Best Scientific Cybersecurity Paper Competition Archives
10th Annual | 9th Annual | 8th Annual | 7th Annual | 6th Annual | 5th Annual | 4th Annual | 3rd Annual | 2nd Annual | 1st Annual
10 T H A N N U A L B E S T S C I E N T I F I C C Y B E R S E C U R I T Y P A P E R C O M P E T I T I O N
The tenth NSA Competition for Best Scientific Cybersecurity Paper recognizes the best scientific cybersecurity paper published in 2021. Papers were nominated between December 15, 2021 through April 15, 2022. The winning paper, “Verifying Hyperproperties with Temporal Logic of Actions (TLA),” authored by Leslie Lamport and Fred B. Schneider, from Microsoft Research and Cornell University respectively, answers a key question: How can you ensure that a computer algorithm is correct?An honorable mention award was given to “Defensive Technology Use by Political Activists during the Sudanese Revolution,” written by Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, and Alexandru G. Bardas, of Cornell University, George Washington University, the University of Washington, and the University of Kansas respectively.
WINNING PAPER | HONORABLE MENTIONS | REVIEW TEAM
9 T H A N N U A L B E S T S C I E N T I F I C C Y B E R S E C U R I T Y P A P E R C O M P E T I T I O N
The ninth NSA Competition for Best Scientific Cybersecurity Paper recognizes the best scientific cybersecurity paper published in 2020. Papers were nominated between December 15, 2020 through April 15, 2021. The winning paper selected out of 34 nominations was "On One-way Functions and Kolmogorov Complexity". This paper was written by Yanyi Liu from Cornell University and Rafael Pass from Cornell Tech. An honorable mention award was given to "Retrofitting Fine Grain Isolation in the Firefox Renderer” written by Shravan Narayan, Craig Disselhoen, Tal Garfinkel, Nathan Froyd, Sorin Lerner Hovav Shacham and Deian Stefan.
WINNING PAPER | HONORABLE MENTIONS | REVIEW TEAM
8 T H A N N U A L B E S T S C I E N T I F I C C Y B E R S E C U R I T Y P A P E R C O M P E T I T I O N
The eighth NSA Competition for Best Scientific Cybersecurity Paper recognizes the best scientific cybersecurity paper published in 2019. Papers were nominated between December 16, 2019 through April 15, 2020 and 52 nominations were received for 49 papers. The winning paper selected was Spectre Attacks: Exploiting Speculative Execution by Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. Originally published at the 2019 IEEE Security & Privacy Symposium, the winning paper, in combination with Meltdown, another award-winning paper released earlier by the same researchers, launched a global effort to mitigate critical vulnerabilities in processors.
WINNING PAPER | AUTHORS | AWARD CEREMONY | REVIEW TEAM
7 T H A N N U A L B E S T S C I E N T I F I C C Y B E R S E C U R I T Y P A P E R C O M P E T I T I O N
The seventh Annual NSA Competition for Best Scientific Cybersecurity Paper recognized the best scientific cybersecurity paper published in 2018. Papers were nominated between January 1, 2018 through December 31, 2018. Three papers were selected for recognition from the 34 nominations received. The winning paper is Evaluating Fuzz Testing by George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, and Michael Hicks. This paper was presented at ACM SIGSAC Conference on Computer and Communications Security (CCS '18) in Toronto. Two papers were recognized as honorable mentions: Continuous Formal Verification of Amazon s2n and Meltdown: Reading Kernel Memory from User Space.
WINNING PAPER | HONORABLE MENTIONS | AWARD CEREMONY | REVIEW TEAM
6 T H A N N U A L B E S T S C I E N T I F I C C Y B E R S E C U R I T Y P A P E R C O M P E T I T I O N
The sixth Annual NSA Competition for Best Scientific Cybersecurity Paper recognized the best scientific cybersecurity paper published in 2017. Papers were nominated between January 1, 2017 through December 31, 2017. One paper was selected for recognition from the 28 nominations received. The winning paper is How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games by Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, and David Brumley. These researchers are from Carnegie Mellon University and University of California, Santa Barbara. This paper was originally accepted at 30th IEEE Computer Security Foundations Symposium (CSF '17).
WINNING PAPER | AWARD CEREMONY | REVIEW TEAM
5 T H A N N U A L B E S T S C I E N T I F I C C Y B E R S E C U R I T Y P A P E R C O M P E T I T I O N
The fifth Annual NSA Competition for Best Scientific Cybersecurity Paper recognized the best scientific cybersecurity paper published in 2016. Papers were nominated between January 1, 2016 through December 31, 2016. One paper was selected for recognition from the 38 nominations received. The winning paper is “You Get Where You're Looking For: The Impact of Information Sources on Code Security” (Free Open Access Copy) by Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky. These researchers are at CISPA, Saarland University in Germany and at The University of Maryland, College Park in the United States. The paper was presented at the 2016 IEEE Symposium on Security and Privacy - Oakland.
