[Om-announce] International Workshop on Testing Extra-Functional Properties and Quality Characteristics of Software Systems (ITEQS)

2017-08-30 Thread Nils Muellner
ITEQS 2018 - Call for Papers

2nd International Workshop on Testing Extra-Functional Properties and Quality 
Characteristics of Software Systems (ITEQS)
Co-located with the 11th IEEE International Conference on Software Testing, 
Verification and Validation (ICST 2018), Västerås - Sweden

Website: http://www.mrtc.mdh.se/ITEQS/2018/

SCOPE
=
The rapid development towards increased integration of software with the social 
and physical world that we see today means that quality aspects such as 
performance, safety, security, and robustness become more important in an 
increasing number of the systems and devices, which we use and depend on. In 
this context, the success of a software product may not only depend on the 
logical correctness of its functions, but also on the system quality 
characteristics. Such system characteristics, which are referred to and 
captured as Extra-Functional Properties (EFPs) or Non-Functional Properties, 
are particularly important in resource constrained systems such as in the 
domains of real-time embedded and cyber-physical systems. Therefore, such 
systems need to be tested with a special attention to the EFPs. Testing EFPs is 
challenging and often requires different approaches compared to testing normal 
functionality. ITEQS provides a focused forum with the goal of bringing 
together researchers and practitioners to share ideas, identify challenges, 
propose solutions and techniques, and in general expand the state of the art in 
testing EFPs and quality characteristics of software systems and services. The 
workshop endorses contributions in a wide range of topics related to testing of 
EFPs in the form of full papers and short yet solid work-in-progress/position 
papers.

Note: The workshop does not accept papers that focus purely on functional 
testing!


TOPICS
==
- Model-based testing of EFPs; e.g., choice of modeling languages to 
capture EFPs and their role on testability, model-based test case generation, 
etc.
- Mutation-based testing for EFPs; e.g., application of mutation techniques 
for testing of EFPs particularly introduction of EFP-specific mutation operators
- Search-based testing techniques for EFPs
- Testability, observability, controllability and the role of the platform; 
e.g., how the choice of operating system can impact testability of EFPs, for 
instance, a real-time operating system, introducing testability mechanisms into 
a platform, designing - middlewares for testing of EFPs
- Empirical studies and experience reports; e.g., on the importance of 
testing EFPs, evaluation of testing methods, case-study and reports on project 
failures due to EFPs, comparison of methods and techniques
- Quality assurance, standards, and their impact on testing EFPs
- Requirements and testing EFPs; e.g., identification and generation of 
test oracles for EFPs from requirements, requirements for testability, 
traceability
- Coverage criteria in testing EFPs
- Processes and their role in testing EFPs; e.g., agile and TDD
- Fault localization for EFPs and debugging
- Formal methods, model-checking, and reasoning about EFPs
- Parallelism, Concurrency, and Testing of multicore applications
- Performance, Robustness, and Security Testing
- Testing real-time, embedded, and cyber-physical systems, and their 
challenges
- Testing quality characteristics of distributed, mobile, and cloud 
applications


SUBMISSION GUIDELINES
=
Paper format: 1) full papers 6-10 pages,  2) solid work-in-progress and 
position papers 4 pages; in IEEE double column format.
Submission site: https://easychair.org/conferences/?conf=iteqs2018
Accepted papers will be published in IEEE Digital Library.


IMPORTANT DATES
===
Submission deadline: January 12, 2018
Notifications: February 21, 2018
Workshop date: April 9, 2018 (preliminary)


ORGANIZERS
==
Mehrdad Saadatmand, RISE SICS Västerås, Sweden (mehrdad.saadatmand[at]ri.se)
Birgitta Lindström, University of Skövde, Sweden (birgitta.lindstrom[at]his.se)
Bernhard K. Aichernig, Graz University of Technology, Austria 
(aichernig[at]ist.tugraz.at)

Contact: iteqs2...@easychair.org

PROGRAM COMMITTEE
=
Antonia Bertolino, CNR (National Research Council), Italy
Brian Nielsen, Aalborg University, Denmark
Lionel Briand, University of Luxembourg, Luxembourg
Mohammad Mousavi, University of Leicester, UK
Vahid Garousi, University of Luxembourg, Luxembourg
Jeff Offutt, George Mason University, USA
Yvan Labiche, Carleton University, Canada
Vittorio Cortellessa, University of L'Aquila, Italy
Björn Lisper, Mälardalen University, Sweden
Markus Bohlin, RISE SICS Västerås, Sweden
Mika Mäntylä, University of Oulu, Finland
Hadi Hemmati, University of Calgary, Canada
Bestoun S. Ahmed, Czech Technical University in Prague, Czech Republic
James H. Hill, Indiana University-Purdue University Indianapolis, USA
Wasif Afzal, Mälardalen University, Sweden

[Om-announce] BigDat 2018: early registration September 3

2017-08-30 Thread GRLMC

BigDat 2018: early registration September 3*To be removed from our mailing 
list, please respond to this message with UNSUBSCRIBE in the subject line*

 

***

 
4th INTERNATIONAL WINTER SCHOOL ON BIG DATA

 
BigDat 2018

 
Timișoara, Romania

 
January 22-26, 2018

 

Organized by:

West University of Timișoara

Rovira i Virgili University

 

http://grammars.grlmc.com/BigDat2018/

 

***

 
SCOPE:

 

BigDat 2018 will be a research training event with a global scope aiming at 
updating participants about the most recent advances in the critical and fast 
developing area of big data, which covers a large spectrum of current exciting 
research and industrial innovation with an extraordinary potential for a huge 
impact on scientific discoveries, medicine, engineering, business models, and 
society itself. Renowned academics and industry pioneers will lecture and share 
their views with the audience.

