You are on page 1of 7

PERSPECTIVES

Editor: Sean Peisert, sppeisert@lbl.gov

Perspectives on the
SolarWinds Incident

Sean Peisert | Lawrence Berkeley National Laboratory and University of California, Davis
Bruce Schneier | Harvard University
Hamed Okhravi | MIT Lincoln Laboratory
Fabio Massacci | University of Trento and Vrije Universiteit Amsterdam
Terry Benzel | USC Information Sciences Institute
Carl Landwehr | University of Michigan
Mohammad Mannan | Concordia University
Jelena Mirkovic | University of Southern California Information Sciences Institute
Atul Prakash | University of Michigan
James Bret Michael | Naval Postgraduate School

Editor’s Note
A significant cybersecurity event has recently been discovered in which malicious actors gained access to the
source code for the Orion monitoring and management software made by the company SolarWinds and inserted
malware into that source code. This article contains brief perspectives from a few members of the IEEE Security &
Privacy editorial board regarding that incident.

A serious cybersecurity event


was recently revealed: mali-
cious actors had gained access to
gain potentially arbitrary con-
trol over the systems managed by
Orion. Of course, such a level of
Numerous technical details on
this incident appear online and in
a variety of other publications as
the source code for the SolarWinds control has given attackers oppor- well as from SolarWinds itself.1
Orion monitoring and manage- tunities for further exploitation At the same time, there remains
ment software. They inserted mal- as well. a great deal to say about how we
ware into that source code so that, At the time of this writing, it is might best respond to and recover
when the software was distributed reported by SolarWinds that the from the incident as well as how we
to and deployed by SolarWinds update containing the malware was might avoid similar such events in
customers as part of an update, the installed by thousands of custom- the future.
malicious software could be used ers, including numerous U.S. fed- The news of this event broke at
to surveil customers who unknow- eral agencies and businesses around a time that made it infeasible for
ingly installed the malware and the world. The cybersecurity com- IEEE Security & Privacy to write a
pany FireEye was among the first full, detailed piece by the produc-
Digital Object Identifier 10.1109/MSEC.2021.3051235
reported to be actually compro- tion deadline for this issue. How-
Date of current version: 15 March 2021 mised by the malware. ever, due to the magnitude of the

1540-7993/21©2021IEEE Copublished by the IEEE Computer and Reliability Societies March/April 2021 7
PERSPECTIVES

incident, the Editorial Board still is owned by Thoma Bravo part- that aren’t vulnerable to cyberattack.
wanted to address it in some way ners, a private-equity firm known The government needs to set mini-
without waiting two months for for radical cost-cutting in the name mum security standards for software
the next issue. Therefore, this issue of short-term profit. Under CEO that’s used in critical network applica-
contains two pieces related to the Kevin Thompson, the company tions, just as it sets software standards
SolarWinds incident: This first underspent on security even as it for avionics.
article contains brief perspectives outsourced software development. Without these two measures,
from some members of the IEEE The New York Times reports that the it’s just too easy for companies to
Security & Privacy Editorial Board, company’s cybersecurity advisor act like SolarWinds: save money by
including numerous questions quit after his “basic recommenda- skimping on safety and security and
asked by Editorial Board members tions were ignored.” In a very real hope for the best in the long term.
and also some suggested solutions. sense, SolarWinds profited because That’s the rational thing for compa-
The second is a companion “Point– it secretly shifted a whole bunch of nies to do in an unregulated market,
Counterpoint” column article by risk to its customers: the U.S. gov- and the only way to change that is
Fabio Massacci and Trent Jaeger ernment, IT companies, and others. to change the economic incentives.
that digs specifically into the quan- This problem isn’t new, and, while
daries and questions of software it’s exacerbated by the private-equity Hamed Okhravi
patching that relate to the Solar-
Winds incident. Additional details
will undoubtedly continue to sur-
funding model, it’s not unique to
it. In general, the market doesn’t
reward safety and security—espe-
T he SolarWinds hacks are not
novel or unique. Software Tro-
jans and supply-chain attacks have
face, and IEEE Security & Privacy cially when the effects of ignor- been understood in the community
expects to cover this occurrence fur- ing those things are long term for many decades; as a case in point,
ther and in greater detail in future and diffuse. The market rewards even the logo of the IEEE Sympo-
issues as we continue to learn about short-term profits at the expense sium on Security and Privacy, one
this compromise and its effects. of safety and security. (Watch and of the top-tier venues in computer
— Sean Peisert see whether SolarWinds suffers any security, is a Trojan horse! However,
long-term effects from this hack, or the SolarWinds hack highlights some
Editorial Board Members’ whether Thoma Bravo’s bet that it of the troubling trends and impor-
Perspectives could profit by selling an insecure tant lessons that we, as a community,
product was a good one.) should pay attention to and work on
SolarWinds and Market The solution here is twofold. resolving with better technologies as
Incentives The first is to improve government well as policies.
software procurement. Software First, for decades, one of the
Bruce Schneier is now critical to national security. main paradigms in security has been

