User Tools

Site Tools


research_activities

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
research_activities [2017/06/21 21:49]
fabio.massacci@unitn.it [Hot Topics (People currently working on it)]
research_activities [2022/07/12 09:11]
marco.patrignani@unitn.it
Line 5: Line 5:
 You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]]. You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]].
  
-==== Hot Topics ​(People currently working on it) ====+==== Hotter ​Topics ====
  
 +  * [[Behavioral Biometrics]]
   * [[Security Economics]]   * [[Security Economics]]
   * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]]   * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]]
-  * [[vulnerability_discovery_models|How to find and assess vulnerabilities?]]+  * [[Vulnerability_discovery_models|How to Find and Assess (Dangerous) Vulnerabilities?]] 
 +  * [[malware_analysis|Cyber Security Testbeds and Malware Testing]] 
 +  * [[Secure Compilation]]
  
-==== Interesting Topics ​(Looking for New Students to keep going) ​====+==== Interesting Topics ====
  
-  * [[testrex|Cyber ​Security ​Testbeds]] +  * [[Mobile Phone Security]]
-  * [[Malware Analysis]]+
   * [[Practical Enforcement of Information Flow Properties]]   * [[Practical Enforcement of Information Flow Properties]]
   * [[Security Requirements Engineering]]   * [[Security Requirements Engineering]]
-  * [[https://​sites.google.com/​site/​securepubsub/​home|Secure Publisher/​Subscriber System]] ​ 
   * [[Innovation Potential of Security Research]]   * [[Innovation Potential of Security Research]]
  
Line 24: Line 25:
   * [[Security-by-Contract for Mobile and Smart Card]]   * [[Security-by-Contract for Mobile and Smart Card]]
   * [[Securing Access to Cloud Storage]]   * [[Securing Access to Cloud Storage]]
 +  * [[https://​sites.google.com/​site/​securepubsub/​home|Secure Publisher/​Subscriber System]] ​
   * [[http://​disi.unitn.it/​~massacci/​CryptoSAT/​|Logical Cryptanalysis aka SAT-based Cryptanalysis]]   * [[http://​disi.unitn.it/​~massacci/​CryptoSAT/​|Logical Cryptanalysis aka SAT-based Cryptanalysis]]
  
research_activities.txt · Last modified: 2022/07/12 07:11 (external edit)