| |||||||||||||||
CYSARM 2021 : 3rd Workshop on Cyber-Security Arms Race | |||||||||||||||
Link: https://www.cysarm.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Cybersecurity is a complex ecosystem that is based on several contradicting requirements. For this reason, it is often defined as an arms race between attackers and defenders: for example, when a new security model or algorithm is devised, it could act as a double-edged sword since it might both enhance the security posture of a system and introduce additional vulnerabilities. The goal of CYSARM workshop is to foster collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-offs of cybersecurity and how new security technologies and algorithms might impact the security of existing or future security models.
Topics of Interest include but are not limited to: -Arms races and trade-offs in cyber-security (for instance: security vs privacy, security vs trust, security vs usability) -Double-edged sword techniques in cyber-security (e.g., artificial intelligence, cryptography) -Impact of novel technologies on cyber-security (e.g., blockchain technologies, quantum computing) and their misuse -Intrusion detection and evasion (e.g., in malware analysis) -Modelling attackers and defenders (e.g., simulations, game-theoretic models) -Next-generation trustworthy computing security solutions (e.g., TPMs, TEEs, SGX) and attacks against them -Novel attacks and defenses in mobile, IoT, cloud and fog environments -Post-quantum cryptography and advanced cryptographic techniques (e.g., homomorphic encryption, secure multi-party computation and differential privacy) and attacks against them For more information, please see: https://www.cysarm.org/ |
|