Visible to the public Science of Security VO

The 8th Annual Best Scientific Cybersecurity Paper Competition is now open for nominations. This year's nominating period runs through midnight on March 31, April 15, 2020. We look forward to receiving your nominations.
Subscribe to Reviews & Outreach (R&O) - designed to highlight some of the exciting research, news, and events that impact our technical community.
NSA Researcher, a familiar face at SoS meeting, Dr. Ahmad Ridley was presented with the 2020 Black Engineer of the Year Science Spectrum Trailblazer Award. "Hopefully, I, as an African American male in STEM, can inspire students who do not often see themselves represented in STEM to be resilient in achieving their goals...
Each quarter, The National Security Agency recognizes the agency's engagement with an academic institution. This quarter, the school is Carnegie Mellon University in Pittsburgh, PA. CMU has many relationships with the NSA including hosting an SoS Lablet. To learn more about the CMU / NSA relationship, visit
7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium September 22-23, 2020 | Lawrence, Kansas | HoTSoS is a research event centered on the Science of Security, which aims to address the fundamental problems of security in a principled manner. The seventh annual HoTSoS event...
Human Factors and Ergonomics Society (HFES) - Call for Papers HFES is looking for submissions of research and practice related to the human and cybersecurity! HFES is interested in building a broad community between human and cyber experts. The HFES society has added a CyberTechnical Group which will be accepting papers...
The lastest information on all upcoming science of security related events.
COVID-19 Information In light of the recent developments concerning the COVID-19, the Steering Committee is currently exploring different options and contingency plans depending on how the situation will evolve, including rescheduling the conference. In any case all papers accepted in the different tracks will be...

  • Abstract: Logic encryption, a method to lock a circuit from unauthorized use unless the correct key is provided, is the most important technique in hardware IP protection. However, with the discovery of the SAT attack, all traditional logic encryption algorithms are broken. New algorithms after the SAT... more
  • Abstract: The globalization of the integrated circuit supply chain has given rise to major security concerns ranging from intellectual property piracy to hardware Trojans. Logic encryption is a promising solution to tackle these threats. Recently, a Boolean satisfiability attack capable of unlocking existing... more
  • Abstract: more
  • Abstract: This paper focuses on research of a provably secure code-based pseudorandom sequence generators whose cryptanalysis problem equals to syndrome decoding (belonging to the NP-complex class). It was found that generated sequences of such well-known Fischer-Stern code-based generator don’t have a... more
  • Abstract: In recent years, the research community has increasingly focused on understanding the security and privacy challenges posed by deep learning models. However, the security domain and the privacy domain have typically been considered separately. It is thus unclear whether the defense methods in one... more