{"id":646989,"date":"2020-09-10T10:33:14","date_gmt":"2020-09-10T17:33:14","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-event&#038;p=646989"},"modified":"2025-08-06T11:52:28","modified_gmt":"2025-08-06T18:52:28","slug":"developing-secure-systems-summit","status":"publish","type":"msr-event","link":"https:\/\/www.microsoft.com\/en-us\/research\/event\/developing-secure-systems-summit\/","title":{"rendered":"Developing Secure Systems Summit &#8211; Online Seminar Series: Fall 2020"},"content":{"rendered":"\n\n<p>\n\t<a\n\t\thref=\"https:\/\/forms.office.com\/Pages\/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR62FGVB7KARFmSJalTAo7I1UMlFFNjlTQzRKTElFUUo0RkFaNkRSNlFSVS4u\"\n\t\tclass=\"button cta-link\"\n\t\tdata-bi-type=\"button\"\n\t\tdata-bi-cN=\"Register to engage\"\n\t\tdata-bi-tN=\"shortcodes\/msr-button\"\n\t\ttarget=\"_blank\" rel=\"noopener noreferrer\">\n\t\tRegister to engage\t<\/a>\n\n\t<\/p>\n<p><em>By registering for this event, you will be added to all communications in regards to logistics, agenda and speaker updates, and more. Please use this as a means to participate in any or all parts of this new seminar series starting November 18th through the fall.<\/em><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<h2>Join the ongoing conversation on the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.youtube.com\/channel\/UCwecec8CWSDpt2QExovo1tA\" target=\"_blank\" rel=\"noopener\">DS3 YouTube Channel<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>!<\/h2>\n<div>\n\t<a\n\t\thref=\"https:\/\/youtu.be\/ocm68oDhZog\"\n\t\tclass=\"button cta-link\"\n\t\tdata-bi-type=\"button\"\n\t\tdata-bi-cN=\"Watch the latest session\"\n\t\tdata-bi-tN=\"shortcodes\/msr-button\"\n\t\ttarget=\"_blank\" rel=\"noopener noreferrer\">\n\t\tWatch the latest session\t<\/a>\n\n\t<\/div>\n<p>The state of the art in developing secure computer systems is advancing rapidly, with progress in several communities around the world spanning the software industry, academia, research labs, and governments.<\/p>\n<p>The Developing Secure Systems Summit (DS3) seeks to establish a new meeting ground for researchers and practitioners across these communities. Our goal is to share progress and stimulate further work on approaches that \u201cbuild security in\u201d to existing and new computing systems.<\/p>\n<p>DS3 aims to be an inclusive event, building on several existing communities to forge its identity. On the one hand, we aim to reach out to the security research community that congregates at flagship events like <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.ieee-security.org\/TC\/SP2020\/index.html\" target=\"_blank\" rel=\"noopener\">IEEE Security and Privacy<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity20\" target=\"_blank\" rel=\"noopener\">USENIX Security Symposium<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, and the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.sigsac.org\/ccs\/CCS2020\/\" target=\"_blank\" rel=\"noopener\">ACM Conference on Computer and Communications Security<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. Equally, we seek to connect with the open source and industrial software security community that gathers around events like the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/events19.linuxfoundation.org\/events\/linux-security-summit-north-america-2019\/\" target=\"_blank\" rel=\"noopener\">Linux Security Summits<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/shmoocon.org\/\" target=\"_blank\" rel=\"noopener\">ShmooCon<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/BlueHat\" target=\"_blank\" rel=\"noopener\">BlueHat<\/a>, and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/rwc.iacr.org\/\" target=\"_blank\" rel=\"noopener\">Real World Crypto<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. Additionally, we hope to interest others whose works are underrepresented at existing venues.