Moreover, we cannot preempt every possible attack, and hence need techniques that can detect and name subtle patterns in data that we can act upon. In short, this research area aims to devise an engineering process that significantly improves the security and privacy of today's real-world software, that keep pace with the continuing growth in complexity for future IT systems, and that is conveniently usable even by laypeople users and developers. It provides empirical methods and tools for dealing with unstructured, heterogeneous datasets at scale, techniques for ensuring the security of web applications and services as well as usable and effective solutions for application development and maintenance.
Proceedings of the 30th Usenix Security SymposiumUsenix Security 2021
USENIX Security Symposium30th USENIX Security Symposium (USENIX Security'21)
ACM AsiaCCSAsiaCCS 2021
2021 ACM Asia Conference on Computer and Communications Security (ASIA CCS ’21)2021 ACM Asia Conference on Computer and Communications Security (ASIA CCS ’21)
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021)IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021)