Visible to the public Science of Security VO

The eleventh NSA Competition for Best Scientific Cybersecurity Paper is now live! Nominations close April 15th. In order to encourage the development of the scientific foundations of cybersecurity, the National Security Agency (NSA) established The Annual Best Scientific Cybersecurity Paper Competition. NSA invites...
The tenth NSA Competition for Best Scientific Cybersecurity Paper recognizes the best scientific cybersecurity paper published in 2021. Papers were nominated between December 15, 2021 through April 15, 2022. The winning paper, “Verifying Hyperproperties with Temporal Logic of Actions (TLA),” authored by Leslie Lamport and...
HOTSOS 2022 BEST POSTER AWARD Congratulations to Samin Yaseer Mahmud & William Enck at NCSU for winning the HoTSoS Best Poster Award for their poster A Study of Security Weakness in Android Payment Service Provider SDKs.  Check out the Announcement & Closing Remarks stream here...
HOTSOS 2022 BEST UNDERGRADUATE POSTER AWARD Congratulations to Sanjana Cheerla at NCSU for winning the HoTSoS Best Undergraduate Poster Award for their poster Identifying Online Misbehavior. Check out the Announcement & Closing Remarks stream here!  
HoTSoS 2023: Registration Open March 7th! The Hot Topics in the Science of Security (HoTSoS) Symposium is a research event centered on the Science of Security, which aims to address the fundamental problems of security in a principled manner. The tenth annual event will be virtually held April 3-5, 2023. Registration for...
SoS Musings #67 - Bolstering Firmware Security Attackers are increasingly focusing on device firmware. A report from the US Department of Commerce and the US Department of Homeland Security defines firmware as a set of programs and data that are embedded in hardware and is typically stored in Non-Volatile Memory (NVM)...
Hot Topics in the Science of Security (HotSoS) 2022 The University of Illinois at Urbana-Champaign (UIUC) virtually hosted the 9th Annual Symposium on the Science of Security (HotSoS), from 5-7 April 2022. The General Chair was Sayan Mitra (UIUC) and Program Co-Chairs were Adam Tagert (NSA) and Benjamin Ujcich (...
This week, NATO kicked off its Cyber Coalition 22 exercise to enhance cyber resilience among its members. NATO brought together 1000 defenders from 26 member countries plus Finland and Sweden, Georgia, Ireland, Japan, Switzerland, and the EU, as well as participants from industry and academia. NATO stated that the five-...

Visible to the public 

  • Abstract: While Smart contracts are agreements stored on Blockchain, NFTs are representation of digital assets encoded as Smart Contracts. The uniqueness of a Non-Fungible Token (NFT) is established through the digital signature of the creator/owner that should be authenticatable and verifiable over a long... more
  • Abstract: In the PKI-CA system with a traditional trust model based on trust chain and centralized private key management, there are some problems with issuing certificates illegally, denying issued certificates, tampering with issuance log, and leaking certificate private key due to the excessive power of a... more
  • Abstract: The access control mechanism of most consortium blockchain is implemented through traditional Certificate Authority scheme based on trust chain and centralized key management such as PKI/CA at present. However, the uneven power distribution of CA nodes may cause problems with leakage of certificate... more
  • Abstract: It is the key to the Internet's expansion of social and economic functions by ensuring the credibility of online users' identities and behaviors while taking into account privacy protection. Public Key Infrastructure (PKI) and blockchain technology have provided ways to achieve... more
  • Abstract: We propose DecCert, a decentralized public key infrastructure designed as a smart contract that solves the problem of identity attestation on public blockchains. Our system allows an individual to bind an identity to a public blockchain address. Once a claim of identity is made by an individual,... more