Addressing vulnerabilities in system design using symbolic AI

#securitybydesign #vulnerability #reasoning #systemarchitecture #ai
Share

Vulnerability management is a critical aspect of cybersecurity. While cybersecurity is often perceived as a specialized field, existing cybersecurity bodies of knowledge provide a wealth of accessible content. Nonspecialists can draw on this material to design systems for security, provided they adopt a disciplined, integrative approach grounded in an informed understanding of cybersecurity concepts and frameworks. In this tutorial, we first offer a conceptual framework for systematically managing vulnerability management. Then, we exemplify the practical use of this framework while exercising automated reasoning based on a symbolic artificial intelligence (AI) model. We conclude by highlighting further potential of AI in vulnerability management.


Participants will be able to:

  • Understand core concepts of cybersecurity in system design context.

  • Be able to adopt a practical, systematic approach to vulnerability management.

  • Explore and learn about the potential of neurosymbolic AI for vulnerability management.


  Date and Time

  Location

  Hosts

  Registration



  • Date: 09 Jul 2025
  • Time: 11:00 PM UTC to 11:45 PM UTC
  • Add_To_Calendar_icon Add Event to Calendar
If you are not a robot, please complete the ReCAPTCHA to display virtual attendance info.
  • Contact Event Host
  • Dr. Nihad Bassis
    Chair – IEEE Computer Society Orlando Chapter
    Email: nihad@ieee.org

    Rajesh Gundeti
    Secretary – IEEE Computer Society Orlando Chapter
    Email: rajesh.gundeti@ieee.org

  • Starts 03 June 2025 04:00 AM UTC
  • Ends 09 July 2025 04:00 AM UTC
  • No Admission Charge


  Speakers

Avi Shaked, PhD

Topic:

Addressing vulnerabilities in system design using symbolic AI

Biography:

Visiting Researcher, University of Oxford / Visiting Professor, University of Toulouse II

Avi Shaked is currently a visiting researcher at the University of Oxford’s Department of Computer Science, where he was previously a Senior Research Associate leading the development of a security modeling tool for the UK government-sponsored Digital Security by Design program. He received the BSc degree in Physics and Computer Science, the MSc degree in Physics and the PhD degree in Systems Engineering from Tel Aviv University. Prior to this, Dr. Shaked held roles as a Research Associate at Cardiff University and various R&D leadership positions in industry – including Head of Systems Security Engineering Field in Israel Aerospace Industries – in which he researched diverse aspects of security. His interests include systems thinking, conceptual modelling, engineering management, decision support systems and security by design.





Agenda

Introduction: Concepts of cybersecurity in system design

Approach for vulnerability management

Framework for systematically managing vulnerabillities

Potential of Neurosymbolic AI for vulnerability management

Question and Answers