WINNING PAPER | AWARD CEREMONY | REVIEW TEAM
4 T H A N N U A L B E S T S C I E N T I F I C C Y B E R S E C U R I T Y P A P E R C O M P E T I T I O N
The fourth Annual NSA Competition for Best Scientific Cybersecurity Paper recognized the best scientific cybersecurity paper published in 2015. Papers were nominated between December 1, 2015 through March 31, 2016. Three papers were selected for recognition from the 54 nominations received. The winning paper is Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration by Soo-Jin Moon, Vyas Sekar and Michael Reiter from Carnegie Mellon University and University of North Carolina. It was presented at Association for Computer Machinery (ACM) Conference on Computer and Communications Security (CCS 15). Two papers were recognized as honorable mentions: Quantum-Secure Covert Communication on Bosonic Channels and Increasing Cybersecurity Investments in Private Sector Firms.
WINNING PAPER | HONORABLE MENTIONS | AWARD CEREMONY | REVIEW TEAM
3 R D A N N U A L B E S T S C I E N T I F I C C Y B E R S E C U R I T Y P A P E R C O M P E T I T I O N
The third annual competition recognized papers published in 2014. Papers were nominated between December 1, 2014 through March 31, 2015 and 50 nominations were received. Three papers were selected for recognition, a winning paper and two papers for an honorable mention. The winning paper, "Additive and Multiplicative Notions of Leakage and Their Capacities," is a research paper presented at the 2014 IEEE Computer Security Foundations Symposium writted by Prof. Mario S. Alvim, Dr. Kostas Chatzikokolakis, Prof. Annabelle McIver, Prof. Carroll Morgan, Prof. Catuscia Palamidessi and Prof. Geoffrey Smith.The first paper receiving an honorable mention, "Increasing Security Sensitivity with Social Proof: A Large-Scale Experimental Confirmation," was written by Sauvik Das, Dr. Adam D.I. Kramer, Prof. Laura Dabbish and Prof. Jason Hong. The second paper receiving an honorable mention, "Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism," was written by Dr. Hamed Okhravi, Dr. James Riordan, and Dr. Kevin Cater. An Award Ceremony honoring the achievement of these scientists was held on November 10th, 2015 at NSA. Dr. Deborah Frincke, NSA Research Director presented them with certificates of accomplishment for their contributions to foundational cybersecurity knowledge.
WINNING PAPER | HONORABLE MENTIONS | AWARD CEREMONY | REVIEW TEAM
2 N D A N N U A L B E S T S C I E N T I F I C C Y B E R S E C U R I T Y P A P E R C O M P E T I T I O N
The second annual competition invited nominations of papers published between October 1, 2012 and December 31, 2013. The winning paper, "Memory Trace Oblivious Program Execution," was originally presented at the 2013 IEEE Computer Security Foundation by Chang Lui, Dr. Michael Hicks, and Dr. Elaine Shi. Their research centered on the development of a scientific foundation for the use of Oblivious RAM (ORAM) in programs. Of the 35 papers nominated one received honorable mention in this year's competition - "Rethinking SSL Development in an Appified World" by Sascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, and Dr. Matthew Smith from the Distributed Computing and Security Group at Leibniz University in Hannover, Germany. The authors studied the possible causes of SSL problems on "appified" platforms, and their results showed that the root cause is not simply careless developers, but also the limitations and issues of the current SSL development paradigm.
WINNING PAPER | HONORABLE MENTIONS | AWARD CEREMONY | REVIEW TEAM
1 S T A N N U A L B E S T S C I E N T I F I C C Y B E R S E C U R I T Y P A P E R C O M P E T I T I O N
The first NSA Competition for Best Scientific Cybersecurity Paper invited nominations of papers published in fiscal year 2012 (Oct. 1, 2011 - Sept. 30, 2012) that show an outstanding contribution to cybersecurity science. The winning paper was “The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords", by Joseph Bonneau. The paper offered careful and rigorous measurements of password use in practice and theoretical contributions to how to measure and model password strength and reflected many dimensions of good science. Two other papers were recognized as honorable mentions. "On Protection by Layout Randomization” by Martín Abadi and Gordon Plotkin was recognized as a significant theoretical paper. The paper “Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World” by Leyla Yumer and Tudor Dumitraş was recognized as a significant data science paper.
WINNING PAPER | HONORABLE MENTIONS | AWARD CEREMONY | REVIEW TEAM