Browsing by Author "Ray, Indrajit, author"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Open Access Capture the flag: computer science style(Colorado State University. Libraries, 2006) Robertson, Kathy Lynn, author; Massey, Dan, author; Ray, Indrajit, authorWith today's technology, and corresponding security vulnerabilities it is important for students to have security in the forefront of their thought process when creating or maintaining networks, hardware and software. It was for this reason that Capture the Flag: Computer Science Style event was planned. Starting with a certain set of widely known security exploits, each team was to hack, crack and sneak into servers, steal password, sniff traffic and take advantage of certain security exploits. This poster will cover one of these security hacks in detail, and explain the goals and results from the first ever Capture the Flag: Computer Science Style event.Item Open Access Model the system security risk by an attack tree(Colorado State University. Libraries, 2006) Poolsappasit, Nayot, author; Edwards, John, author; Ray, Indrajit, authorTraditional Vulnerabilities scanners only give a list of vulnerabilities of the systems. This one dimensional information does not give analysts the perception of how exploits can be chained together and form more complex attack scenarios. We are developing an automate tool that takes the list of vulnerabilities and generates all possible attack scenarios known to the current security intellectual in the form of an attack tree model.Item Open Access SAFE-PASS: stewardship, advocacy, fairness and empowerment in privacy, accountability, security, and safety for vulnerable groups(Colorado State University. Libraries, 2023-05-24) Ray, Indrajit, author; Thuraisingham, Bhavani, author; Vaidya, Jaideep, author; Mehrotra, Sharad, author; Atluri, Vijayalakshmi, author; Ray, Indrakshi, author; Kantarcioglu, Murat, author; Raskar, Ramesh, author; Salimi, Babak, author; Simske, Steve, author; Venkatasubramanian, Nalini, author; Singh, Vivek, author; ACM, publisherOur vision is to achieve societally responsible secure and trustworthy cyberspace that puts algorithmic and technological checks and balances on the indiscriminate sharing and analysis of data. We achieve this vision in a holistic manner by framing research directions with four major considerations: (i) Expanding knowledge and understanding of security and privacy perceptions and expectations in vulnerable groups, which significantly contribute to their unwillingness to share data, and use that knowledge to drive research in (a) mitigating missing/imbalanced data problems, (b) understanding and modeling security and privacy risks of data sharing, and (c) modeling utility of data sharing. (ii) Developing a risk-adaptive, policy model capable of capturing and articulating security and privacy expectations of users that are relevant in a particular context and develops associated technology to ensure provenance and accountability. (iii) Developing robust AI/ML algorithms that are transparent and explainable with respect to fairness and bias to reduce/eliminate discrimination, misuse, privacy violations, or other cyber-crimes. (iv) Developing models and techniques for a nuanced, contextually adaptive, and graded privacy paradigm that allows trade-offs between privacy and utility. Towards this, in this paper we present the SAFE-PASS framework to provide Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.