Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3411505acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
CYSARM'20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security Virtual Event USA 13 November 2020
ISBN:
978-1-4503-8091-1
Published:
09 November 2020
Sponsors:
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 09 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 2nd Workshop on Cyber-Security Arms Race (CYSARM)! This year we are thrilled to continue chairing this workshop at a prestigious venue as the ACM Conference on Computer and Communications Security (CCS). Although CYSARM is at the early phases (this year marks the second edition of this workshop), the workshop is already fostering collaboration among researchers and practitioners to discuss the various facets and tradeoffs of cyber-security. Being the first workshop of its kind, CYSARM benefits the cyber-security community by addressing novel (and often controversial) topics in cyber-security, such as tradeoffs and double-edged sword techniques. Beyond the study of cyber-security, privacy and trust as standalone components, it is also important to look at how to balance their trade-offs especially when it comes to several contradicting requirements, such as security vs privacy, security vs trust, and security vs usability. CYSARM considers all complex facets and double-edged sword aspects of the cyber-security ecosystem, in particular, how new technologies and algorithms might impact the cyber-security of existing or future models and systems.

Skip Table Of Content Section
SESSION: Session 1: Regular Papers
research-article
Open Access
Protecting Enclaves from Intra-Core Side-Channel Attacks through Physical Isolation

Systems that protect enclaves from privileged software must consider software-based side-channel attacks. Our system isolates enclaves on separate secure cores to stop attackers from running on the same core as the victim, which mitigates intra-core ...

research-article
Efficiency Improvements for Encrypt-to-Self

Recent work by Pijnenburg and Poettering (ESORICS'20) explores the novel cryptographic Encrypt-to-Self primitive that is dedicated to use cases of symmetric encryption where encryptor and decryptor coincide. The primitive is envisioned to be useful ...

SESSION: Session 2: Short Papers
short-paper
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks

Data confidentiality, integrity and authentication are security properties which are often enforced with the generation of secure channels, such as Virtual Private Networks, over unreliable network infrastructures. Traditionally, the configuration of ...

SESSION: Keynote Talk
keynote
Enabling Trusted Digital Identities ? From Connected Citizens to Connected Objects

Trust is a critical component of any identity system. Several incidents in the past have demonstrated the existence of possible harm that can arise from misuse of people's personal information. Giving credible and provable reassurances to people is ...

Contributors
  • Royal Holloway, University of London
  • Ubitech Ltd.
  • Huawei Technologies Deutschland GmbH
  1. Proceedings of the 2nd Workshop on Cyber-Security Arms Race
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations