02302nam 2200349 450 991051047150332120230830075125.010.1145/3411505(CKB)5470000000736649(NjHacI)995470000000736649(EXLCZ)99547000000073664920230830d2020 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierProceedings of the 2nd Workshop on Cyber-Security Arms Race /Liqun Chen [and three others]New York, New York :Association for Computing Machinery,2020.1 online resource (vi, 33 pages) illustrations (some color)1-4503-8091-3 It is our great pleasure to welcome you to the 2nd Workshop on Cyber-Security Arms Race (CYSARM)! This year we are thrilled to continue chairing this workshop at a prestigious venue as the ACM Conference on Computer and Communications Security (CCS). Although CYSARM is at the early phases (this year marks the second edition of this workshop), the workshop is already fostering collaboration among researchers and practitioners to discuss the various facets and tradeoffs of cyber-security. Being the first workshop of its kind, CYSARM benefits the cyber-security community by addressing novel (and often controversial) topics in cyber-security, such as tradeoffs and double-edged sword techniques. Beyond the study of cyber-security, privacy and trust as standalone components, it is also important to look at how to balance their trade-offs especially when it comes to several contradicting requirements, such as security vs privacy, security vs trust, and security vs usability. CYSARM considers all complex facets and double-edged sword aspects of the cyber-security ecosystem, in particular, how new technologies and algorithms might impact the cyber-security of existing or future models and systems.Computer securityCongressesComputer security005.8Chen Liqun720720NjHacINjHaclBOOK9910510471503321Proceedings of the 2nd Workshop on Cyber-Security Arms Race3526657UNINA