Igor Santos – S3lab http://s3lab.deusto.es S3lab Security Blog Wed, 06 May 2020 12:51:35 +0000 en-US hourly 1 https://wordpress.org/?v=5.1.5 Blockchain. ¿revolutionary technology or hype? http://s3lab.deusto.es/blockchain-revolution-or-hype/ Fri, 09 Nov 2018 13:45:32 +0000 http://s3lab.deusto.es/?p=10074 I am convinced that if  you follow the technological world, you will have heard during the last year or maybe before, about that wonderful technology known as blockchain destined according to many to revolutionize the world of cybersecurity and not

The post Blockchain. ¿revolutionary technology or hype? appeared first on S3lab.

]]>
I am convinced that if  you follow the technological world, you will have heard during the last year or maybe before, about that wonderful technology known as blockchain destined according to many to revolutionize the world of cybersecurity and not any technological company or not. But how much is true in this?

The post Blockchain. ¿revolutionary technology or hype? appeared first on S3lab.

]]>
Security Research (VIII) – Papers, Language http://s3lab.deusto.es/security-research-8/ Wed, 12 Apr 2017 08:16:38 +0000 http://s3lab.deusto.es/?p=8991 We return to one of the foundations of scientific life: writing contributions or papers. Previously, we had talked about the structure that interested us in Computer and Security of the particular system: (i) summary, (ii) introduction, (iii) [background], (iv) method,

The post Security Research (VIII) – Papers, Language appeared first on S3lab.

]]>
We return to one of the foundations of scientific life: writing contributions or papers. Previously, we had talked about the structure that interested us in Computer and Security of the particular system: (i) summary, (ii) introduction, (iii) [background], (iv) method, (v) evaluation, vi) Discussion , (Vii) related work, and (viii) conclusions. In this case we are going to give a few brushstrokes about how it should be the language used and how to make our contribution that supposes substantial, be recognized as such, in a way that also facilitates its compression and all entertaining to read.

The post Security Research (VIII) – Papers, Language appeared first on S3lab.

]]>
Security Research (VII) – The reject http://s3lab.deusto.es/security-research-7/ Sun, 12 Feb 2017 14:55:35 +0000 http://s3lab.deusto.es/?p=8851 Well yes, we have already done a job that we believe has the level (and probably it has) and we receive an email with the fateful phrase “We regret to inform you” … Accompanied by the comments of the reviewers. In some

The post Security Research (VII) – The reject appeared first on S3lab.

]]>
Well yes, we have already done a job that we believe has the level (and probably it has) and we receive an email with the fateful phrase “We regret to inform you” … Accompanied by the comments of the reviewers. In some cases they will be right, but in others not so much.

The post Security Research (VII) – The reject appeared first on S3lab.

]]>
Research in USA and in Spain http://s3lab.deusto.es/research-usa-spain/ Sun, 20 Nov 2016 17:28:06 +0000 http://s3lab.deusto.es/?p=8669 It is not a secret that in the United States of America   (usually) more and better research than in the rest of the world is done. But why? What happens in Computer Science and System Security? And what is

The post Research in USA and in Spain appeared first on S3lab.

]]>
It is not a secret that in the United States of America   (usually) more and better research than in the rest of the world is done. But why? What happens in Computer Science and System Security? And what is more important in Spain and the United States differ so that in Spain there are very few groups publishing in top-tier conferences?

The post Research in USA and in Spain appeared first on S3lab.

]]>
Security Research (VI) – Papers, Structure http://s3lab.deusto.es/security-research-6/ Sat, 15 Oct 2016 11:38:15 +0000 http://s3lab.deusto.es/?p=8551 After talking about how to choose a topic and  director, how to do the first work plan and how a scientific contribution it is done, in addition to listing four typical mistakes in this post we will discuss one of the most important aspects:

The post Security Research (VI) – Papers, Structure appeared first on S3lab.

]]>
After talking about how to choose a topic and  director, how to do the first work plan and how a scientific contribution it is done, in addition to listing four typical mistakes in this post we will discuss one of the most important aspects: how to write. The structure of a classic experimental article (usually common in our area) follows a structure called IMRAD (Introduction, Materials and Methods, Results, and Discussion). While this structure is not followed to the letter in System Security (although it is common to do so in other disciplines), the structure is similar and often contain – more flexibly – the following points:

The post Security Research (VI) – Papers, Structure appeared first on S3lab.

]]>
Security Research (V) – 4 errors, 1 failure http://s3lab.deusto.es/security-research-5/ Sun, 24 Jul 2016 15:09:13 +0000 http://s3lab.deusto.es/?p=8388 In this series of posts on how to start researching in system security, we have seen the first steps on how to choose topic, director, as well ad doing the first workplan and how  a scientific contribution is done in

The post Security Research (V) – 4 errors, 1 failure appeared first on S3lab.

]]>
In this series of posts on how to start researching in system security, we have seen the first steps on how to choose topic, director, as well ad doing the first workplan and how  a scientific contribution is done in this area. At this point, let us pause on how to move forward in our research to list common mistakes that often in these early stages, so that we can avoid them. Some of these have already been suggested in previous installments and many obvious, but it is worth remembering.

The post Security Research (V) – 4 errors, 1 failure appeared first on S3lab.

]]>