T he penetration of government
and corporate networks world-
wide is the result of inadequate
Any system of procuring that soft-
ware needs to evaluate the security
of the software and the security
“additive” security. We “add” tools,
antiviruses, intrusion detection/
prevention systems, ­m onitoring
cyberdefenses across the board. practices of the company, in detail, and management tools, and so
The lessons are many, but I want to to ensure that they are sufficient to on to make a system more secure.
focus on one important one we’ve meet the security needs of the net- Every new tool, while it might
learned: the software that’s man- work they’re being installed in. If reduce parts of the attack surface,
aging our critical networks isn’t these evaluations are made public, also adds a new attack surface: vul-
secure, and that’s because the mar- along with the list of companies nerabilities in the tool itself become
ket doesn’t reward that security. that meet them, all network buyers a new possible vector of compro-
SolarWinds is a perfect example. can benefit from them. It’s a win for mise for the system. Numerous
The company was the initial infection everybody. recent vulnerabilities discovered in
vector for much of the operation. Its But that isn’t enough; we need a security software further highlight
trusted position inside so many critical second part. The only way to force this tradeoff.2
networks made it a perfect target for companies to provide safety and secu- This is not an easy problem to
a supply-chain attack, and its shoddy rity features for customers is through resolve. While some security soft-
security practices made it an easy target. regulation. This is true whether we ware programs close many more
Why did SolarWinds have such want seatbelts in our cars, basic food holes than they open, others, by
bad security? The answer is because safety at our restaurants, pajamas that the virtue of their sheer size and
it was more profitable. The company don’t catch on fire, or home routers complexity, can make the system

8 IEEE Security & Privacy March/April 2021


more vulnerable. We, as a com- Fabio Massacci Active Directories), possibly with
munity, do not have a proper,
quantitative understanding of this
tradeoff, and, thus, decisions for
S olarWinds offers network and
database monitoring and log-
ging services. SolarWinds, like all
single sign-on (SSO) (which is a
good security practice, isn’t it? But
I will return to that) at the final
deploying or not deploying a new modern IT suppliers, grew out of user sites. If one of these system
tool are made without proper mergers and acquisitions. A sim- tools from the patchwork is com-
understanding of their implica- ple investigation on the company’s promised, the end user administra-
tions. This also highlights the need FAQ page1 shows that the “vulner- tors are likely compromised. This is
for another paradigm that requires able platform” is, in reality, a patch- indeed quite clear from the instruc-
more attention in the community: work of services: 18 (sub)products tions in the Emergency Act 21-01.4
“reductive” security, or making a are, indeed, affected by the vulner- What lessons do we learn from
system more secure by removing its abilities (from Access Management, this story?
unnecessary services, libraries, fea- to Web Performance Monitor, to
tures, and so on, thereby shrinking Log Analyzer—which was recently ■■ This is not about third-party soft-
its attack surface. acquired); another 40+ (sub)prod- ware; it is about fourth- or eighth-
Second, software supply-chain ucts are not affected. or 16th-party software. We don’t
attacks are as important—if not So, for example, Log Analyzer know what we are installing, and
more important—than hardware is affected, while Kiwi Log Ana- even the people who sell it to us
supply-chain attacks. Because of lyzer, Log & Event Manager, Log have no clear idea.
the vast complexity of modern and Event Manager Workstation ■■ All security procedures are design­
software and the comparatively Edition, and Loggly are not. The ­ed for first-party software. ( Just
low cost of introducing malicious Database Performance Analyzer think about threat analysis and
logic into the code, this threat vec- Integration Module is affected, but STRIDE, or quality gates, and so
tor can be expected to become the Database Performance Analyzer on.) We can claim that suppliers
more prominent over the next few is not—or, more precisely, “we do should stick to security proce-
years. The traditional security not believe is affected.”1 dures and so forth, but are we will-
mechanisms that are developed to You have no chance as an end ing to pay the price? If nobody is
ward off malicious “outside” code, administrator to know what you are liable for anything. . . .
such as code signing, digital certifi- getting onto your systems. Figure 1 ■■ Several security mechanisms (like
cates, secure update delivery mech- illustrates the stark reality for mod- SSO) that we conceived to be used
anisms, transport security, and so ern administrators. with first-party products (which
on, have little impact on this threat Of course, as all system-monitor­­ing are secured as first-party products)
vector, as evidenced by the Solar- tools, SolarWinds systems are properly can be damning in the new world
Winds hack. Deeper analysis tech- integrated with various mechanisms order, as you SSO into something
niques, code provenance tracking, of authentication (such as Microsoft you have no idea about.
and liability mechanisms as well
as novel technologies and refined
policies are necessary to mitigate
such attacks.
Finally, cobbling together soft-
ware code and libraries from various
and sometimes unknown sources may
be a good way of developing tools
quickly and cheaply; it is certainly
not an effective way to develop tools
securely. Large software projects
often incorporate code and libraries
from many sources3 with unknown
(a) (b)
provenance. At best, these code
pieces can be buggy or faulty, and, at Figure 1. (a) How we think the world is with good security gates and processes.
worst, they can contain malicious, (b) How the world really is. In the framework of a week, SolarWinds fetched a
implanted logic. Rapid and secure vulnerability (SUNBURST) to find out that another one was there (SUPERNOVA).
(Source: Anna Formilan for the European Union AssureMOSS project. Used
software development remains as
with permission.)
tantalizing a goal as ever.

