Share
NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription
 ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Click here to see a web copy of this email

Add resources.email@computer.org to your address book

graphic: ComputingEdge banner

Looking Backwards (and Forwards):
NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription

graphic: 20th
Anniversary Retrospective

The U.S. National Science Foundation (NSF) celebrated the 20th anniversary of its research funding programs in cybersecurity, and more generally, secure and trustworthy computing, with a panel session at its conference held in June, 2022. This report provides a brief summary of NSF’s research programs in the area and an edited transcript of the panel discussion.

Webinar

The Journey to 800GbE and 1.6TbE
4 May at 11AM EDT

The development of electrical and optical signal at rates of 200 gigabit per second and greater will enable the next generation of 200 GbE, 400 GbE, 800 GbE, as well as the definition 1.6 TbE.  The IEEE P802.3dj Task Force will use these new electrical and optical signaling technologies to develop a slew of new electrical interfaces, and copper and optical physical layer specifications.  Join us for this webinar to receive an overview of the project, as well as a snapshot of the Task Force’s progress and the challenges it faces.

REGISTER NOW

Hunter, Your News Updates

1

Labeling “Things”
Internet of Things (IoT) devices are in our homes. Many, unbeknownst to us, intrude on our privacy. Labeling IoT products to inform consumers, offering understandable and relevant information about the “things,” is discussed.

2

Inside the Windows Security Push: A Twenty-Year Retrospective 🔐
This article is a follow-up to an article on the Windows security push in the first issue of IEEE Security and Privacy (January 2003). It provides additional detail on the security push and its results, and describes the creation and evolution of the Security Development Lifecycle that integrated software security into Microsoft's development process. The article concludes with a summary of lessons learned about effective ways of creating secure software at scale.

3

Fuzzy Hashing on Firmwares Images: A Comparative Analysis
Due to the widespread phenomenon that different IoT firmwares reuse the same code, code similarity comparison is an important technique for IoT security analysis. Fuzzy hashing generates fingerprints of files by converting them into intermediate expressions and hashing such expressions, evaluating the fingerprint similarity and thus evaluating the similarity of files that are not identical. This article analyzes and compares today’s most widely used fuzzy hashing tools, and classify them in detail.

4

BitAnalysis: A Visualization System for Bitcoin Wallet Investigation
Bitcoin is gaining ever increasing popularity. However, professional skills are required if people want to check bitcoin transaction information from the blockchain. There is a lack of tools to support effective interactive investigation of bitcoin transactions. This article presents a novel visualization system, BitAnalysis, for interactive bitcoin wallet investigation. 

5

Deep Learning for Face Anti-Spoofing: A Survey
Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in securing face recognition systems from presentation attacks (PAs). As more and more realistic PAs with novel types spring up, early-stage FAS methods based on handcrafted features become unreliable due to their limited representation capacity. This paper presents the first comprehensive review of recent advances in deep learning based FAS. 

6

Are Machine Learning Models for Malware Detection Ready for Prime Time? 🔐
This article investigates why the performance of machine learning models for malware detection observed in a lab setting often cannot be reproduced in practice.

7

Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned
Binary code similarity analysis (BCSA) is widely used for diverse security applications, including plagiarism detection, software license violation detection, and vulnerability discovery. Despite the surging research interest in BCSA, it is significantly challenging to perform new research in this field for several reasons. 

8

How do Developers Really Feel About Bug Fixing? Directions for Automatic Program Repair
Automatic program repair (APR) is a rapidly advancing field of software engineering that aims to supplement or replace manual bug fixing with an automated tool. For APR to be successfully adopted in industry, it is vital that APR tools respond to developer needs and preferences.  This article responds to this gap by reporting on a survey of 386 software developers about their bug finding and fixing practices and experiences, and their instinctive attitudes towards APR.

Computer Society Bonus Member Content

 Featured on our new Career Center

CS CORPORATE PARTNER (learn how to become a Partner)

Diamond

logo: oppo

Platinum

logo: QUANTINUUM

Platinum

logo: Alibaba Group

Bronze

logo: tableau
IEEE Computer Society Logo

© 2023 IEEE Computer Society | Contact Us | Privacy Policy

This message was intended for: hunter.thomas@paccar.com

Unsubscribe from ComputingEdge | Unsubscribe from all emails

Note to Members: Unsubscribing from all emails will also unsubscribe you from membership updates. Edit your email preferences if you would like to continue receiving membership notices.

IEEE Computer Society, 10662 Los Vaqueros Circle, Los Alamitos, California 90720-1314, United States



Email Marketing by ActiveCampaign