<\/p>\n<div class=\"video-wrapper margin-bottom-sp1\"><iframe loading=\"lazy\" title=\"Introducing the Developing Secure Systems Summit\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/ThxknFCfRlo?feature=oembed&rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/ds3summit.github.io\/\" target=\"_blank\" rel=\"noopener\"><strong>For full event details, see the DS3 event webpage ><\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<h2>Schedule<\/h2>\n<ul>\n<li><strong>Wed, Nov 18, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/galenh\/\">Galen Hunt<\/a>\u00a0(Microsoft) on Creating Secure IoT Devices<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tue, Dec 1, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.vusec.net\/people\/herbert-bos\/\" target=\"_blank\" rel=\"noopener\">Herbert Bos<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>\u00a0(VU Amsterdam) on Your Threat Model is Bad and You Should Feel Bad<\/li>\n<\/ul>\n<\/li>\n<li><strong>Wed, Dec 2, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)<br \/>\nWeb Security Panel<\/p>\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.charlesreis.com\/\" target=\"_blank\" rel=\"noopener\">Charlie Reis<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>\u00a0(Google) on Improving Chrome&#8217;s Security Architecture<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/people.mpi-sws.org\/~rossberg\/\" target=\"_blank\" rel=\"noopener\">Andreas Rossberg<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>\u00a0(Dfinity) on Security through Modularity in Web Assembly<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.doc.ic.ac.uk\/~livshits\/\" target=\"_blank\" rel=\"noopener\">Ben Livshits<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>\u00a0(Imperial College and Brave) on Browser Privacy<\/li>\n<\/ul>\n<\/li>\n<li><strong>Wed, Dec 9, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/pages.cs.wisc.edu\/~jha\/\" target=\"_blank\" rel=\"noopener\">Somesh Jha<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>\u00a0(University of Wisconsin) on Trustworthy Machine Learning<\/li>\n<\/ul>\n<\/li>\n<li><strong>Wed, Dec 16, 2020<\/strong>, 10:00 AM\u201311:30 AM (Pacific Standard Time)\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/users.umiacs.umd.edu\/~mmazurek\/\" target=\"_blank\" rel=\"noopener\">Michelle Mazurek<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>\u00a0(University of Maryland) on\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/ds3summit.github.io\/mazurek.html\" target=\"_blank\" rel=\"noopener\">Investigating Secure Development In Practice A Human-Centered Perspective<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><\/h3>\n<p>&nbsp;<\/p>\n<h3>Microsoft\u2019s Event Code of Conduct<\/h3>\n<p>Microsoft\u2019s mission is to empower every person and every organization on the planet to achieve more. This includes events Microsoft hosts and participates in, where we seek to create a respectful, friendly, and inclusive experience for all participants. As such, we do not tolerate harassing or disrespectful behavior, messages, images, or interactions by any event participant, in any form, at any aspect of the program including business and social activities, regardless of location. We do not tolerate any behavior that is degrading to any gender, race, sexual orientation or disability, or any behavior that would violate\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/compliance\/default.aspx\">Microsoft\u2019s Anti-Harassment and Anti-Discrimination Policy, Equal Employment Opportunity Policy, or Standards of Business Conduct<\/a>. In short, the entire experience at the venue must meet our culture standards. We encourage everyone to assist in creating a welcoming and safe environment. Please report any concerns, harassing behavior, or suspicious or disruptive activity to venue staff, the event host or owner, or event staff. Microsoft reserves the right to refuse admittance to or remove any person from company-sponsored events at any time in its sole discretion.<\/p>\n<div style=\"margin-top: 40px;margin-bottom: 40px\">\n\t<a\n\t\thref=\"https:\/\/app.convercent.com\/en-us\/Anonymous\/IssueIntake\/LandingPage\/65d3b907-0933-e611-8105-000d3ab03673\"\n\t\tclass=\"button cta-link\"\n\t\tdata-bi-type=\"button\"\n\t\tdata-bi-cN=\"Report a concern\"\n\t\tdata-bi-tN=\"shortcodes\/msr-button\"\n\t\ttarget=\"_blank\" rel=\"noopener noreferrer\">\n\t\tReport a concern\t<\/a>\n\n\t<\/div>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Developing Secure Systems Summit (DS3) is meant to be an inclusive event, building on several existing communities to forge its identity. On the one hand, we aim to reach out to the security research community that congregates at flagship events like IEEE Security and Privacy, the USENIX Security Symposium, and the ACM Conference on Computer and Communications Security. Equally, we seek to connect with the open source and industrial software security community that gathers around events like the Linux Security Summits, ShmooCon, BlueHat, and Real World Crypto.