Visible to the public  Fall'21 Science of Security Quarterly Lablet Meeting
Nov 15, 2021 10:00 am - Nov 16, 2021 4:00 pm CST

The Fall'21 Science of Security Quarterly Lablet Meeting will be hosted by The University  of Kansas on November 15-16, 2021. The program agenda will include invited talks from Dr. Robert Runser (NSA) and Dr. Natarajan Shankar (SRI) as well as briefs from the Lablets. 

The meeting will be virtual. To gain access to the meeting, please register here: https://cps-vo.org/LabletQTRLY/2021/KU-register



Visible to the public Micro-Architectural Attacks and Defenses



Visible to the public Defining Flexible Mechanisms for Attestation


Visible to the public  Summer '19 SoS Quarterly Meeting
Jul 09, 2019 9:00 am - Jul 10, 2019 5:00 pm CDT

2019 Summer Science of Security and Privacy Quarterly Meeting at KU

The 2019 Summer Science of Security and Privacy Quarterly Meeting will be hosted by the University of Kansas in Lawrence KS, July 9 and 10, 2019.


Register to Attend: Registration Link




Visible to the public Secure Native Binary Execution

Typically, securing software is the responsibility of the software developer. The customer or end-user of the software does not control or direct the steps taken by the developer to employ best practice coding styles or mechanisms to ensure software security and robustness. Current systems and tools also do not provide the end-user with an ability to determine the level of security in the software they use. At the same time, any flaw or security vulnerabilities ultimately affect the end-user of the software.


Visible to the public Side-Channel Attack Resistance

Cyber-Physical Systems (CPS)--cars, airplanes, power plants, and etc.--are increasingly dependent on powerful and complex hardware for higher intelligence and functionalities. However, this complex hardware may also introduce new attack vectors--hardware side-channels--which can be exploited by attackers to steal sensitive information, to disrupt timing of time critical functions that interact with the physical plants, or to break memory protection mechanisms in modern computers.


Visible to the public Scalable Trust Semantics & Infrastructure

Remote attestation provides a run-time capability for appraising system behavior and establishing trust. Using remote attestation, an appraiser requests evidence describing a target. The target responds by performing measurement to gather evidence then adds cryptographic signatures to assure integrity and authenticity. The appraiser takes the evidence and assesses the target's behavior to determine if the target is who and what it claims to be.


Visible to the public Formal Approaches to the Ontology & Epistemology of Resilience

Security Science requires reflection on its foundational concepts. Our contention is that in order to make informed decisions about trade-offs with respect to resilient properties of systems we must first precisely characterize the differences between the mechanisms underlying valuable functions, those functions themselves, and the conditions underlying the persistence of the systems in question.


Visible to the public Cloud-Assisted IoT Systems Privacy

The key to realizing the smart functionalities envisioned through the Internet of Things (IoT) is to securely and efficiently communicate, store, and make sense of the tremendous data generated by IoT devices. Therefore, integrating IoT with the cloud platform for its computing and big data analysis capabilities becomes increasingly important, since IoT devices are computational units with strict performance and energy constraints. However, when data is transferred among interconnected devices or to the cloud, new security and privacy issues arise.