Security Research in Academia
An overview of domain roles in the security industry and the research we do in CISPA
Addison Crump | Texas A&M Cybersecurity Club | April 2025
Chapter 0:�Who I am
And why I am talking here
It’s me!
Formerly:
Currently:
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
3
A brief about me
At TAMU:
After TAMU:
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
4
But we’ll come back to that
First, let’s talk about the world
Chapter 1:�What everyone does
And our corresponding incentives, goals, and ideologies
Caveat
This is going to be biased
The government domain
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
8
Military Applications Public defense, foreign exploitation/espionage One of the biggest funding sources of academic research in the US! Advances national interests locally and abroad. | Public Service Provides general infra/governmental security Every federal agency needs security, and some agencies specifically support public security goals beyond that of law enforcement (e.g., CISA, GSA) |
The industrial domain
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
9
For-profit Making products for consumers They must maintain their own safety, but also the safety of their customers. Most of the time. | Non-profit Supporting individuals and other groups There are non-profits for all sorts. Pay a visit to your Repair Cafés, donate to EFF, and volunteer to help small businesses with their security! |
The academic domain
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
10
Research General-purpose discovery and exploration Long-term benefits often require exploration beyond what is immediately obviously useful. | Education Providing a baseline of ideals and understanding You wouldn't be here without it! Educators are a critical part of conveying what we've learned to the next generation -- especially in security. |
The hobbyist domain
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
11
Self-motivated "I just want to know how it works!" Reverse engineering is one hobbyist action, often illegal and done by individuals for the benefit of all. | Hacktivism Political activism via hacking Overlaps strongly with self-motivated, but critically different: they advocate for ideals rather than just technical advancements. Critical for early internet. |
The overlap therein
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
12
The overlap therein
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
13
The overlap therein
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
14
The overlap therein
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
15
The overlap therein
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
16
Why it matters:
Every domain has its role and affects/supports each other, ultimately for public good
Example: Industry vs. Academia
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
18
Industry Makes products -- and has financial incentives to keep them around for as long as they are useful. Can sustain one specific project long-term -- for however long it is financially viable. | Academia Writes papers and proofs-of-concept -- and has a financial incentive to do so as much as possible. Novelty, generality, and reproducibility -- many short-lived projects which discover new things. |
Focusing on Academia
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
19
Chapter 2:�What we do
What my institute does and what the group does
Example: CISPA
Not every academic institution is structured this way, but it’s a good demonstration
Scientific Structure at CISPA
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
22
Holz Group
The research group deals with various topics from the field of systems-related computer security research. This area is characterized by the fact that the security of concrete systems and the security effects of real phenomena are the main focus of our interest. Research topics of the group include, for example, software security, binary analysis, vulnerability assessment, machine learning security, privacy, and similar aspects of systems and network security.
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
23
Strong diversity of topics
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
24
Low-level Software Testing Techniques | Testing Methodology |
Strong diversity of topics
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
25
Dynamic Analysis Inference | Many papers soon to be released... :) Academic Paper Evaluation |
Strong diversity of topics
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
26
Machine Learning and Security | Online Safety |
Not all groups are alike!
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
27
Interaction with other groups is common!
Prof Andreas Zeller
Lives on my floor; common collaborator; heavy focus on SE
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
28
Chapter 3:�What I do
Coming full circle
Three primary associations
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
30
At CISPA
Outside of research:
Research topics:
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
31
Brief aside: Fuzz Testing
I focus on:
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
32
With LibAFL
My work therein: libafl_libfuzzer
About LibAFL:
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
33
With secret.club
My work therein:
About secret.club:
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
34
Academia gives me time to work on all of this
I choose academia because of the freedom it affords
Chapter 4:�What you can do
I promise this isn’t a job pitch
If you’re interested in academia
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
37
A word of warning
Academia has its tradeoffs
It’s not all sunshine and rainbows
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
39
An offer before we go
E-Mail: addison.crump@cispa.de
Signal: REDACTED
Matrix: @c01adcr:matrix.cispa.de
Website: https://addisoncrump.info
I will happily offer advice, recommendation letters, and look for available positions
All you have to do is ask :)
Please reach out!
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
40
Closing
Icons taken from https://civ6.fandom.com/ under CC BY-NC-SA. All other photos under the Unsplash license or otherwise used with permission of the licensor.
This presentation otherwise provided under CC BY-4.0. Feel free to share!
All done! Any questions?
Security Research in Academia | Texas A&M Cybersecurity Club | April 2025
41