User Tools

Site Tools


research_activities

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
research_activities [2017/06/21 20:39]
fabio.massacci@unitn.it [Cold Topics]
research_activities [2022/07/12 07:11] (current)
Line 5: Line 5:
 You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]]. You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]].
  
-==== Hot Topics ​(People currently working on it) ====+==== Hotter ​Topics ====
  
 +  * [[Behavioral Biometrics]]
   * [[Security Economics]]   * [[Security Economics]]
-  * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security]] +  * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security ​Risk Assessment]] 
-  * [[vulnerability_discovery_models|Predictive Models for Vulnerabilities]] +  * [[Vulnerability_discovery_models|How to Find and Assess (Dangerous) ​Vulnerabilities?]] 
-  * [[Risk Assessment for a Network Attack Surface]]+  * [[malware_analysis|Cyber Security Testbeds and Malware Testing]] 
 +  * [[https://​squera.github.io/​about/​|Secure Compilation]]
  
-==== Interesting Topics ​(Looking for New Students to keep going) ​====+==== Interesting Topics ====
  
-  * [[Malware Analysis]]+  * [[Mobile Phone Security]]
   * [[Practical Enforcement of Information Flow Properties]]   * [[Practical Enforcement of Information Flow Properties]]
   * [[Security Requirements Engineering]]   * [[Security Requirements Engineering]]
-  * [[https://​sites.google.com/​site/​securepubsub/​home|Secure Publisher/​Subscriber System]] ​ 
   * [[Innovation Potential of Security Research]]   * [[Innovation Potential of Security Research]]
  
Line 24: Line 25:
   * [[Security-by-Contract for Mobile and Smart Card]]   * [[Security-by-Contract for Mobile and Smart Card]]
   * [[Securing Access to Cloud Storage]]   * [[Securing Access to Cloud Storage]]
 +  * [[https://​sites.google.com/​site/​securepubsub/​home|Secure Publisher/​Subscriber System]] ​
   * [[http://​disi.unitn.it/​~massacci/​CryptoSAT/​|Logical Cryptanalysis aka SAT-based Cryptanalysis]]   * [[http://​disi.unitn.it/​~massacci/​CryptoSAT/​|Logical Cryptanalysis aka SAT-based Cryptanalysis]]
  
research_activities.1498070369.txt.gz · Last modified: 2021/01/29 10:58 (external edit)