Visible to the public Science of Security VO

This that time of the year again. No, not Mother's Day. Yes, I have a wonderful mother that every year, I don't visit because I'm traveling for the science fair. So from Phoenix, Happy Mother's Day, Mom. Onto the trip. I'm back in Phoenix Arizona. Yay! We're back! So for the first time readers. This is the fifth (it's...
What makes a great cyber science fair project? The SoS-VO has a node for that...
At RSA 2019, the National Security Agency released Ghidra as a free tool. Ghidra is a software reverse engineering tool. Plans are underway to release it as open source on GitHub. For more information visit the official site: https://www.nsa.gov/resources/everyone/ghidra/ ZDnet Article on the release: https://www.zdnet....
The White House released an Executive Order on America's Cybersecurity Workforce. It call this workforce a national asset. It calls for the government to enhance mobility of the workforce to move between public and private employment. It call for development of skills and that the government must recognize and reward the...
NIST released Special Publication 1900-202 on Cyber Physical Systems and Internet of Things. This document focuses on the meanings of the phrases "cyber-physical systems" (CPS) and "Internet of Things" (IoT), and on the relationship between them. The purpose is to promote a unified measurement science and standards...
The Office of the Director of National Intelligence (ODNI) released the 2019 National Intelligence Strategy. The strategy is broad, covering what needs to be done in the 17 IC elements, Cyber is an important part. Its major area 4. Cyber threats are already challenging public confidence in our global institutions,...
The lastest information on all upcoming science of security related events.
Subscribe to Reviews & Outreach (R&O) - designed to highlight some of the exciting research, news, and events that impact our technical community.





  • Abstract: Abstract--The past ten years has seen increasing calls to make security research more "scientific". On the surface, most agree that this is desirable, given universal recognition of "science" as a positive force. However, we find that there is little clarity on what "scientific" means in the... more
  • Abstract: Two of the main goals of power management in modern multicore processors are reducing the average power dissipation and delivering the maximum performance up to the physical limits of the system, when demanded. To achieve these goals, hardware manufacturers and operating system providers include... more
  • Abstract: Infrastructure-as-a-Service (IaaS), more generally the "cloud," changed the landscape of system operations on the Internet. Clouds' elasticity allow operators to rapidly allocate and use resources as needed, from virtual machines, to storage, to IP addresses, which is what made... more
  • Abstract: Motivation: The security of any system is a direct consequence of stakeholders' decisions regarding security requirements. Such decisions are taken with varying degrees of expertise, and little is currently understood about how various demographics - security experts, general computer... more
  • Abstract: Implementing security by design in practice often involves the application of threat modeling to elicit security threats and to aid designers in focusing efforts on the most stringent problems first. Existing threat modeling methodologies are capable of generating lots of threats, yet they lack... more