CALL FOR PARTICIPATION ********************************************************************** 1st IEEE Workshop on Security and Privacy in Cybermatics (SPiCy 2015) Florence, Italy - September 30, 2015 http://spicy2015.di.unimi.it **********************************************************************
** Register by August 31, 2015 to enjoy the early bird rate! ** ** Special discount for combined registration (conference+workshop) ** ABOUT THE WORKSHOP In the modern age Cybermatics is differentiating itself by designing the physical and social places into the cyber space to accomplish the union of three spaces: (i) Physical Cyberworld, (ii) Social Cyberworld, and (iii) Thinking Cyberworld. In the cyber space, everywhere cyber-nodes are significantly independent from the space-time limitations that exist in the physical space. Along with the development of intelligent systems, Cybermatics has brought a wide area of open issues during the cyber interaction, physical perception, social correlation, and cognitive thinking. Currently, Cybermatics is still in its initial stage, and it is expected that Cybermatics will lead industrialization and IT applications to a new level and will significantly change the way of producing, living, and even thinking of the mankind. Cybermatics will transform how we interact with and control the physical world around us, just in the same way as the Internet transformed how we interact and communicate with one another and revolutionized how and where we access information. Cyber-physical systems are subject to threats stemming from increasing dependence on computer and communication technologies. Cyber security threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation's security, economy, public safety, and health at risk. This workshop aims to represent an opportunity for cyber security researchers, practitioners, policy makers, and users to exchange ideas, research findings, techniques and tools, raise awareness, and share experiences related to all practical and theoretical aspects of Cybermatics security issues. IEEE SPiCy 2015 will be held in Florence, Italy, on September 30, 2015 in conjunction with the IEEE Conference on Communications and Network Security (CNS 2015). The workshop will be a 1-day event, featuring one keynote talk (Wenjing Lou, Virginia Tech, USA) and SPiCy technical program (9 papers). REGISTRATION Registration information is available at: http://cns2015.ieee-cns.org/registration Early registration fees apply until August 31, 2015. Special discount for combined registration (conference + workshop). HOTEL AND VENUE Information on the workshop venue is available at: http://cns2015.ieee-cns.org/travel PROGRAM 08:45 - 08:55: Opening Remarks 08:55 - 09:55: KEYNOTE TALK Wenjing Lou Virginia Tech, USA 09:55 - 10:45: SESSION 1 (chair: Mauro Conti) - Internet-facing PLCs as a Network Backdoor (Johannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow, Volker Roth) - A Random Access Procedure Based on Tunable Puzzles) (Mats Naslund, Elena Dubrova, Göran Selander, Fredrik Lindqvist) 10:45 - 11:15: Coffee Break 11:15 - 12:55: SESSION 2 (chair: Gaetano Giunta) - Study on Impact of Adding Security in a 6LoWPAN Based Network (Matthias Carlier, Ruben Smeets, Kris Steenhaut, An Braeken, Nele Mentens, Kris Aerts) - Some Dangers from 2G Networks Legacy Support and a Possible Mitigation (Yoan Miche, Silke Holtmanns, Dare Abodunrin) - Security Enhancements for Building Saturation-free, Low-Power NoC-based MPSoCs (Kyprianos Papadimitriou, Polydoros Petrakis, Miltos Grammatikakis, Marcello Coppola) - CaT: Evaluating Cloud-aided TLS for Smartphone Energy Efficiency (Kanishka Ariyapala, Mauro Conti, Cristina M. Pinotti) 12:55 - 14:00: Lunch 14:00 - 16:00: SESSION 3 - A Novel Method for Securing Critical Infrastructures by Detecting Hidden Flows of Data (Francesco Benedetto, Gaetano Giunta, Angelo Liguori, Arno Wacker) - Verifiable and Privacy-preserving Fine-Grained Data-Collection for Smart Metering (Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran) - A Dynamic Algorithm for Palmprint Recognition (David Palma, Pier Luca Montessoro, Giulia Giordano, Franco Blanchini) - Brain-Computer Interface Applications: Security and Privacy Challenges (QianQian Li, Ding Ding, Mauro Conti) - Analysis and Monitoring of Hidden TCP Traffic Based on an Open-source Covert Timing Channel (Angelo Liguori, Francesco Benedetto, Gaetano Giunta, Arno Wacker, Nils Kopal) 16:00 - 16:30: Coffee Break MORE INFORMATION Additional information about the workshop can be found at: http://spicy2015.di.unimi.it --- Questa e-mail è stata controllata per individuare virus con Avast antivirus. https://www.avast.com/antivirus **************** Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi il codice fiscale 80012650158. http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille _______________________________________________ Om-announce mailing list [email protected] http://openmath.org/mailman/listinfo/om-announce
