Towards a Rigorous Approach for Zero Trust in the 5G Core

Submitted by CAE Community on

By combining technologies such as Network Function Virtualization and Service-Based Architecture with decentralized and cloud deployments, the fifth generation of cellular networks (5G) aims for unprecedented Quality of Service, and use-cases in smart industry, emergency operations, remote medicine, and more. The increased attack surface introduced by this transition as well as the critical nature of the 5G communications require, more than ever before, a rigorous analysis of 5G security.

Panel of Technical Directors for the INSuRE Program

Submitted by CAE Community on

Currently, the INSuRE program is one of the main efforts of the Community of Practice in Research (CoP-R). As part of this panel, Technical Directors from four different government agencies and national laboratories will share information on their backgrounds, research interests, as well as their involvement and experience with the INSuRE program.

InSURe+C Audio Deepfake Detection

Submitted by CAE Community on

Deepfake technologies, which allow malicious actors to produce fake images, videos, and audio clips, are reaching an unprecedented convergence of quality, scalability, and ease of use. It will soon be possible to mass-produce highly realistic synthetic content that may be generated and spread faster than fake media detectors can manage. The proliferation of these technologies poses clear threats to society and democracy (for example, consider the dangers of shared videos wherein politicians give fake speeches).

Juicing V8: A Primary Account for the Memory Forensics of the V8 JavaScript Engine

Submitted by CAE Community on

V8 is the open source interpreter developed by Google to enable JavaScript (JS) functionality in Chrome and power other software. Malicious threat actors abuse the usage of JS because most modern-day browsers implicitly trust script code to execute. To aid in incident response and memory forensics in such scenarios, our work introduces the first generalizable account of the memory forensics of the V8 JS engine and provides practitioners with a list of objects and their descriptors extracted from a memory image.

Exploration of Heuristic and Probabilistic Tools in Quantum Computing with Applications to Cryptography

Submitted by CAE Community on

Recent advances in the development of quantum computing hardware have accelerated the interest of preparing information systems for the post-quantum world. Grover’s unstructured search and Shor algorithm for period-finding have potential applications in security, cryptography, and communications in general. We present in this paper the evaluation and simulation of proofs of concepts, gates, and experiments for quantum circuits along with explanations of their potential applications to computing and security.

Path-Aware Risk Scores for Access Control in Zero-Trust Systems

Submitted by CAE Community on

The growing adoption of zero-trust architectures brings the principle of complete mediation to the forefront of well-designed, secure systems. Despite the potential for zero-trust to improve the security and resilience of systems from cyberattack, practical adoption of these architectures is hindered by lack of sufficiently trustworthy origin authentication within untrusted networks such as the Internet.

CanarySat: A Virtual CubeSat Model for Cybersecurity Research and Education

Submitted by CAE Community on

Presented here is an overview of CanarySat, which is an open, virtual model of a cube satellite (CubeSat) and a satellite ground station. The goal of this project was to produce a high-fidelity, extensible modeling framework that will allow cybersecurity researchers and satellite designers to investigate cybersecurity solutions targeted specifically at CubeSats and other small satellite platforms.

INSuRE Q&A

Submitted by CAE Community on

INSuRE (Information Security Research and Education) has been an important activity within the CAE-R community, yet it remains unknown to many institutions. In this talk, we will present the history of the program, its evolution and its current state. We will discuss the values and the challenges INSuRE faces and its future directions.

Subscribe to CAE-R