Visible to the public Science of Security VO

In the Spotlight

The lastest information on all upcoming science of security related events.
The Research Directorate of the National Security Agency is pleased to announce the winner of this year's Science of Security (SoS) Best Scientific Cybersecurity Paper Competition. Of the 35 papers nominated, one winner and one honorable mention were chosen...
An ad hoc National Research Council committee will consider future research goals and directions for foundational science in cybersecurity, to include relevant efforts in economics and behavioral science as well as more "traditional" cybersecurity topics. It will also consider how investments in foundational work support...
The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users...
Regarded as the largest telecommunications exhibition in the Caspian basin and the Caucasus, BakuTel brings international ICT companies, government, and media to discover, discuss, and be informed of newest ideas, projects, and services for security, communication and networks, analysis, and more.
The 2014 Symposium and Bootcamp on the Science of Security (HotSoS) was held April 8-9, 2014 in Raleigh, North Carolina. Presentations given at this meeting are archived at http://cps-vo.org/group/sos/hotsos2014/program . Over 130 leaders from government, industry, and the academic community met to discuss new and ongoing...
The LASER workshop invites papers that strive to exemplify the practice of science in cyber security. The goal of this series of workshops, now in its third year, is to address the practice of good science. We encourage participants who want to help others improve their practice and participants who want to improve their...
The Saturday Cybersecurity Awareness Workshop for Grades 6-8 provides an interactive learning and mentoring experience for girls in grades 6-8 who are interested in technology, computers, and cybersecurity! Undergraduate students will lead activities in various computer and technology related topics. This event will...

Visible to the public 

Recent Publications

  • Abstract: Pop-refinement is an approach to stepwise refinement, carried out inside an interactive theorem prover by constructing a monotonically decreasing sequence of predicates over deeply embedded target programs. The sequence starts with a predicate that characterizes the possible implementations, and... more
  • Abstract: We introduce noncooperatively optimized tolerance (NOT), a game theoretic generalization of highly optimized tolerance (HOT), which we illustrate in the forest fire framework. As the number of players increases, NOT retains features of HOT, such as robustness and self-dissimilar landscapes, but... more
  • Abstract: Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving... more

Recent News

Upcoming Events