Visible to the public Science of Security VO

In the Spotlight

The lastest information on all upcoming science of security related events.
The upcoming quarterly SoS Lablet meeting will be held at the University of Maryland on Tuesday, October 28 and Wednesday, October 29, 2014. The meeting for both days will take place on the UMD Campus at the Riggs Alumni Center, Orem Rooms A, B, and C. The program agenda and logistics information can be found at: http://...
A conference that invites various professionals, academics, and enthusiasts interested in information security. Briefings and Trainings are offered; Training hosted by varying computer security vendors. Briefings inform and discuss most current, popular topics, and include notable keynote speakers.
ACSAC invites discussion on current topics in secure computing, as well as presentations of peer-reviewed research (ACSAC has a 2013 acceptance rate of just 19%). The special focus of this year's conference is "Cybersecurity for Cyber-Physical Systems". The program will feature 47 peer-reviewed research papers, CPS Track,...
This annual European conference is dedicated to informing and networking experts from across the globe in computer, network, and application security. Leading security professionals in academia, government, industry, and underground to attend.
The Department of Homeland Security (DHS) has collections of databases in its data repository PREDICT (Protected Repository for Defense of Infrastructure Against Cyber Threats) which is open for the cyber research community to use. More Information on PREDICT and its Data Classes can be found at
Regarded as the largest telecommunications exhibition in the Caspian basin and the Caucasus, BakuTel brings international ICT companies, government, and media to discover, discuss, and be informed of newest ideas, projects, and services for security, communication and networks, analysis, and more.
Now open for submissions the 3rd Annual Best Scientific Cybersecurity Paper Competition invites nominations of published papers that show an outstanding contribution to cybersecurity science. Click here for more details about this year's competition.

Visible to the public 

Recently Posted Publications

  • Abstract: To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software. more
  • Abstract: A precise characterization is given for the class of security policies enforceable with mechanisms that work by monitoring system execution, and automata are introduced for specifying exactly that class of security policies. Techniques to enforce security policies specified by such automata are... more
  • Abstract: Electronic computers have evolved from exiguous experimental enterprises in the 1940s to prolific practical data processing systems in the 1980s. As we have come to rely on these systems to process and store data, we have also come to wonder about their ability to protect valuable data.
    Data... more

Recent News