www.computer.org/security 9
PERSPECTIVES

Terry Benzel the signing key has been compro- attacks every now and then. As of Jan-

T here has been a lot of impor-


tant technical discussion to
date, but I would also like to see
mised, even that is lost.
What if the consumer could
run checks on the signed update to
uary 26, 2021, a quick search at cve.
mitre.org on SolarWinds/McAfee/
Symantec returns hundreds of
some conversation about what the check it for vulnerabilities? This is Common Vulnerabilities and Expo-
threat is, what the motivations are the approach taken by the Securely sures (CVE) entries. SolarWinds is
for exploiting the vulnerabilities, Taking on New Executable Software making the headline now, but will
and how those fit into the larger of Uncertain Provenance (STONE- possibly be forgotten sometime
social–political landscape. Given SOUP) program at Intelligence soon (recall the RSA hack from
the extent of access gained, what is it Advanced Research Projects Activ- 2011). I would argue that security
being used for? Is it “simply” export- ity in 2009. Of course, this approach products should be a distinct soft-
ing data and information? Are the will never ensure there are no vul- ware category—perhaps be made to
accesses being used to change the nerabilities, but it could raise the bar follow some standards. Other soft-
information/platforms/integrity of substantially. Considerable technol- ware categories provide direct and
data and processes? ogy has been developed by STONE- useful functionalities. In contrast,
The wide variety of organizations SOUP and subsequent programs, security products don’t enable any
that have been attacked makes it dif- including DARPA’s Cyber Grand new functionality—designed only
ficult to attribute a single motivation. Challenge, that demonstrates the to secure other systems and applica-
How do we close all of the doors that ability to perform significant auto- tions, and as such, must not create
have been opened and understand mated analyses on both source code new security nightmares.
what was done during the long time and binaries to expose potential vul- Some suggestions along this line
that access was available? nerabilities (and, in some cases, even seem apropos:
Finally, we should note that this is to remove them). This technology is
not unique and not specific to adver- commercially available. ■■ Security products should do no
saries. This is just a highly visible Even better would be to put the harm. They should be designed
move in a grand game that has been responsibility on developers, who with failure in mind—i.e., they
ongoing for a very long time. Under- are in the best position to apply seri- must fail gracefully, without
standably, digging very deeply in this ous effort to ensuring that their reducing the security level of the
area will quickly become sensitive, updates don’t contain malware. Why protected system compared to
but I do think that we owe the read- not establish best practices for the the original state (without the
ers a bit of discussion about the big- release of updates and make those product itself). This will require
ger picture. developers who can’t show they fol- them to work with less privilege.
lowed these practices liable for the To some extent, these products
Carl Landwehr malware they distribute? If we want should be treated like medicine/

