Publications

Refine Results

(Filters Applied) Clear All

Guaranteeing Spoof-Resilient Multi-Robot Networks(774.94 KB)

Date:
July 13, 2015
Published in:
Proceedings of Robotics: Science and Systems, Rome, Italy
Type:
Conference Paper

Summary

Multi-robot networks use wireless communication to provide wide-ranging services such as aerial surveillance and unmanned delivery. However, effective coordination between multiple robots requires trust, making them particularly vulnerable to cyber-attacks. Specifically, such networks can be gravely disrupted by the Sybil attack, where even a single malicious robot can spoof a large number of fake clients. This paper proposes a new solution to defend against the Sybil attack, without requiring expensive cryptographic key-distribution.
READ LESS

Summary

Multi-robot networks use wireless communication to provide wide-ranging services such as aerial surveillance and unmanned delivery. However, effective coordination between multiple robots requires trust, making them particularly vulnerable to cyber-attacks. Specifically, such networks can be gravely disrupted by the Sybil attack, where even a single malicious robot can spoof a...
READ MORE

Operational Exercise Integration Recommendations for DoD Cyber Ranges(1.51 MB)

Author:
Date:
July 1, 2015
Published in:
Technial Report TR-1187, MIT Lincoln Laboratory
Type:
Technical Report

Summary

This report presents a summary of the state of the art in cyber assessment technologies and methodologies and prescribes an approach to the employment of cyber range operational exercises (OPEXs). Numerous recommendations on general cyber assessment methodologies and cyber range design are included.
READ LESS

Summary

This report presents a summary of the state of the art in cyber assessment technologies and methodologies and prescribes an approach to the employment of cyber range operational exercises (OPEXs). Numerous recommendations on general cyber assessment methodologies and cyber range design are included.
READ MORE

Repeatable Reverse Engineering for the Greater Good with PANDA(2.63 MB)

Date:
October 1, 2014
Published in:
Technical Report TR CUCS-023-14, Columbia University
Type:
Technical Report

Summary

We present PANDA, an open-source tool that has been purpose-built to support whole system reverse engineering. It is built upon the QEMU whole system emulator, and so analyses have access to all code executing in the guest and all data. PANDA adds the ability to record and replay executions, enabling iterative, deep, whole system analyses.
READ LESS

Summary

We present PANDA, an open-source tool that has been purpose-built to support whole system reverse engineering. It is built upon the QEMU whole system emulator, and so analyses have access to all code executing in the guest and all data. PANDA adds the ability to record and replay executions, enabling...
READ MORE

Architecture-Independent Dynamic Information Flow Tracking(443.98 KB)

Date:
March 16, 2013
Published in:
Proceedings of the 22nd International Conference on Compiler Construction (CC 2013), Rome, Italy
Type:
Conference Paper

Summary

Dynamic information flow tracking is a well-known dynamic software analysis technique with a wide variety of applications that range from making systems more secure, to helping developers and analysts better understand the code that systems are executing. In this paper, we present a general approach to information flow tracking that allows us to support multiple ISAs without mastering the intricate details of each ISA we support, and without extensive verification.
READ LESS

Summary

Dynamic information flow tracking is a well-known dynamic software analysis technique with a wide variety of applications that range from making systems more secure, to helping developers and analysts better understand the code that systems are executing. In this paper, we present a general approach to information flow tracking that...
READ MORE

Showing Results

1-4 of 4