| |||||||||||||||
CYSARM 2020 : 2nd Workshop on Cyber-Security Arms Race | |||||||||||||||
Link: https://www.cysarm.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Cybersecurity is a complex ecosystem that is based on several contradicting requirements. For this reason, it is often defined as an arms race between attackers and defenders: for example, when a new security model or algorithm is devised, it could act as a double-edged sword since it might both enhance the security posture of a system and introduce additional vulnerabilities. The goal of CYSARM workshop is to foster collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-offs of cybersecurity and how new security technologies and algorithms might impact the security of existing or future security models.
Topics of interest include but are not limited to: -Arms races and trade-offs in cyber-security (e.g., attackers vs defenders, security vs privacy, security vs trust, security vs usability, etc.) -Double-edged sword techniques in cyber-security (e.g., artificial intelligence) -Impact of quantum computing on cyber-security (not limited to cryptography) -Intrusion detection and evasion, and counter-evasion (also applied to malware analysis) -Next-generation trustworthy computing security solutions and attacks (e.g., TPMs, TEEs, SGX, SE), and their impact -Novel attacks and protection solutions in mobile, IoT and Cloud -Security analysis of protocols, including use of formal techniques -Standardization of cyber security and trust techniques -Validation of cyber-security technologies -Post-quantum cryptography and advanced cryptographic techniques (e.g., homomorphic encryption, secure multi-party computation and differential privacy) For more information, please see: https://www.cysarm.org/ |
|