User Tools

Site Tools


research_activities

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
research_activities [2017/06/21 21:49]
fabio.massacci@unitn.it [Hot Topics (People currently working on it)]
research_activities [2022/07/12 07:11] (current)
Line 5: Line 5:
 You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]]. You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]].
  
-==== Hot Topics ​(People currently working on it) ====+==== Hotter ​Topics ====
  
 +  * [[Behavioral Biometrics]]
   * [[Security Economics]]   * [[Security Economics]]
   * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]]   * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]]
-  * [[vulnerability_discovery_models|How to find and assess vulnerabilities?]]+  * [[Vulnerability_discovery_models|How to Find and Assess (Dangerous) Vulnerabilities?]] 
 +  * [[malware_analysis|Cyber Security Testbeds and Malware Testing]] 
 +  * [[https://​squera.github.io/​about/​|Secure Compilation]]
  
-==== Interesting Topics ​(Looking for New Students to keep going) ​====+==== Interesting Topics ====
  
-  * [[testrex|Cyber ​Security ​Testbeds]] +  * [[Mobile Phone Security]]
-  * [[Malware Analysis]]+
   * [[Practical Enforcement of Information Flow Properties]]   * [[Practical Enforcement of Information Flow Properties]]
   * [[Security Requirements Engineering]]   * [[Security Requirements Engineering]]
-  * [[https://​sites.google.com/​site/​securepubsub/​home|Secure Publisher/​Subscriber System]] ​ 
   * [[Innovation Potential of Security Research]]   * [[Innovation Potential of Security Research]]
  
Line 24: Line 25:
   * [[Security-by-Contract for Mobile and Smart Card]]   * [[Security-by-Contract for Mobile and Smart Card]]
   * [[Securing Access to Cloud Storage]]   * [[Securing Access to Cloud Storage]]
 +  * [[https://​sites.google.com/​site/​securepubsub/​home|Secure Publisher/​Subscriber System]] ​
   * [[http://​disi.unitn.it/​~massacci/​CryptoSAT/​|Logical Cryptanalysis aka SAT-based Cryptanalysis]]   * [[http://​disi.unitn.it/​~massacci/​CryptoSAT/​|Logical Cryptanalysis aka SAT-based Cryptanalysis]]
  
research_activities.1498074577.txt.gz · Last modified: 2021/01/29 10:58 (external edit)