Over 70 Articles - Selected Example Publications:
- Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri. Cryptography is Rocket Science. In Proceedings of Communications in Cryptology, 2025.
- Douglas Van Bossuyt, Douglas Allaire, Jason Bickford, Thomas Bozada, Wei Chen, Roger Cutitta, Robert Cuzner, Kristen Fletcher, Ronald Giachetti, Britta Hale, Howie Huang, Michael Keidar, Astrid Layton, Allison Ledford, Marina Lesse, Jonathan Lussier, Richard Malak, Bryan Mesmer, Gregory Mocko, Giovanna Oriti, Daniel Selva, Cameron Turner, Michael Watson, Ana Wooley, Zhen Zeng. The Future of Digital Twin Research and Development. In Proceedings of the Journal of Computing and Information Science in Engineering (JCISE).
- Mathieu Couillard, Britta Hale. DRACO: Production Network Deployment and Evaluation of Deceptive Defense As-a-Service. In Proceedings of IEEE International Conference on Big Data CyberHunt. 2024
- Christopher Britt, Andre Leon, Britta Hale. An Analysis of Operational Security Requirements for Unmanned Systems. In Proceedings of Naval Engineering Journal (NEJ), 2024.
- Andre Leon, Christopher Britt, Britta Hale. Multi-Device Security Application for Unmanned Surface and Aerial Systems. In Proceedings of Drones, 2024.
- Christian Thiessen, Douglas L. Van Bossuyt, Britta Hale. Reducing Asymmetry in Countering Unmanned Aerial Systems. In Proceedings of Naval Engineering Journal (NEJ), 2023.
- Douglas L. Van Bossuyt, Britta Hale, Ryan Arlitt, and Nikolaos Papakonstantinou. Zero-Trust for the System Design Lifecycle.
In Proceedings of the Journal of Computing and Information Science in Engineering (JCISE), 2023.
- B. Hayden, M. Sweeney, B. Hale. Securing Software Updates under Receiver Radio Frequency Geolocation Risk.IEEE MILCOM, 2022.
- D. L. Van Bossuyt, B. Hale, R. M. Arlitt, N. Papakonstantinou. Multi-Mission Engineering With Zero Trust: A Modeling
Methodology and Application to Contested Offshore Wind Farms. In Proceedings of the ASME 2022 IDETC. 2022 Systems Engineering,
Information, and Knowledge Management (SEIKM) Technical Committee Best Paper Award
- C. H. Lee, D. L. Van Bossuyt, B. Hale. A Systems Analysis of Energy Usage and Effectiveness of a Counter-Unmanned Aerial
System Using a Cyber-Attack Approach. In Proceedings of MDPI Drones Journal, 2022.
- E. Dietz, B. Hale, D. Davis. Utilizing the Messaging Layer Security Protocol
in a Lossy Communications Aerial Swarm. In Proceedings of the Hawaii International Conference on System Sciences, 2022.
- V. Kanth and B. Hale. Blockchain-based Authenticated Stego-Channels: A Security Framework and Construction. In Proceedings of BLOCKCHAIN 2022.
- B. Hale and C. Komlo. On End-to-End Encryption. In IACR ePrint 2022.
- B. Dowling and B. Hale. Secure Messaging Authentication against Active Man-in-the-Middle Attacks. In RWC 2022.
- C. S. Tan, D.L. Van Bossuyt, B. Hale. System Analysis of Counter Unmanned Aerial Systems Kill Chain in an
Operational Environment. In Proceedings of MDPI Systems Engineering Journal 2021.
- C. Cremers, B. Hale, K. Kohbrok. The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter. In Proceedings of USENIX 2021.
- B. Dowling and B. Hale. Secure Messaging Authentication against Active Man-in-the-Middle Attacks. In Proceedings of IEEE EuroS&P 2021.
- B. Hale, D. J. Van Bossuyt, N. Papakonstantinou, and O’Halloran. A Zero-Trust Methodology for Security of Complex Systems With Machine Learning Components. In Proceedings of the ASME 2021 IDETC/CIE2021.
- M. Sjoholmsierchio, B. Hale, D. Lukaszewski, and G. Xie. Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks. In IEEE NetSoft. 2021.
- N. Papakonstantinou, D. J. Van Bossuyt, J. Linnosmaa, B. Hale, B. and O’Halloran. A Zero Trust Hybrid Security and Safety Risk Analysis Method. In Proceedings of the Journal of Computing and Information Science in Engineering (JCISE) 2021.
- D. Brutzman, T. Norbraten, J. Culbert, and B. Hale. Blockchain Mergence for Distributed Ledgers Supporting Fleet Logistics and Maintenance. In Acquisition Research Symposium 2021.
- M. Troncoso and B. Hale. The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol. In NDSS 2021.
- M. Sjoholmsierchio, B. Hale, D. Lukaszewski, and G. Xie. Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks. In arXiv ePrint. 2020.
- N. Papakonstantinou, D. J. Van Bossuyt, J. Linnosmaa, B. Hale, B. and O’Halloran. Towards a Zero Trust
Hybrid Security and Safety Risk Analysis Method. In Proceedings of the ASME 2020 IDETC/CIE2020.
- B. Hale. User-Mediated Authentication Protocols and Unforgeability in Key Collision. International Journal of Information Security (IJIS), 2020.
- C. Cremers, B. Hale, and K. Kohbrok. Revisiting Post-Compromise Security Guarantees in Group Messaging. IACR Cryptology ePrint 2019.
- B. Hale. User-Mediated Authentication Protocols and Unforgeability in Key Collision. In Proc. ProvSec 2018.
- C. Boyd and B. Hale. Secure Channels and Termination: The Last Word on TLS. In Proc. Latincrypt 2017. Lecture Notes in Computer Science, vol 11368. Springer.
- C. Rikardsen, B. Hale, and S.F. Mjølsnes. User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps. In Proc. NISK 2017.
- F. Günther, B. Hale, T. Jager, and S. Lauer. 0-RTT Key Exchange with Full Forward Secrecy. In Proc.
EUROCRYPT’17, volume 10212 of Lecture Notes in Computer Science, 2017.
- B. Hale, T. Jager, S. Lauer, and J. Schwenk. Simple Security Definitions for and Constructions of 0-RTT
Key Exchange. In Proc. Applied Cryptography and Network Security (ACNS) 2017. Lecture Notes in Computer Science, vol 10355. Springer, 2017.
- C. Boyd, B. Hale, S.F. Mjølsnes and D. Stebila. From Stateless to Stateful: Generic Authentication and Authenticated
Encryption Constructions with Application to TLS. In Proc.
RSA Conference on Topics of Cryptology (CT-RSA) 2016 volume 9610 pages 55–71. Springer, 2016.
- B. Hale, C. Carr, and D. Gligoroski. CARIBE: Cascaded IBE for Maximum Flexibility and User-side
Control. In MyCrypt 2016.
- B. Hale and C. Boyd. Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. In Proc. SSR’14, volume 8893
of Lecture Notes in Computer Science, pages 236–255. Springer-Verlag, 2016.
Book Chapters
- B. Hale, N. Bindel, D. L. Van Bossuyt. Quantum Computers – The Need for a New Cryptographic Strategy.
Handbook for Management of Threats, Security and Defense, Resilience and Optimal Strategies. Accepted / to appear, Springer 2023.
- D.L. Van Bossuyt, N. Papakonstantinou, B. Hale, J. Salonen. Model Based Resilience Engineering
for Design and Assessment of Mission Critical Systems Containing AI ComponentsArtificial Intelligence and Cybersecurity:
Theory and Applications. Accepted / to appear, Springer, 2023.
|