W e all accept digitally signed


software updates. Solar
Winds evidently distributed val-
to improve the resilience of our soft-
ware systems, why don’t we start by
establishing liability for companies
vaccine—the bottom line should
be to avoid any harm.
■■ The operating system (OS) itself
idly signed updates that included who distribute sabotaged updates? should take over more responsi-
malware, so customers who trusted Nation-state attackers may still pene- bilities gradually for tasks requir-
them and installed the sabotaged trate defenses, and relief from liability ing system-level access. (The OS
updates became vulnerable. Perhaps should be available to companies that is the necessary evil that we need
the first time this kind of attack was can show they followed the best prac- to keep secure anyway.)
written about was in Ken Thomp- tices. Establishing liability requires ■■ Security products need to accept
son’s Turing Award lecture “Reflec- policy action, but perhaps the severity liabilities if they downgrade the
tions Trusting Trust” in 1984. What of the Solar Winds compromise can target system’s security in any
can be done about this problem provide sufficient political will to help way—this can force them to
from a technical standpoint? One the software industry begin to assume become a security company (i.e.,
possibility might be to develop responsibility for its products. adopt the best security practices,
tools that would help consumers including in development/deploy-
of updates assess their security Mohammad Mannan ment/management phases) as
more deeply than merely check-
ing that a digital signature is valid.
The signature provides provenance
S ecurity products, like other soft-
ware applications, come with
numerous vulnerabilities and design
opposed to yet another software
company that happens to make
security products Instead of
assurance and nothing more, and if flaws, and are exploited in cyber requiring an abuse to happen to

10 IEEE Security & Privacy March/April 2021


trigger penalties, another avenue somehow. In this specific case, new Bureau of Investigation, the United
could be to incur a certain amount Internet destinations were con- States Cyber Command, and secu-
of fine for each new CVE, and tacted by compromised machines, rity firms) involved in the investiga-
after a certain threshold, the prod- and data were exfiltrated. This could tions of SolarWinds.
uct or company may lose their potentially be detected, although Cyber hygiene still seems to be a
“security” label. command and control servers were stumbling block to thwarting the suc-
hosted on public clouds (Microsoft cessful use of low-hanging exploit-
Of course, these suggestions and Amazon), which may not have able vulnerabilities. Of the 300,000
here are incomplete and need more looked suspicious. Therefore, the customers (granted, not all use the
serious consideration. However, third weak link is our reliance on Orion software or were still licensed
if no concrete measures are taken clouds and allowing organizations to do so), a relatively small number
soon, we should not be surprised with high confidentiality require- of customers actually uploaded the
when (not if) the next SolarWinds ments to communicate with pub- updates. Preventing another Solar-
like incident happens. lic clouds. Winds debacle is a technical (e.g.,
eliminating unnecessary system
Jelena Mirkovic Atul Prakash complexity to make it feasible to

I t is important to note that this was


a well-planned, well-executed
attack. For example, the changes in
T he issues surrounding the
SolarWinds incident raise
important questions. First and fore-
assess the trustworthiness of the soft-
ware/firmware updates and the orga-
nizations providing those updates)
code were done at the source code most, this is clearly a supply-chain and human problem (e.g., getting
level over months and possibly by attack. I think that a number of my the bureaucracies in organizations to
an insider.5 The changes were sub- questions are around potential priv- address supply-chain issues).
tle, using coding styles and nam- ileges, both in this incident specifi- There doesn’t seem like there
ing conventions that were already cally and in software supply chains is much we can do to solve the
in the code. From that point on, more generally. In this incident, were supply-chain problems. Software, hard-
the code was tested, signed, and the compromised SolarWinds serv- ware, and co-design are global. Lots of
released through the SolarWinds ers more overprivileged than neces- systems and apps comprise compo-
platform. After infection, the code sary to function properly? Toward nents sourced from multiple suppli-
was dormant for two weeks. After answering this, what capability did ers. Governments do not control the
that, it mimicked another known SolarWinds provide, and how is supply chain, just as they do not con-
protocol to exfiltrate credentials. it typically deployed? Why did its trol innovation or how products and
These credentials were used to compromise then lead to the com- services are used. Governments have
access Security Assertion Markup promise of internal email accounts, been somewhat ineffectual in handling
Language token authority and craft even assuming that the SolarWinds supply-chain issues. They complain
new tokens. These tokens were then server was fully compromised and a lot but don’t seem to have workable
used to access confidential data. gave root access? Does the server solutions or good leadership in the
In my opinion, there were two act as a man in the middle, or is it supply-chain arena.
weak links that the attack exploited: also installed at end servers, such SolarWinds appears to have
insiders in the companies producing as mail or authentication servers? involved one or more insiders and
software/hardware and installing If it is a man in the middle, why did external actors, making it challenging
monitoring software that precedes end-to-end authentication fail to to perform a full damage assessment
encryption (otherwise, credentials protect mail accounts? How many and nearly impossible to detect adul-
could not be stolen). The first is other such third-party services that terated software components. Like I
impossible to eliminate. The sec- could allow deeper compromise of commented before, I don’t see any-
ond—perhaps, but there will always other services are out there? thing new here in SolarWinds. It is just
be tension between the desire to that a lot of people are embarrassed
monitor everything and protecting James Bret Michael (including top cybersecurity firms),
privacy (in this case, the privacy of
credentials that were later used to
compromise the security of data).
D amage assessment will likely
take months to accomplish,
given the reach of SolarWinds
and the media is having a field day.
Why weren’t the more sophisticated
users of the software monitoring their
I think the better question is (i.e., the number of customers and, own systems more closely?
how one could detect when such through transitivity, other parties It will be interesting to see the
high-level compromises occur. Once affected) and the large number of forthcoming attempts to apply
stolen, data have to be exfiltrated organizations (e.g., the U.S. Federal artificial intelligence to detect the

