[Om-announce] International Workshop on Testing Extra-Functional Properties and Quality Characteristics of Software Systems (ITEQS)
ITEQS 2018 - Call for Papers 2nd International Workshop on Testing Extra-Functional Properties and Quality Characteristics of Software Systems (ITEQS) Co-located with the 11th IEEE International Conference on Software Testing, Verification and Validation (ICST 2018), Västerås - Sweden Website: http://www.mrtc.mdh.se/ITEQS/2018/ SCOPE = The rapid development towards increased integration of software with the social and physical world that we see today means that quality aspects such as performance, safety, security, and robustness become more important in an increasing number of the systems and devices, which we use and depend on. In this context, the success of a software product may not only depend on the logical correctness of its functions, but also on the system quality characteristics. Such system characteristics, which are referred to and captured as Extra-Functional Properties (EFPs) or Non-Functional Properties, are particularly important in resource constrained systems such as in the domains of real-time embedded and cyber-physical systems. Therefore, such systems need to be tested with a special attention to the EFPs. Testing EFPs is challenging and often requires different approaches compared to testing normal functionality. ITEQS provides a focused forum with the goal of bringing together researchers and practitioners to share ideas, identify challenges, propose solutions and techniques, and in general expand the state of the art in testing EFPs and quality characteristics of software systems and services. The workshop endorses contributions in a wide range of topics related to testing of EFPs in the form of full papers and short yet solid work-in-progress/position papers. Note: The workshop does not accept papers that focus purely on functional testing! TOPICS == - Model-based testing of EFPs; e.g., choice of modeling languages to capture EFPs and their role on testability, model-based test case generation, etc. - Mutation-based testing for EFPs; e.g., application of mutation techniques for testing of EFPs particularly introduction of EFP-specific mutation operators - Search-based testing techniques for EFPs - Testability, observability, controllability and the role of the platform; e.g., how the choice of operating system can impact testability of EFPs, for instance, a real-time operating system, introducing testability mechanisms into a platform, designing - middlewares for testing of EFPs - Empirical studies and experience reports; e.g., on the importance of testing EFPs, evaluation of testing methods, case-study and reports on project failures due to EFPs, comparison of methods and techniques - Quality assurance, standards, and their impact on testing EFPs - Requirements and testing EFPs; e.g., identification and generation of test oracles for EFPs from requirements, requirements for testability, traceability - Coverage criteria in testing EFPs - Processes and their role in testing EFPs; e.g., agile and TDD - Fault localization for EFPs and debugging - Formal methods, model-checking, and reasoning about EFPs - Parallelism, Concurrency, and Testing of multicore applications - Performance, Robustness, and Security Testing - Testing real-time, embedded, and cyber-physical systems, and their challenges - Testing quality characteristics of distributed, mobile, and cloud applications SUBMISSION GUIDELINES = Paper format: 1) full papers 6-10 pages, 2) solid work-in-progress and position papers 4 pages; in IEEE double column format. Submission site: https://easychair.org/conferences/?conf=iteqs2018 Accepted papers will be published in IEEE Digital Library. IMPORTANT DATES === Submission deadline: January 12, 2018 Notifications: February 21, 2018 Workshop date: April 9, 2018 (preliminary) ORGANIZERS == Mehrdad Saadatmand, RISE SICS Västerås, Sweden (mehrdad.saadatmand[at]ri.se) Birgitta Lindström, University of Skövde, Sweden (birgitta.lindstrom[at]his.se) Bernhard K. Aichernig, Graz University of Technology, Austria (aichernig[at]ist.tugraz.at) Contact: iteqs2...@easychair.org PROGRAM COMMITTEE = Antonia Bertolino, CNR (National Research Council), Italy Brian Nielsen, Aalborg University, Denmark Lionel Briand, University of Luxembourg, Luxembourg Mohammad Mousavi, University of Leicester, UK Vahid Garousi, University of Luxembourg, Luxembourg Jeff Offutt, George Mason University, USA Yvan Labiche, Carleton University, Canada Vittorio Cortellessa, University of L'Aquila, Italy Björn Lisper, Mälardalen University, Sweden Markus Bohlin, RISE SICS Västerås, Sweden Mika Mäntylä, University of Oulu, Finland Hadi Hemmati, University of Calgary, Canada Bestoun S. Ahmed, Czech Technical University in Prague, Czech Republic James H. Hill, Indiana University-Purdue University Indianapolis, USA Wasif Afzal, Mälardalen University, Sweden
