System and Software Security Research Conference

If your research is system and software security, nothing cannot be worst than counting how many different conference you should follow. Due to nature of work, you surely have to follow security, system and software engineering conference. Besides them as security research is very much practical, you also have to follow hacker conference. Sometimes for literature review, you may also have to follow 2nd tier conference (but they are not necessary). Here I list what I follow time to time:

Top-tier Security Conference

* IEEE Symposium on Security and Privacy (S&P/Oakland)
* Computer and Communications Security (CCS) 
* USENIX Security Symposium (USENIX Security)
* Network and Distributed System Security Symposium (NDSS)

Top-tier Software Engineering Conference

* International Conference on Software Engineering (ICSE)
* ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
* Programming Language Design and Implementation (PLDI)

Top-tier System Conference

* ACM Symposium on Operating Systems Principles (SOSP)
* USENIX Annual Technical Conference (USENIX ATC)
* European Conference on Computer Systems (EuroSys)
* USENIX Symposium on Operating Systems Design and Implementation (OSDI)

Hacker Conference

* BlackHat
* DefCon

2nd-tier Security Conference

* International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
* European Symposium on Research in Computer Security (ESORICS)
* IEEE European Symposium on Security and Privacy (EuroS&P)

Author: Mustakim

I am a graduate student (Ph.D.) in Computer Science at Florida State University. I am glad to be supervised by Dr. Zhi Wang. My research interest is in System and Software Security. Specifically, my research is focused on low-level code bug detection and defense mechanism through static and dynamic binary analysis with compiler support. Besides that, I am studied on heap exploitation, virtualization, and crash recovery technique. I participate in algorithmic, programming, and capture the flag contests. I also have a blog on tutorial for learning various tools mostly related to security research. I have completed my bachelor from Chittagong University of Engineering and Technology (2012) in Computer Science and Engineering and later joined in Samsung R&D Bangladesh (2012) as Android Application Developer. I have started my Ph.D. track program at Florida State University from Fall'2015 and have passed Qualification Exam (2017).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.