<\/p>\n","protected":false},"featured_media":670773,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_startdate":"2020-12-16","msr_enddate":"2020-12-16","msr_location":"Virtual\/Online","msr_expirationdate":"","msr_event_recording_link":"","msr_event_link":"","msr_event_link_redirect":false,"msr_event_time":"10 AM\u201311:30 AM PST","msr_hide_region":true,"msr_private_event":false,"msr_hide_image_in_river":0,"footnotes":""},"research-area":[13558,13547],"msr-region":[197900],"msr-event-type":[197944],"msr-video-type":[],"msr-locale":[268875],"msr-program-audience":[],"msr-post-option":[],"msr-impact-theme":[],"class_list":["post-646989","msr-event","type-msr-event","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-research-area-systems-and-networking","msr-region-north-america","msr-event-type-hosted-by-microsoft","msr-locale-en_us"],"msr_about":"<!-- wp:msr\/event-details {\"title\":\"Developing Secure Systems Summit - Online Seminar Series: Fall 2020\",\"backgroundColor\":\"grey\",\"image\":{\"id\":670773,\"url\":\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/06\/DS3_1920x720_v2.jpg\",\"alt\":\"\"},\"imageType\":\"full-bleed\"} \/-->\n\n<!-- wp:msr\/content-tabs --><!-- wp:msr\/content-tab {\"title\":\"About\"} --><!-- wp:freeform --><p>\n\t<a\n\t\thref=\"https:\/\/forms.office.com\/Pages\/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR62FGVB7KARFmSJalTAo7I1UMlFFNjlTQzRKTElFUUo0RkFaNkRSNlFSVS4u\"\n\t\tclass=\"button cta-link\"\n\t\tdata-bi-type=\"button\"\n\t\tdata-bi-cN=\"Register to engage\"\n\t\tdata-bi-tN=\"shortcodes\/msr-button\"\n\t\ttarget=\"_blank\" rel=\"noopener noreferrer\">\n\t\tRegister to engage\t<\/a>\n\n\t<\/p>\n<p><em>By registering for this event, you will be added to all communications in regards to logistics, agenda and speaker updates, and more. Please use this as a means to participate in any or all parts of this new seminar series starting November 18th through the fall.<\/em><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<h2>Join the ongoing conversation on the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.youtube.com\/channel\/UCwecec8CWSDpt2QExovo1tA\" target=\"_blank\" rel=\"noopener\">DS3 YouTube Channel<\/a>!<\/h2>\n<div>\n\t<a\n\t\thref=\"https:\/\/youtu.be\/ocm68oDhZog\"\n\t\tclass=\"button cta-link\"\n\t\tdata-bi-type=\"button\"\n\t\tdata-bi-cN=\"Watch the latest session\"\n\t\tdata-bi-tN=\"shortcodes\/msr-button\"\n\t\ttarget=\"_blank\" rel=\"noopener noreferrer\">\n\t\tWatch the latest session\t<\/a>\n\n\t<\/div>\n<p>The state of the art in developing secure computer systems is advancing rapidly, with progress in several communities around the world spanning the software industry, academia, research labs, and governments.<\/p>\n<p>The Developing Secure Systems Summit (DS3) seeks to establish a new meeting ground for researchers and practitioners across these communities. Our goal is to share progress and stimulate further work on approaches that \u201cbuild security in\u201d to existing and new computing systems.<\/p>\n<p>DS3 aims to be an inclusive event, building on several existing communities to forge its identity. On the one hand, we aim to reach out to the security research community that congregates at flagship events like <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.ieee-security.org\/TC\/SP2020\/index.html\" target=\"_blank\" rel=\"noopener\">IEEE Security and Privacy<\/a>, the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity20\" target=\"_blank\" rel=\"noopener\">USENIX Security Symposium<\/a>, and the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.sigsac.org\/ccs\/CCS2020\/\" target=\"_blank\" rel=\"noopener\">ACM Conference on Computer and Communications Security<\/a>. Equally, we seek to connect with the open source and industrial software security community that gathers around events like the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/events19.linuxfoundation.org\/events\/linux-security-summit-north-america-2019\/\" target=\"_blank\" rel=\"noopener\">Linux Security Summits<\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/shmoocon.org\/\" target=\"_blank\" rel=\"noopener\">ShmooCon<\/a>, <a href=\"https:\/\/www.microsoft.com\/BlueHat\" target=\"_blank\" rel=\"noopener\">BlueHat<\/a>, and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/rwc.iacr.org\/\" target=\"_blank\" rel=\"noopener\">Real World Crypto<\/a>. Additionally, we hope to interest others whose works are underrepresented at existing venues.