www.computer.org/security 11
PERSPECTIVES

types of reconnaissance, command securityadvisory (accessed Dec. 24, Institute of Technology (MIT)
and control, and other aspects of 2020). Lincoln Laboratory, Lexington,
penetration that were employed by 2. “How to compromise the enterprise Massachusetts, 02421, USA .
SolarWinds. However, the first step endpoint.” Google Project Zero. Okharavi received a Ph.D. in elec-
should be to use a bit of common June 28, 2016. https://googlepro- trical and computer engineering
sense to think through the problem jectzero.blogspot.com/2016/06/ from the University of Illinois at
before trying to apply AI. how-to-compromise-enterprise Urbana-Champaign. He is also
SolarWinds takes advantage of -endpoint.html (accessed Jan. 8, 2021). the recipient of two R&D 100
vulnerabilities in widely used plat- 3. A. Nappa, R . Johnson, L. Bilge, Awards, MIT Lincoln Labora-
forms (.net) and protocols (e.g., J. Caballero, and T. Dumitras, tory’s Best Invention and Early
Domain Name System). Can they “The attack of the clones: A study Career Technical Achievement
be fixed? What does it take to get of the impact of shared code on vul- Awards, and NSA’s Best Scientific
them fixed or replaced? nerability patching,” in Proc. 2015 Cybersecurity Paper Award. He is
Initial findings indicate that adv­ IEEE Symp. Security Privacy, pp. a Member of IEEE. Contact him
anced tactics, techniques, and pro- 692–708. doi: 10.1109/SP.2015.48. at hamed.okhravi@ll.mit.edu.
cedures (TTPs) were employed by 4. “Emergency directive 21-01.” Cyber-
SolarWinds. The c yberdefense security and Infrastructure Secu- Fabio Massacci is a professor at
teams are always trying to catch up rity Agency, U.S. Department of the University of Trento, Trento,
with the latest TTPs and new imple- Homeland Security. Dec. 13, 2020. 38123, Italy, and Vrije Universit-
mentations of well-known TTPs https://cyber.dhs.gov/ed/21-01 eit, Amsterdam, 1081 HV, The
used by the attackers. Addressing (accessed Dec. 13, 2020). Netherlands. Massacci received a
TTPs requires better communica- 5. T. Pericin. “SunBurst: The next level Ph.D. in computing from the Uni-
tions between the offensive and of stealth.” Dec. 16, 2020. https:// versity of Rome “La Sapienza.”
defensive sides of the house. blog.reversinglabs.com/blog/ He received the IEEE Require-
Overreaction by governments to sunburst-the-next-level-of-stealth ments Engineering Conference
SolarWinds could have a profoundly (accessed Jan. 8, 2021). Ten Year Most Influential Paper
negative effect on global innovation. Award on security in sociotech-
Then again, governments are not in Sean Peisert leads computer security nical systems. He participates in
the driver’s seat here. The private sector R&D at Lawrence Berkeley Natio­ the FIRST special interest group
will continue to innovate. nal Laboratory, Berkeley, California, on the Common Vulnerability
The way forward may be to take a 94720, USA, and is an adjunct associ- Scoring System and the European
fundamentally new approach to secu- ate professor at the University of Cali- pilot CyberSec4Europe on the
rity in the near- (e.g., cloud hypervisors fornia, Davis (UC), Davis, California, governance of cybersecurity. He
pushing security rather than individual 95616, USA. He is the editor in chief coordinates the European Assure-
customers patching—or not), mid- of IEEE Security & Privacy. Peisert MOSS project. Contact him at
(e.g., zero-trust, or something like it), received a Ph.D. in computer science fabio.massacci@ieee.org.
and long-term (e.g., quantum-based from UC San Diego. He is a Senior
approaches). The other part of the Member of IEEE and the Associa- Terry Benzel is the director of net-
equation that needs to be addressed tion of Computing Machinery. Con- working and cybersecurity re­­
is motivation—getting the market to tact him at sppeisert@lbl.gov. search at the Information Sciences
include security as a requirement. Institute of the University of
Bruce Schneier is a security technolo- Southern California, Los Angeles,
Disclaimer gist, fellow, and lecturer at the Har- California, 90292, USA. Benzel
The views and conclusions contained vard Kennedy School, Cambridge, received an M.A. from Boston Uni-
herein are those of the authors and Massachusetts, 02138, USA, and versity and an executive M.B.A.
should not be interpreted as neces- the chief of security architecture from the University of California,
sarily representing the official policies of Inrupt, Inc. Boston, Massachu- Los Angeles. She is a senior mem-
or endorsements, either expressed or setts, 02210, USA. He blogs at ber of the IEEE Computer Society,
implied, of the authors’ employers. www.schneier.com. Contact him an associate editor in chief of IEEE
at schneier@schneier.com. Security & Privacy, and a member
References of the Board of Governors of the
1. “SolarWinds Security Advisory.” Solar- Hamed Okhravi is a senior staff IEEE Computer Society. Contact
Winds. https://www.solarwinds.com/ member at the Massachusetts her at tbenzel@isi.edu.