[Om-announce] BigDat 2018: early registration September 3
BigDat 2018: early registration September 3*To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject line* *** 4th INTERNATIONAL WINTER SCHOOL ON BIG DATA BigDat 2018 Timișoara, Romania January 22-26, 2018 Organized by: West University of Timișoara Rovira i Virgili University http://grammars.grlmc.com/BigDat2018/ *** SCOPE: BigDat 2018 will be a research training event with a global scope aiming at updating participants about the most recent advances in the critical and fast developing area of big data, which covers a large spectrum of current exciting research and industrial innovation with an extraordinary potential for a huge impact on scientific discoveries, medicine, engineering, business models, and society itself. Renowned academics and industry pioneers will lecture and share their views with the audience. Most big data subareas will be displayed, namely foundations, infrastructure, management, search and mining, security and privacy, and applications (to biological and health sciences, to business, finance and transportation, to online social networks, etc.). Major challenges of analytics, management and storage of big data will be identified through 2 keynote lectures, 25 five hour and fifteen minute-courses, and 1 round table, which will tackle the most active and promising topics. The organizers are convinced that outstanding speakers will attract the brightest and most motivated students. Interaction will be a main component of the event. An open session will give participants the opportunity to present their own work in progress in 5 minutes. Also, there will be two special sessions with industrial and recruitment profiles. ADDRESSED TO: Master students, PhD students, postdocs, and industry practitioners will be typical profiles of participants. However, there are no formal pre-requisites for attendance in terms of academic degrees. Since there will be a variety of levels, specific knowledge background may be assumed for some of the courses. Overall, BigDat 2018 is addressed to students, researchers and practitioners who want to keep themselves updated about recent developments and future trends. All will surely find it fruitful to listen and discuss with major researchers, industry leaders and innovators. STRUCTURE: 3 courses will run in parallel during the whole event. Participants will be able to freely choose the courses they wish to attend as well as to move from one to another. VENUE: BigDat 2018 will take place in Timișoara, which has been nominated one of the European Capitals of Culture in 2021. The venue will be: Universitatea de Vest Blvd. Vasile Parvân, nr. 4 300223 Timișoara KEYNOTE SPEAKERS: (to be completed) tba PROFESSORS AND COURSES: (to be completed) Paul Bliese (University of South Carolina), [introductory/intermediate] Using R for Mixed-effects (Multilevel) Models Hendrik Blockeel (KU Leuven), [intermediate] Decision Trees for Big Data Analytics Diego Calvanese (Free University of Bozen-Bolzano), tba Nick Duffield (Texas AM University), [introductory/intermediate] Sampling for Big Data Sašo Džeroski (Jožef Stefan Institute), [introductory/intermediate] Multi-target Prediction: Techniques and Applications Geoffrey C. Fox (Indiana University, Bloomington), tba Minos Garofalakis (Technical University of Crete), tba David W. Gerbing (Portland State University), [introductory] Data Visualization with R Xiaohua Tony Hu (Drexel University), [introductory/advanced] Big Data Analysis in Microbiome Study Maurizio Lenzerini (Sapienza University of Rome), [intermediate/advanced] Semantic Technologies for Open Data Publishing Bing Liu (University of Illinois, Chicago), [intermediate/advanced] Lifelong Learning and its Application to NLP B.S. Manjunath (University of California, Santa Barbara), [introductory/intermediate] Working with Unstructured (Big) Data Folker Meyer (Argonne National Laboratory), tba Wladek Minor (University of Virginia), [introductory/advanced] Big Data in Biomedical Sciences Raymond Ng (University of British Columbia), [introductory] Mining and Summarizing Text Conversations Srinivasan Parthasarathy (Ohio State University), [introductory/intermediate] Network Science Fundamentals Hanan Samet (University of Maryland, College Park), [introductory/intermediate] Sorting in Space: Multidimensional, Spatial, and Metric Data Structures for Applications in Spatial Databases, Geographic Information Systems (GIS), and Location-based Services Kyuseok Shim (Seoul National University), [introductory/intermediate] MapReduce Algorithms for Big Data Analysis Jaideep Srivastava (Qatar Computing Research Institute),