<\/p>\n<div class=\"video-wrapper margin-bottom-sp1\"><iframe loading=\"lazy\" title=\"Introducing the Developing Secure Systems Summit\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/ThxknFCfRlo?feature=oembed&#038;rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/ds3summit.github.io\/\" target=\"_blank\" rel=\"noopener\"><strong>For full event details, see the DS3 event webpage &gt;<\/strong><\/a><\/p>\n<h2>Schedule<\/h2>\n<ul>\n<li><strong>Wed, Nov 18, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/galenh\/\">Galen Hunt<\/a>\u00a0(Microsoft) on Creating Secure IoT Devices<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tue, Dec 1, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.vusec.net\/people\/herbert-bos\/\" target=\"_blank\" rel=\"noopener\">Herbert Bos<\/a>\u00a0(VU Amsterdam) on Your Threat Model is Bad and You Should Feel Bad<\/li>\n<\/ul>\n<\/li>\n<li><strong>Wed, Dec 2, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)<br \/>\nWeb Security Panel<\/p>\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.charlesreis.com\/\" target=\"_blank\" rel=\"noopener\">Charlie Reis<\/a>\u00a0(Google) on Improving Chrome&#8217;s Security Architecture<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/people.mpi-sws.org\/~rossberg\/\" target=\"_blank\" rel=\"noopener\">Andreas Rossberg<\/a>\u00a0(Dfinity) on Security through Modularity in Web Assembly<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.doc.ic.ac.uk\/~livshits\/\" target=\"_blank\" rel=\"noopener\">Ben Livshits<\/a>\u00a0(Imperial College and Brave) on Browser Privacy<\/li>\n<\/ul>\n<\/li>\n<li><strong>Wed, Dec 9, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/pages.cs.wisc.edu\/~jha\/\" target=\"_blank\" rel=\"noopener\">Somesh Jha<\/a>\u00a0(University of Wisconsin) on Trustworthy Machine Learning<\/li>\n<\/ul>\n<\/li>\n<li><strong>Wed, Dec 16, 2020<\/strong>, 10:00 AM\u201311:30 AM (Pacific Standard Time)\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/users.umiacs.umd.edu\/~mmazurek\/\" target=\"_blank\" rel=\"noopener\">Michelle Mazurek<\/a>\u00a0(University of Maryland) on\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/ds3summit.github.io\/mazurek.html\" target=\"_blank\" rel=\"noopener\">Investigating Secure Development In Practice A Human-Centered Perspective<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><\/h3>\n<p>&nbsp;<\/p>\n<h3>Microsoft\u2019s Event Code of Conduct<\/h3>\n<p>Microsoft\u2019s mission is to empower every person and every organization on the planet to achieve more. This includes events Microsoft hosts and participates in, where we seek to create a respectful, friendly, and inclusive experience for all participants. As such, we do not tolerate harassing or disrespectful behavior, messages, images, or interactions by any event participant, in any form, at any aspect of the program including business and social activities, regardless of location. We do not tolerate any behavior that is degrading to any gender, race, sexual orientation or disability, or any behavior that would violate\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/compliance\/default.aspx\">Microsoft\u2019s Anti-Harassment and Anti-Discrimination Policy, Equal Employment Opportunity Policy, or Standards of Business Conduct<\/a>. In short, the entire experience at the venue must meet our culture standards. We encourage everyone to assist in creating a welcoming and safe environment. Please report any concerns, harassing behavior, or suspicious or disruptive activity to venue staff, the event host or owner, or event staff. Microsoft reserves the right to refuse admittance to or remove any person from company-sponsored events at any time in its sole discretion.<\/p>\n<div style=\"margin-top: 40px;margin-bottom: 40px\">\n\t<a\n\t\thref=\"https:\/\/app.convercent.com\/en-us\/Anonymous\/IssueIntake\/LandingPage\/65d3b907-0933-e611-8105-000d3ab03673\"\n\t\tclass=\"button cta-link\"\n\t\tdata-bi-type=\"button\"\n\t\tdata-bi-cN=\"Report a concern\"\n\t\tdata-bi-tN=\"shortcodes\/msr-button\"\n\t\ttarget=\"_blank\" rel=\"noopener noreferrer\">\n\t\tReport a concern\t<\/a>\n\n\t<\/div>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- \/wp:msr\/content-tabs -->","tab-content":[{"id":0,"name":"About","content":"<h2>Join the ongoing conversation on the <a href=\"https:\/\/www.youtube.com\/channel\/UCwecec8CWSDpt2QExovo1tA\" target=\"_blank\" rel=\"noopener\">DS3 YouTube Channel<\/a>!