12 IEEE Security & Privacy March/April 2021


Carl Landwehr is a visiting profes- a Ph.D. in computer science in Michigan, Ann Arbor, Michigan,
sor at the University of Michigan, the area of Internet authentica- 48109, USA. Prakash received a
USA, where he received a Ph.D. tion and usable security from Ph.D. in computer science from
He is an IEEE Fellow, a mem- Carleton University. Contact him the University of California, Berke-
ber of the inaugural class of the at m.mannan@concordia.ca. ley. Contact him at aprakash@
National Cyber Security Hall of umich.edu.
Fame, and served as editor in chief Jelena Mirkovic is a project leader
of IEEE Security & Privacy for four at the Information Sciences James Bret Michael is a professor
years. He is a member of the board Institute of the University of in the Departments of Com-
of the Center for Democracy Southern California, Los Ange- puter Science and Electrical and
and Technology. Contact him at les, California, 90292, USA . Computer Engineering, Naval
celand@umich.edu. Mirkovic received a Ph.D. in Postgraduate School, Monterey,
computer science from the Uni- California, 93943, USA. Michael
Mohammad Mannan is an associ- versity of California, Los Ange- received a Ph.D. from George
ate professor at the Concordia les. Contact her at mirkovic@ Mason University. He is an asso-
Institute for Information Sys- isi.edu. ciate editor in chief of Computer
tems Engineering, Concordia Uni- and IEEE Security & Privacy.
versity, Montreal, Quebec, H3G Atul Prakash is a professor of com- Contact him at bmichael@nps
1M8, Canada. Mannan received puter science at the University of .edu.

MAY 23–26, 2021 • ONLINE

42nd IEEE Symposium


on Security and Privacy
REGISTRATION IS NOW OPEN
S&P 2021—Since 1980, the IEEE Symposium on Security
and Privacy has been the premier forum for presenting
developments in computer security and electronic AFFILIATED EVENTS
privacy, and for bringing together researchers and May 27: Conference workshops
practitioners in the field. The 2021 Symposium will mark • WMTC: Workshop on Traffic
the 42nd annual meeting of this flagship conference. Measurements for Cybersecurity
This year’s program committee has selected over 100 • ConPro: Workshop on Consumer
Protection
outstanding research papers covering a wide range of
• DLS: Deep Learning and Security
topics. Workshop
• LangSec: Workshop on Language-
Theoretic Security and Applications
For more information, visit: • SafeThings: Workshop on the
Internet of Safe Things
https://www.ieee-security.org/TC/SP2021 • SADFE: Workshop on Systemic
Approaches to Digital Forensic
Sponsored by the IEEE Computer Society
Technical Committee on Security and Engineering
Privacy in cooperation with the International • WOOT: Workshop on Offensive
Association for Cryptologic Research
Technologies

Digital Object Identifier 10.1109/MSEC.2021.3060556

www.computer.org/security 13

You might also like