Cloud security, virtualization for security.- Mobile devices security.- Automated techniques for vulnerability discovery and analysis.- Model checking for security.- Verification techniques for security properties.- Security by design.- Web applications security.- Empirical secure software engineering.- Embedded software security.