- Security Architecture and Design (SAD)
- Vulnerability Detection and Exploitation (VDE)
- Network Attacks and Defense (NAD)
- Zero-Knowledge Proofs (ZKPs)
- Homomorphic Encryption and Secret Sharing (HES)
- Cryptographic System Analysis and Improvement (CSI)
- Adversarial Attacks and Defenses (AAD)
- Data Privacy and Anonymization (Data Privacy and Anonymization)
- Secure Multiparty Computation (SMC)
- Security for IoT Devices (IoT Device Security Measures)
- Information Leakage in Embedded Systems (ILS)
- Blockchain Protocol Security (BPS)
- Security Verification in Distributed Systems (SVDS)
- Routing Security
- Privacy in Data Transmission (PDT)
- Data Anonymization Techniques (DAT)
- Communication Privacy Mechanisms (CPMs)
- Software Bug Finding and Fixing (Software Bug Finding and Fixing)
- Static and Dynamic Program Analysis (Static and Dynamic Program Analysis)
- Physical Attacks and Countermeasures (Physical Attacks and Countermeasures)
- Side-Channel Attacks on Physical Devices (Side-Channel Attacks on Physical Devices)