Communities
The National Security Agency Research Directorate sponsors the Science of Security Initiative to promote foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefense. The SoS initiative works in several ways. 1. Engage the academic community for foundational research, 2. Promote rigorous scientific principles, and 3. grow the SoS community. The SoS Virtual Organization is the SoS’s initiative online home.
  • AFOSR Basic Research Initiative

    Background: Cyberspace operations (CO) rely heavily on the degree to which users trust, or are suspicious, of their information technology systems.  Computer network defense service providers hope that users will remain cognizant of threats, such as…

  • SoS Archives

    The SoS Lablet Working Group was created for the purpose of planning and coordinating research and other activities in support of NSA Science of Security initiative.Science of Security Virtual Organization ChecklistLead PI or Content ManagerHome Page of…

  • Protocol Verification Group

    The Protocol eXchange Workshops2016April 13- 14, 2016 (National Cryptologic Museum)2015June 22 - 23, 2015 (National Cryptologic Museum)2014September 23 - 24, 2014 (National Cryptologic Museum)January 9, 2014  (National Cryptologic Museum)…

  • Adoption of Cybersecurity Technology Working Group

    Welcome to the Adoption of Cybersecurity Technology Workshop Working Group.  The purpose of this group is to provide a centralized repository for meeting minutes, supporting documents, draft agendas, and other material needed to help in the…

  • SoS Lablet Reports

    AnnouncementsQuarterly reports are due to the NSA on the 10th of the month following the close of the quarter. Annual reports are due 30 days after the close of the year.2017 Due DatesJanuary 10thApril 10thMay 15th (annual report covering April 2016…

  • Adoption of Cybersecurity Technology

    This is an invitation only event. About the ACT 2016 Workshop The Adoption of Cybersecurity Technology Workshop is sponsored by the Special Cyber Operations Research and Engineering (SCORE) Subcommittee.  SCORE increases awareness and insight,…

  • Device Integrity - 2015

    Welcome to the Device Integrity Use Case Working Group.  The purpose of this group is to provide a centralized repository for meeting minutes, supporting documents, and other material needed to help in the organization of your implementation plans.…

  • Science of Security VO

    Virtually every computing system today is at risk from some form of cyber attack. The problem continues to grow in scope, in part because there does not exist today a foundational science of security. While the community is certainly making improvements…

  • Damage Containment - 2015

    Welcome to the Damage Containment Use Case Working Group.  The purpose of this group is to provide a centralized repository for meeting minutes, supporting documents, and other material needed to help in the organization of your implementation plans…

  • Defense of Accounts - 2015

    Welcome to the Defense of Accounts Use Case Working Group.  The purpose of this group is to provide a centralized repository for meeting minutes, supporting documents, and other material needed to help in the organization of your implementation…

  • Secure and Available Transport - 2015

    Welcome to the Secure and Available Transport Use Case Working Group.  The purpose of this group is to provide a centralized repository for meeting minutes, supporting documents, and other material needed to help in the organization of your…

  • Principles and Practice of Privacy Science (3PS) Program Committee

    Working Agendas3PS Planning Workshop (Jun'15) Strawman Agenda3PS Strawman Agendas - 041020153PS-related Strawman Agendas - 050120153PS-related Strawman Agendas - 051120153PS-related Strawman Agendas - 052920153PS-related Strawman Agendas -…