbations.
We attempt to validate results from prior work on certified robustness using the VeriGauge toolkit.
Our findings underscore the urgent need for standardized methodologies, containerization, and comprehensive documentation.
arXiv Detail & Related papers (2024-05-29T04:37:19Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Secure Software Development: Issues and Challenges [0.0]
The digitization of our lives proves to solve our human problems as well as improve quality of life.
Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more.
The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle.
arXiv Detail & Related papers (2023-11-18T09:44:48Z) - Securing the Digital World: Protecting smart infrastructures and digital
industries with Artificial Intelligence (AI)-enabled malware and intrusion
detection [0.0]
cybercrime has emerged as a global threat to governments, businesses, and civil societies.
This paper investigates AI-based cyber threat detection to protect our modern digital ecosystems.
arXiv Detail & Related papers (2023-10-15T09:35:56Z) - Coordinated Science Laboratory 70th Anniversary Symposium: The Future of
Computing [80.72844751804166]
In 2021, the Coordinated Science Laboratory CSL hosted the Future of Computing Symposium to celebrate its 70th anniversary.
We summarize the major technological points, insights, and directions that speakers brought forward during the symposium.
Participants discussed topics related to new computing paradigms, technologies, algorithms, behaviors, and research challenges to be expected in the future.
arXiv Detail & Related papers (2022-10-04T17:32:27Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Grand Challenges for Embedded Security Research in a Connected World [6.1916614285252]
The Computing Community Consortium (CCC) held a one-day visioning workshop to explore these issues.
Report synthesizes the results of that workshop and develops a list of strategic goals for research and education over the next 5-10 years.
arXiv Detail & Related papers (2020-05-13T21:01:57Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.