Visible to the public Science of Security VO

What makes a great cyber science fair project? The SoS-VO has a node for that...
This that time of the year again. No, not Mother's Day. Yes, I have a wonderful mother that every year, I don't visit because I'm traveling for the science fair. So from Phoenix, Happy Mother's Day, Mom. Onto the trip. I'm back in Phoenix Arizona. Yay! We're back! So for the first time readers. This is the fifth (it's...
At RSA 2019, the National Security Agency released Ghidra as a free tool. Ghidra is a software reverse engineering tool. Plans are underway to release it as open source on GitHub. For more information visit the official site: https://www.nsa.gov/resources/everyone/ghidra/ ZDnet Article on the release: https://www.zdnet....
Subscribe to Reviews & Outreach (R&O) - designed to highlight some of the exciting research, news, and events that impact our technical community.
Phoenix, AZ - On Thrusday Night, May 16, 2019, The National Security Agency Executive Director, Mr. Harry Coker, and NSA Researcher and Science of Security and Privacy (SoS) Technical Lead, Dr. Adam Tagert, presented the NSA Research Directorate Awards to 10 outstanding high school scientists. These students were finalists...
The White House released an Executive Order on America's Cybersecurity Workforce. It call this workforce a national asset. It calls for the government to enhance mobility of the workforce to move between public and private employment. It call for development of skills and that the government must recognize and reward the...
The lastest information on all upcoming science of security related events.
Hot Topics in the Science of Security: Symposium and Bootcamp (HotSoS) 2019 Nashville, TN April 3, 2019 Cyberdeception, accountability, and attack surfaces among topics at HotSoS 2019 The 2019 Symposium and Bootcamp on the Science of Security (HoTSoS), the sixth annual event, was held April 2-3, 2019 at...





  • Abstract: Abstract--The past ten years has seen increasing calls to make security research more "scientific". On the surface, most agree that this is desirable, given universal recognition of "science" as a positive force. However, we find that there is little clarity on what "scientific" means in the... more
  • Abstract: Two of the main goals of power management in modern multicore processors are reducing the average power dissipation and delivering the maximum performance up to the physical limits of the system, when demanded. To achieve these goals, hardware manufacturers and operating system providers include... more
  • Abstract: Infrastructure-as-a-Service (IaaS), more generally the "cloud," changed the landscape of system operations on the Internet. Clouds' elasticity allow operators to rapidly allocate and use resources as needed, from virtual machines, to storage, to IP addresses, which is what made... more
  • Abstract: Motivation: The security of any system is a direct consequence of stakeholders' decisions regarding security requirements. Such decisions are taken with varying degrees of expertise, and little is currently understood about how various demographics - security experts, general computer... more
  • Abstract: Implementing security by design in practice often involves the application of threat modeling to elicit security threats and to aid designers in focusing efforts on the most stringent problems first. Existing threat modeling methodologies are capable of generating lots of threats, yet they lack... more