Avatar
👾

Organizations

README.md

The LOCS team investigates different aspects of organizational cyber security. Our approach is multi-pronged: we look at technology and tools (e.g., performance of program analysis tools, explainable AI methods, automation of security technology) and processes and people (for example, how secure software engineering programs are organized in organizations and how to improve them, how attack trees are actually used in industry and how to facilitate practical adoption of academic theories of attack trees, how to select the most cost-effective countermeasures). In this way we are able to identify relevant security issues and propose solutions that will actually work in practice.

Latest posts

  1. We have a vacancy for an Assistant Professor in Cybersecurity.
    We welcome expertise in areas such as software security, network security, security measurement, AI security, usable security, or systems security.

    Click here for more details and to apply by September 30, 2025.

  2. On Sept 18, Jafar will present our recent research Eradicating the Unseen at LeidenDevs.
    Click here to register.

  3. A limited technical background is sufficient for attack-defense tree acceptability

    Researchers from LOCS presented at USENIX

  4. Researchers have come up with a fix for a path traversal bug first spotted in 2010

  5. An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure Outcomes.
    LOCS researchers explored the issue of secret leaks in files exposed through misconfigured cloud storage, presented at the IEEE Symposium on Security and Privacy

    Post activity