***We apologize if you receive multiple copies of this CFP***

***************************************************************************
International workshop on Mobile Computing Security
(MCS 2015<https://sites.google.com/site/mcs2015msc>)

In conjunction with the 6th International Conference on Emerging Ubiquitous 
Systems and Pervasive Networks

(EUSPN 2015<http://euspn-15.dai-labor.de/>)

Berlin, Germany on September 27-30, 2015

Workshop Website: https://sites.google.com/site/mcs2015msc
***************************************************************************

Important Dates
===============

Submission Deadline:    July 7, 2015 (Extended)
Author Notification:         July 21, 2015
Final Manuscript:            July 26, 2015

SCOPE
=======
Technological advances in recent years have provided significant increases in 
the computing power and networking capabilities of mobile devices. For example, 
many smartphones and personal digital assistants (PDAs) currently employ 
powerful processors and have Internet broadband connectivity that rival that of 
desktop computers and laptops.  For these reasons, mobile devices are being 
used for many applications including social networking, and business 
applications like: online banking. Because these devices are ubiquitous, they 
are high-value targets for cyber criminals that seek financial gains.
Mobile devices are still suffering from many security challenges. The security 
policy offered by the mobile platforms is loose because it allows developers 
and users to install any application. As a result, we witnessed an increasing 
number of attacks and malware targeting mobile platforms like Android and iOS, 
and which caused serious issues for the user. For example, the malware can 
integrate compromised mobile devices into a botnet, it can also send SMS 
messages to premium numbers without the user’s knowledge, and hence the user’s 
bill is charged. In addition, the users are increasingly using their devices to 
handle their private information. However, the devices provide insufficient 
data security and data protection.
This workshop aims at gathering researchers and practitioners working on mobile 
computing security to share ideas and new research innovations in the field.
The topics of interest include (but are not limited to):

·        Smartphone security.

·        Vulnerability analysis for smartphones.

·        Data protection and privacy.

·        Security and privacy of operating systems, middleware, and 
applications.

·        Evaluation of mobile security solutions.

·        Mobile malware collection, statistics, and analysis;

·        Mobile malware detection.

·        Bots on mobile devices.

·        Mobile botnet detection.

·        Mobile botnet design and countermeasures.

·        Reverse engineering and automated analysis of mobile malware.

·        Traffic monitoring and detection algorithms for mobile platforms.

·        Cloud security and privacy solutions for mobile devices.

·        Mobile device forensics.

·        Mobile services and social networking security.

·        Security for smart payment applications.

·        Test beds and case studies for secure mobile platforms.

·        Formal models and architecture design for secure mobile platforms.

·        Virtualization solutions for mobile security.

·        Web browser security on mobile devices.


Publication
==========
All MCS-2015 accepted papers will be published by Elsevier Science in the 
open-access Procedia Computer Science series on-line. Procedia Computer 
Sciences is hosted on 
www.Elsevier.com<http://euspn-15.dai-labor.de/www.Elsevier.com> and on Elsevier 
content platform ScienceDirect 
(www.sciencedirect.com<http://euspn-15.dai-labor.de/www.sciencedirect.com>), 
and will be freely available worldwide. All papers in Procedia will be indexed 
by Scopus (www.scopus.com<http://euspn-15.dai-labor.de/www.scopus.com>) and by 
Thomson Reuters’ Conference Proceeding Citation Index 
http://thomsonreuters.com/conference-proceedings-citation-index/. The papers 
will contain linked references, XML versions and citable DOI numbers. You will 
be able to provide a hyperlink to all delegates and direct your conference 
website visitors to your proceedings. All accepted papers will also be indexed 
in DBLP (http://dblp.uni-trier.de/).


Submission
==========
Authors are requested to submit their papers electronically in PDF format. 
Blind submissions should be made through the Easychair system: 
https://easychair.org/conferences/?conf=mcs20150
More information about paper formatting instructions, submission and 
registration can be found at: https://sites.google.com/site/mcs2015msc



Workshop Chairs

==============
Abdelouahid Derhab, King Saud University, Saudi Arabia
Mohamed Guerroumi, USTHB University, Algeria
Kashif Saleem, CoEIA, King Saud University, Saudi Arabia



Technical Program Committee
==========================
Abdullah Bin Gani, University of Malaya, Malaysia.
Adam Bates, University of Florida, USA.
Ali Feizollah, University of Malaya, Malaysia.
Damien Octeau, Pennsylvania State University, USA.
Gang Tan, Lehigh University, USA.
Garth V. Crosby, Southern Illinois University Carbondale, USA.
Hsiang-Cheh Huang, National University of Kaohsiung, Taiwan.
Hussain Almohri, Kuwait University, Kuwait.
Jalal Al-Muhtadi, King Saud University, Saudi Arabia.
John C.S. Lui, Chinese University of Hong Kong, China.
Juan Pedro Muñoz-Gea, Universidad Politécnica de Cartagena, Spain.
Karim Elish,  Virginia Tech, USA.
Kouichi Sakurai, Kyushu University, Japan.
Lanier A. Watkins, The Johns Hopkins University Applied Physics Laboratory, USA.
Lotfi ben Othmane, Technische Universität Darmstadt, Germany.
Mauro Conti, University of Padua, Italy.
Mohamad Badra, Zayed University, The United Arab Emirat.
Muath Al-Khalaf, King Saud University, Saudi Arabia.
Reaz Ahmed, University of Waterloo, Canada.
Pedro Peris-Lopez, Universidad Carlos III de Madrid, Spain.
Qiang Tang, University of Luxembourg, Luxembourg.
Shouhuai Xu, University of Texas at San Antonio, USA.
Wissam Mallouli, Montimage, France.
Yajin Zhou, North Carolina State University, USA.
Yao Guo, Peking University, China.
Youssef Iraqi, Khalifa University of Science, Technology, and Research, The 
United Arab Emirates.

________________________________

Disclaimer:
This communication is intended for the above named person and is confidential 
and / or legally privileged. Any opinion(s) expressed in this communication are 
not necessarily those of KSU (King Saud University). If it has come to you in 
error you must take no action based upon it, nor must you print it, copy it, 
forward it, or show it to anyone. Please delete and destroy the e-mail and any 
attachments and inform the sender immediately. Thank you.
KSU is not responsible for the political, religious, racial or partisan opinion 
in any correspondence conducted by its domain users. Therefore, any such 
opinion expressed, whether explicitly or implicitly, in any said correspondence 
is not to be interpreted as that of KSU.
KSU may monitor all incoming and outgoing e-mails in line with KSU business 
practice. Although KSU has taken steps to ensure that e-mails and attachments 
are free from any virus, we advise that, in keeping with best business 
practice, the recipient must ensure they are actually virus free.
_______________________________________________
Om-announce mailing list
[email protected]
http://openmath.org/mailman/listinfo/om-announce

Reply via email to