Cybersecurity and Software Assurance
Permanent URI for this collectionhttps://hdl.handle.net/10125/112558
Browse
Recent Submissions
Item type: Item , Self-Modifiable Reversible Circuits(2026-01-06) Fiske, MichaelSelf-modifiable reversible circuits are introduced. The purpose of these circuits is twofold: first, reversible circuits can reduce the energy consumption in a digital computer by orders of magnitude. Second, self-modifiable reversible circuits provide computational advantages in cybersecurity and in AI. Our focus is on integrating quantum randomness into reversible circuits that implement cryptographic algorithms. These new circuits hinder Eve listening to the hardware computations because the physical locations of the bit computations are capable of moving randomly across different parts of the circuit. These circuits are likely to hinder Eve from capturing cryptographic keys even if she uses acoustic, electromagnetic, or power cryptanalysis. At the hardware level, these circuits also provide new obfuscation tools that help keep an algorithm private.Item type: Item , Securing Python Supply Chain: Using Graph Theory for Vulnerability Prediction(2026-01-06) Zanella, Gianluca; Rad, Pouria; Liu, Charles ZhechaoThe open-source Python ecosystem is a complex system whose community-driven nature creates significant software assurance challenges. This study develops a foundational, graph-theory-based technique for proactively predicting vulnerability in these critical supply chains. Modeling the Python Package Index (PyPI) as a directed graph of 411,056 packages, we evaluate how network centrality metrics, such as indegree, betweenness, and PageRank, serve as proxies for security risk. Our analysis demonstrates their significant power to predict both direct and indirect, dependency-propagated vulnerabilities. The results reveal how a few high-centrality nodes can cascade risk across thousands of downstream packages. This approach provides a scientific basis for ensuring system integrity, enabling new tools and practices to identify systemic weaknesses before exploits occur, and bridging the gap between collaborative innovation and robust cybersecurity.Item type: Item , Introduction to the Minitrack on Cybersecurity and Software Assurance(2026-01-06) Llanso, Thomas; Chamberlain, Luanne; George, Richard