[Om-announce] ESORICS 2017: Call for Participation
== ESORICS 2017: CALL FOR PARTICIPATION 22nd European Symposium on Research in Computer Security Oslo, Norway — September 11-15, 2017 == WWW: https://www.ntnu.edu/web/esorics2017/ Overview ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. The 22nd European Symposium on Research in Computer Security (ESORICS 2017) will be held in Oslo, Norway. ESORICS 2017 spans a total of 3 days, featuring: * 3 keynote speeches (Cormac Herley, Paul Syverson, Sandro Etalle) * 54 paper presentations in 3 days (Sep 11-13) * 8 workshops (Sept 14 - 15) Presentations Program The 54 papers of ESORICS 2017 are distributed between **18 sessions** in **two parallel tracks**. Following is the list of paper presentations for the main ESORICS conference. For the workshop programs, please consult their corresponding websites: * SECPRE 2017: https://samosweb.aegean.gr/secpre2017/ * SecSE 2017: http://secse.org * CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/ * DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/ * STM 2017: http://stm2017.di.unimi.it * QASA 2017: http://www.iit.cnr.it/qasa2017/ * CyberICPS: http://www.ds.unipi.gr/cybericps2017/ * SIoT 2017: http://siot-workshop.org ### September 11 - Day 1 ### 09:30 - 10:30 * Keynote: Cormac Herley - Justifying Security Measures - a Position Paper 11:00 - 12:30 * Session 1: Security of embedded things - Shortfall-based Optimal Placement of Security Resources for Mobile IoT Scenarios Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo - Analyzing the Capabilities of the CAN Attacker Sibylle Froeschle and Alexander Stühring - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors Steffen Schulz, André Schaller, Florian Kohnhäuser, and Stefan Katzenbeisser * Session 2: Cryptographic Application I - Per-Session Security: Password-Based Cryptography Revisited Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithm Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David Naccache - Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and Nigel Smart 14:00 - 15:30 * Session 3: Documents and Authorship - Identifying Multiple Authors in a Binary Program Xiaozhu Meng, Barton Miller and Kwang-Sung Jun - Verifiable Document Redacting Herve Chabanne, Rodolphe Hugel and Julien Keuffer - Source Code Authorship Attribution using Long Short-Term Memory Based Networks Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis and Rachel Greenstadt * Session 4: Analysis of Security Protocols - Automated analysis of equivalence properties for security protocols using else branches Ivan Gazeau and Steve Kremer and Levente Buttyán - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5 Cas Cremers, Martin Dehnel-Wild and Kevin Milner - Modular Verification of Protocol Equivalence in the Presence of Randomness Matthew Bauer, Rohit Chadha and Mahesh Viswanathan 16:00 - 17:30 * Session 5: Threat Analysis - Preventing Advanced Persistent Threats in Complex Control Networks Juan E. Rubio, Cristina Alcaraz and Javier Lopez - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott A. Deloach - Is my attack tree correct? Maxime Audinot, Sophie Pinchinat and Barbara Kordy * Session 6: Side Channels and data leakage - On-Demand Time Blurring to Support Side-Channel Defense Weijie Liu, Debin Gao and Mike Reiter - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval Elovici - Practical Keystroke Timing Attacks in Sandboxed JavaScript Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice and Stefan Mangard ### September 12 - Day 2 ### 09:00 - 10:00 * Keynote: Paul Syverson - The Once and Future Onion 10:30 - 12:00 * Session 7: Vulnerabilities and Malware - Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor - VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng - Adversarial Examples for Malware