User Tools

Site Tools


research_activities

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
research_activities [2017/06/22 00:35]
fabio.massacci@unitn.it [Interesting Topics (Looking for New Students to keep going)]
research_activities [2022/07/12 07:11] (current)
Line 5: Line 5:
 You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]]. You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]].
  
-==== Hot Topics ​(People currently working on it) ====+==== Hotter ​Topics ====
  
-  * [[Biometrics]]+  * [[Behavioral ​Biometrics]]
   * [[Security Economics]]   * [[Security Economics]]
   * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]]   * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]]
-  * [[Vulnerability_discovery_models|How to find and assess vulnerabilities?]] +  * [[Vulnerability_discovery_models|How to Find and Assess (Dangerous) Vulnerabilities?]] 
-  * [[testrex|Cyber Security Testbeds]]+  * [[malware_analysis|Cyber Security Testbeds ​and Malware Testing]] 
 +  * [[https://​squera.github.io/​about/​|Secure Compilation]]
  
-==== Interesting Topics ​(Looking for New Students to keep going) ​====+==== Interesting Topics ====
  
   * [[Mobile Phone Security]]   * [[Mobile Phone Security]]
-  * [[Malware Analysis]] 
   * [[Practical Enforcement of Information Flow Properties]]   * [[Practical Enforcement of Information Flow Properties]]
   * [[Security Requirements Engineering]]   * [[Security Requirements Engineering]]
-  * [[https://​sites.google.com/​site/​securepubsub/​home|Secure Publisher/​Subscriber System]] ​ 
   * [[Innovation Potential of Security Research]]   * [[Innovation Potential of Security Research]]
  
Line 26: Line 25:
   * [[Security-by-Contract for Mobile and Smart Card]]   * [[Security-by-Contract for Mobile and Smart Card]]
   * [[Securing Access to Cloud Storage]]   * [[Securing Access to Cloud Storage]]
 +  * [[https://​sites.google.com/​site/​securepubsub/​home|Secure Publisher/​Subscriber System]] ​
   * [[http://​disi.unitn.it/​~massacci/​CryptoSAT/​|Logical Cryptanalysis aka SAT-based Cryptanalysis]]   * [[http://​disi.unitn.it/​~massacci/​CryptoSAT/​|Logical Cryptanalysis aka SAT-based Cryptanalysis]]
  
research_activities.1498084530.txt.gz · Last modified: 2021/01/29 10:58 (external edit)