A body of knowledge containing laws, axioms and provable theories relating to some aspect of system security.
Event
ACSD 2014
14th International Conference on Application of Concurrency to System Design (ACSD 2014)
Submitted by Anonymous on December 19th, 2013
Event
RePP 2014
Reconciling Performance with Predictability
Submitted by Anonymous on December 19th, 2013
Event
SSS-14
Please join us for the AAAI Spring Symposium Series, to be held March 24-26, 2014 at Stanford University. The Spring Symposium Series is designed to bring colleagues together in an intimate forum while at the same time providing a significant gathering point for the AI community. The two and one half day format of the series allows participants to devote considerably more time to feedback and discussion than typical one-day workshops. The titles of the eight Spring Symposia are:     * Applied Computational Game Theory
Submitted by Anonymous on December 19th, 2013
Event
ECYPS 2014
2nd EUROMICRO/IEEE Workshop on Embedded and Cyber-Physical Systems (ECYPS 2014)   FOCUS: Embedded systems, being inseparable parts of certain larger (embedding) systems, constitute information-processing parts of cyber-physical systems composed of information-processing and physical sub-systems.
Submitted by Anonymous on December 19th, 2013
Event
DAC 2014
Design Methods for Automotive Systems and Software The automotive track has been created this year to bring together researchers and practitioners from the automotive domain with their counterparts from the embedded systems & software (ESS) domains.  This also includes those from the electronic design automation (EDA) space.
Submitted by Anonymous on November 11th, 2013
Event
RTCSA 2014
The 20th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2014) will be held in Chongqing, China. 
Submitted by Anonymous on November 11th, 2013

This year’s winner is Joseph Bonneau for his paper “The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords.”

*See contest results

Submitted by Anonymous on November 6th, 2013
This paper describes a systematic approach for analyzing code reuse attacks and defenses. It was presented at RAID'13 Symposium and published in Lecture Notes in Computer Science (LNCS) Volume 8145.
Hamed Okhravi Submitted by Hamed Okhravi on October 30th, 2013
SECURITY FABRIC SPECIAL INTEREST GROUP TO HOLD FORMATIVE MEETING IN NEW BRUNSWICK, NJ Part of Object Management Group’s quarterly technical meeting   Needham, MA—The Object Management Group (OMG®) will be hosting the formative meeting of a Security Fabric Special Interest Group (SFSIG) at its quarterly technical meeting at the Hyatt Regency in New Brunswick, NJ on Wednesday, September 25th at 1:30pm EST.  
Submitted by Anonymous on September 12th, 2013
Event
ICPPS 2014
The 5th ACM/IEEE International Conference on Cyber-Physical Systems.
Submitted by Anonymous on September 5th, 2013
Subscribe to Science of Security