Workshop on Cyber-Security Arms Race (CYSARM)

November 15th, 2019

 November 15th, 2019  

Workshop on Cyber-Security Arms Race (CYSARM)

United Kingdom » 
November 15th, 2019

Event Website

InfoSec Conference Summary

The description was submitted by the Conference Organizer. We sometimes edit it to enhance the listing.

favouriteLoadingAdd this conference to your favourites

Cybersecurity is a complex ecosystem that is based on several contradicting requirements. For this reason, it is often defined as an arms race between attackers and defenders: for example, when a new security model or algorithm is devised, it could act as a double-edged sword since it might both enhance the security posture of a system and introduce additional vulnerabilities. Similarly, many of the novel technological solutions that are used to improve the security of systems and networks are also being used by those who wish to threaten well-established algorithms and protocols. For example, it is already known that when large-scale quantum computers become available they will be able to break almost all the public-key cryptographic algorithms currently in use. Security is also about balancing several trade-offs, e.g. security vs privacy, security vs trust, security vs usability, security vs cost, research vs standardization, academic research vs real applications, just to name a few. For example, while artificial intelligence provides the ability to efficiently analyse massive data streams to detect patterns of anomalous behaviour, it also threatens user privacy by enabling the analysis of individual behaviours, and democratic government by subverting opinions via electronic media. Likewise, the use of trustworthy computing and trusted hardware: while it fortifies systems by providing stronger security and operational assurance guarantees, it also allows attackers to perform stealthy attacks and could be used to damage user privacy. The goal of CYSARM workshop is to foster collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-offs of cybersecurity and how new security technologies and algorithms might impact the security of existing or future security models.

Topics of Interest
Topics of interest include but are not limited to:

  • Advanced cryptographic techniques (e.g., homomorphic encryption, secure multi-party computation and differential privacy)
  • Arms races and trade-offs in cyber-security (e.g., attackers vs defenders, security vs privacy, security vs trust, security vs usability, etc.)
  • Double-edged sword techniques in cyber-security (e.g., artificial intelligence)
  • Impact of quantum computing on cyber-security (not limited to cryptography)
  • Next-generation trustworthy computing security solutions and attacks (e.g., TPMs, TEEs, SGX, SE), and their impact
  • Novel attacks and protection solutions in mobile, IoT and Cloud
  • Post-quantum cryptography
  • Security analysis of protocols, including use of formal techniques
  • Standardization of cyber security and trust techniques
  • Validation of cyber-security technologies

Submit a review for this event.

Did you attend Workshop on Cyber-Security Arms Race (CYSARM)? Let us know how it was and share your experience with the greater community.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.