<\/h2>\r\n<div>[msr-button text=\"Watch the latest session\" url=\"https:\/\/youtu.be\/ocm68oDhZog\" new-window=\"true\" ]<\/div>\r\nThe state of the art in developing secure computer systems is advancing rapidly, with progress in several communities around the world spanning the software industry, academia, research labs, and governments.\r\n\r\nThe Developing Secure Systems Summit (DS3) seeks to establish a new meeting ground for researchers and practitioners across these communities. Our goal is to share progress and stimulate further work on approaches that \u201cbuild security in\u201d to existing and new computing systems.\r\n\r\nDS3 aims to be an inclusive event, building on several existing communities to forge its identity. On the one hand, we aim to reach out to the security research community that congregates at flagship events like <a href=\"https:\/\/www.ieee-security.org\/TC\/SP2020\/index.html\" target=\"_blank\" rel=\"noopener\">IEEE Security and Privacy<\/a>, the <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity20\" target=\"_blank\" rel=\"noopener\">USENIX Security Symposium<\/a>, and the <a href=\"https:\/\/www.sigsac.org\/ccs\/CCS2020\/\" target=\"_blank\" rel=\"noopener\">ACM Conference on Computer and Communications Security<\/a>. Equally, we seek to connect with the open source and industrial software security community that gathers around events like the <a href=\"https:\/\/events19.linuxfoundation.org\/events\/linux-security-summit-north-america-2019\/\" target=\"_blank\" rel=\"noopener\">Linux Security Summits<\/a>, <a href=\"https:\/\/shmoocon.org\/\" target=\"_blank\" rel=\"noopener\">ShmooCon<\/a>, <a href=\"https:\/\/www.microsoft.com\/BlueHat\" target=\"_blank\" rel=\"noopener\">BlueHat<\/a>, and <a href=\"https:\/\/rwc.iacr.org\/\" target=\"_blank\" rel=\"noopener\">Real World Crypto<\/a>. Additionally, we hope to interest others whose works are underrepresented at existing venues.\r\n\r\nhttps:\/\/youtu.be\/ThxknFCfRlo\r\n\r\n<a href=\"https:\/\/ds3summit.github.io\/\" target=\"_blank\" rel=\"noopener\"><strong>For full event details, see the DS3 event webpage &gt;<\/strong><\/a>\r\n<h2>Schedule<\/h2>\r\n<ul>\r\n \t<li><strong>Wed, Nov 18, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)\r\n<ul>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/galenh\/\">Galen Hunt<\/a>\u00a0(Microsoft) on Creating Secure IoT Devices<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong>Tue, Dec 1, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)\r\n<ul>\r\n \t<li><a href=\"https:\/\/www.vusec.net\/people\/herbert-bos\/\" target=\"_blank\" rel=\"noopener\">Herbert Bos<\/a>\u00a0(VU Amsterdam) on Your Threat Model is Bad and You Should Feel Bad<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong>Wed, Dec 2, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)\r\nWeb Security Panel\r\n<ul>\r\n \t<li><a href=\"http:\/\/www.charlesreis.com\/\" target=\"_blank\" rel=\"noopener\">Charlie Reis<\/a>\u00a0(Google) on Improving Chrome's Security Architecture<\/li>\r\n \t<li><a href=\"https:\/\/people.mpi-sws.org\/~rossberg\/\" target=\"_blank\" rel=\"noopener\">Andreas Rossberg<\/a>\u00a0(Dfinity) on Security through Modularity in Web Assembly<\/li>\r\n \t<li><a href=\"https:\/\/www.doc.ic.ac.uk\/~livshits\/\" target=\"_blank\" rel=\"noopener\">Ben Livshits<\/a>\u00a0(Imperial College and Brave) on Browser Privacy<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong>Wed, Dec 9, 2020<\/strong>, 9:00 AM\u201310:30 AM (Pacific Standard Time)\r\n<ul>\r\n \t<li><a href=\"http:\/\/pages.cs.wisc.edu\/~jha\/\" target=\"_blank\" rel=\"noopener\">Somesh Jha<\/a>\u00a0(University of Wisconsin) on Trustworthy Machine Learning<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong>Wed, Dec 16, 2020<\/strong>, 10:00 AM\u201311:30 AM (Pacific Standard Time)\r\n<ul>\r\n \t<li><a href=\"http:\/\/users.umiacs.umd.edu\/~mmazurek\/\" target=\"_blank\" rel=\"noopener\">Michelle Mazurek<\/a>\u00a0(University of Maryland) on\u00a0<a href=\"https:\/\/ds3summit.github.io\/mazurek.html\" target=\"_blank\" rel=\"noopener\">Investigating Secure Development In Practice A Human-Centered Perspective<\/a><\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h3><\/h3>\r\n&nbsp;\r\n<h3>Microsoft\u2019s Event Code of Conduct<\/h3>\r\nMicrosoft\u2019s mission is to empower every person and every organization on the planet to achieve more. This includes events Microsoft hosts and