Visible to the public Science of Security VO

The lastest information on all upcoming science of security related events.
Cybersecurity Snapshots #17 - DoppelPaymer Ransomware Gang In a new report, McAfee researchers discovered that from Q3 to Q4 of 2020, the number of ransomware incidents that affected organizations rose 69%. In 2020 the FBI put out a warning of increased activity of a ransomware gang called DoppelPaymer. DoppelPaymer...
SoS Musings #48 - Ready to Embrace Zero Trust Security? Zero Trust has become more important than ever as digital transformation efforts accelerate, the attack surface expands, and conventional perimeter-based security approaches continue to fail. Zero Trust is an Information Technology security model that is based...
Spotlight on Lablet Research #16 - Project: Securing Safety-Critical Machine Learning Algorithms Lablet: Carnegie Mellon University This project seeks to understand how classifiers can be spoofed, including in ways that are not apparent to human observers, and how the robustness of classifiers can be enhanced,...
CALL FOR PAPERS International Joint Conference on Artificial Intelligence (IJCAI 2021) First International Workshop on Adaptive Cyber Defense 21-26 Aug - IJCAI Conference | https://sites.google.com/go.spawar.navy.mil/ijcai-acd-workshop/call-for-papers Important Dates 10 May - ACD Workshop paper submissions are due...
Subscribe to Reviews & Outreach (R&O) - designed to highlight some of the exciting research, news, and events that impact our technical community.
The Science of Security and Privacy 2021 Annual Report is now available. Science of Security and Privacy 2021 Annual Report highlights the progress and accomplishments of this initiative.
CMU launches new privacy engineering options Two new options make it easier for working professionals to receive privacy engineering training Daniel Tkacik NOV 23, 2020 As new privacy regulations like the General Data Protection Regulation and the California Consumer Privacy Act require companies to improve the way...

Visible to the public 






  • Abstract: The number of applications and services that are hosted on cloud platforms is constantly increasing. Nowadays, more and more applications are hosted as services on cloud platforms, co-existing with other services in a mutually untrusted environment. Facilities such as virtual machines, containers... more
  • Abstract: The advanced persistent threat (APT) landscape has been studied without quantifiable data, for which indicators of compromise (IoC) may be uniformly analyzed, replicated, or used to support security mechanisms. This work culminates extensive academic and industry APT analysis, not as an incremental... more
  • Abstract: Ransomware attacks are taking advantage of the ongoing pandemics and attacking the vulnerable systems in business, health sector, education, insurance, bank, and government sectors. Various approaches have been proposed to combat ransomware, but the dynamic nature of malware writers often bypasses... more
  • Abstract: Software Defined Networking (SDN) is a concept that decouples the control plane and the user plane. So the network administrator can easily control the network behavior through its own programs. However, the administrator may unconsciously apply some malicious programs on SDN controllers so that... more
  • Abstract: The market landscape has undergone dramatic change because of globalization, shifting marketing conditions, cost pressure, increased competition, and volatility. Transforming the operation of businesses has been possible because of the astonishing speed at which technology has witnessed the change... more