This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
research_activities [2017/06/21 21:48] fabio.massacci@unitn.it [Interesting Topics (Looking for New Students to keep going)] |
research_activities [2022/07/12 09:11] marco.patrignani@unitn.it |
||
---|---|---|---|
Line 5: | Line 5: | ||
You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]]. | You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]]. | ||
- | ==== Hot Topics (People currently working on it) ==== | + | ==== Hotter Topics ==== |
+ | * [[Behavioral Biometrics]] | ||
* [[Security Economics]] | * [[Security Economics]] | ||
* [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]] | * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]] | ||
- | * [[vulnerability_discovery_models|How to find and assess vulnerabilities?]] | + | * [[Vulnerability_discovery_models|How to Find and Assess (Dangerous) Vulnerabilities?]] |
- | * [[Risk Assessment for a Network Attack Surface]] | + | * [[malware_analysis|Cyber Security Testbeds and Malware Testing]] |
+ | * [[Secure Compilation]] | ||
- | ==== Interesting Topics (Looking for New Students to keep going) ==== | + | ==== Interesting Topics ==== |
- | * [[testrex|Security Testbeds]] | + | * [[Mobile Phone Security]] |
- | * [[Malware Analysis]] | + | |
* [[Practical Enforcement of Information Flow Properties]] | * [[Practical Enforcement of Information Flow Properties]] | ||
* [[Security Requirements Engineering]] | * [[Security Requirements Engineering]] | ||
- | * [[https://sites.google.com/site/securepubsub/home|Secure Publisher/Subscriber System]] | ||
* [[Innovation Potential of Security Research]] | * [[Innovation Potential of Security Research]] | ||
Line 25: | Line 25: | ||
* [[Security-by-Contract for Mobile and Smart Card]] | * [[Security-by-Contract for Mobile and Smart Card]] | ||
* [[Securing Access to Cloud Storage]] | * [[Securing Access to Cloud Storage]] | ||
+ | * [[https://sites.google.com/site/securepubsub/home|Secure Publisher/Subscriber System]] | ||
* [[http://disi.unitn.it/~massacci/CryptoSAT/|Logical Cryptanalysis aka SAT-based Cryptanalysis]] | * [[http://disi.unitn.it/~massacci/CryptoSAT/|Logical Cryptanalysis aka SAT-based Cryptanalysis]] | ||