participates in, where we seek to create a respectful, friendly, and inclusive experience for all participants. As such, we do not tolerate harassing or disrespectful behavior, messages, images, or interactions by any event participant, in any form, at any aspect of the program including business and social activities, regardless of location. We do not tolerate any behavior that is degrading to any gender, race, sexual orientation or disability, or any behavior that would violate\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/compliance\/default.aspx\">Microsoft\u2019s Anti-Harassment and Anti-Discrimination Policy, Equal Employment Opportunity Policy, or Standards of Business Conduct<\/a>. In short, the entire experience at the venue must meet our culture standards. We encourage everyone to assist in creating a welcoming and safe environment. Please report any concerns, harassing behavior, or suspicious or disruptive activity to venue staff, the event host or owner, or event staff. Microsoft reserves the right to refuse admittance to or remove any person from company-sponsored events at any time in its sole discretion.\r\n<div style=\"margin-top: 40px;margin-bottom: 40px\">[msr-button text=\"Report a concern\" url=\"https:\/\/app.convercent.com\/en-us\/Anonymous\/IssueIntake\/LandingPage\/65d3b907-0933-e611-8105-000d3ab03673\" new-window=\"true\" ]<\/div>"}],"msr_startdate":"2020-12-16","msr_enddate":"2020-12-16","msr_event_time":"10 AM\u201311:30 AM PST","msr_location":"Virtual\/Online","msr_event_link":"","msr_event_recording_link":"","msr_startdate_formatted":"December 16, 2020","msr_register_text":"Watch now","msr_cta_link":"","msr_cta_text":"","msr_cta_bi_name":"","featured_image_thumbnail":"<img width=\"960\" height=\"540\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/06\/DS3_1920x720_v2-960x540.jpg\" class=\"img-object-cover\" alt=\"illustration lines at different angles with intersection points representing connected network systems\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/06\/DS3_1920x720_v2-960x540.jpg 960w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/06\/DS3_1920x720_v2-1066x600.jpg 1066w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/06\/DS3_1920x720_v2-655x368.jpg 655w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/06\/DS3_1920x720_v2-343x193.jpg 343w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/06\/DS3_1920x720_v2-640x360.jpg 640w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/06\/DS3_1920x720_v2-1280x720.jpg 1280w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>","event_excerpt":"The Developing Secure Systems Summit (DS3) is meant to be an inclusive event, building on several existing communities to forge its identity. On the one hand, we aim to reach out to the security research community that congregates at flagship events like IEEE Security and Privacy, the USENIX Security Symposium, and the ACM Conference on Computer and Communications Security. Equally, we seek to connect with the open source and industrial software security community that gathers&hellip;","msr_research_lab":[],"related-researchers":[{"type":"user_nicename","display_name":"Nikhil Swamy","user_id":33138,"people_section":"Section name 0","alias":"nswamy"}],"msr_impact_theme":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-opportunities":[],"related-publications":[],"related-videos":[706999,707008,709282,711694,713131],"related-posts":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/646989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-event"}],"version-history":[{"count":28,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/646989\/revisions"}],"predecessor-version":[{"id":1146935,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/646989\/revisions\/1146935"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/670773"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=646989"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=646989"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=646989"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=646989"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=646989"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=646989"},{"taxonomy":"msr-program-audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-program-audience?post=646989"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=646989"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=646989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}