 

Most big data subareas will be displayed, namely foundations, infrastructure, 
management, search and mining, security and privacy, and applications (to 
biological and health sciences, to business, finance and transportation, to 
online social networks, etc.). Major challenges of analytics, management and 
storage of big data will be identified through 2 keynote lectures, 25 five hour 
and fifteen minute-courses, and 1 round table, which will tackle the most 
active and promising topics. The organizers are convinced that outstanding 
speakers will attract the brightest and most motivated students. Interaction 
will be a main component of the event.

 

An open session will give participants the opportunity to present their own 
work in progress in 5 minutes. Also, there will be two special sessions with 
industrial and recruitment profiles.

 
ADDRESSED TO:

 

Master students, PhD students, postdocs, and industry practitioners will be 
typical profiles of participants. However, there are no formal pre-requisites 
for attendance in terms of academic degrees. Since there will be a variety of 
levels, specific knowledge background may be assumed for some of the courses. 
Overall, BigDat 2018 is addressed to students, researchers and practitioners 
who want to keep themselves updated about recent developments and future 
trends. All will surely find it fruitful to listen and discuss with major 
researchers, industry leaders and innovators.

 
STRUCTURE:

 

3 courses will run in parallel during the whole event. Participants will be 
able to freely choose the courses they wish to attend as well as to move from 
one to another.

 
VENUE:

 

BigDat 2018 will take place in Timișoara, which has been nominated one of the 
European Capitals of Culture in 2021. The venue will be:

 

Universitatea de Vest

Blvd. Vasile Parvân, nr. 4

300223 Timișoara

 
KEYNOTE SPEAKERS: (to be completed)

 

tba

 
PROFESSORS AND COURSES: (to be completed)

 

Paul Bliese (University of South Carolina), [introductory/intermediate] Using R 
for Mixed-effects (Multilevel) Models

 

Hendrik Blockeel (KU Leuven), [intermediate] Decision Trees for Big Data 
Analytics

 

Diego Calvanese (Free University of Bozen-Bolzano), tba

 

Nick Duffield (Texas AM University), [introductory/intermediate] Sampling 
for Big Data

 

Sašo Džeroski (Jožef Stefan Institute), [introductory/intermediate] 
Multi-target Prediction: Techniques and Applications

 

Geoffrey C. Fox (Indiana University, Bloomington), tba

 

Minos Garofalakis (Technical University of Crete), tba

 

David W. Gerbing (Portland State University), [introductory] Data Visualization 
with R

 

Xiaohua Tony Hu (Drexel University), [introductory/advanced] Big Data Analysis 
in Microbiome Study

 

Maurizio Lenzerini (Sapienza University of Rome), [intermediate/advanced] 
Semantic Technologies for Open Data Publishing

 

Bing Liu (University of Illinois, Chicago), [intermediate/advanced] Lifelong 
Learning and its Application to NLP

 

B.S. Manjunath (University of California, Santa Barbara), 
[introductory/intermediate] Working with Unstructured (Big) Data

 

Folker Meyer (Argonne National Laboratory), tba

 

Wladek Minor (University of Virginia), [introductory/advanced] Big Data in 
Biomedical Sciences

 

Raymond Ng (University of British Columbia), [introductory] Mining and 
Summarizing Text Conversations

 

Srinivasan Parthasarathy (Ohio State University), [introductory/intermediate] 
Network Science Fundamentals

 

Hanan Samet (University of Maryland, College Park), [introductory/intermediate] 
Sorting in Space: Multidimensional, Spatial, and Metric Data Structures for 
Applications in Spatial Databases, Geographic Information Systems (GIS), and 
Location-based Services

 

Kyuseok Shim (Seoul National University), [introductory/intermediate] MapReduce 
Algorithms for Big Data Analysis

 

Jaideep Srivastava (Qatar Computing Research Institute), 

[Om-announce] ESORICS 2017: Call for Participation

2017-08-30 Thread Cristina Alcaraz

==
ESORICS 2017:   CALL FOR PARTICIPATION
22nd European Symposium on Research in Computer Security
Oslo, Norway — September  11-15, 2017
==

WWW: https://www.ntnu.edu/web/esorics2017/

Overview

ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS 
2017) will be held in Oslo, Norway.



ESORICS 2017 spans a total of 3 days, featuring:
  * 3 keynote speeches
(Cormac Herley, Paul Syverson, Sandro Etalle)
  * 54 paper presentations in 3 days (Sep 11-13)
  * 8 workshops (Sept 14 - 15)


Presentations Program

The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.

Following is the list of paper presentations for the main ESORICS 
conference. For the workshop programs, please consult their 
corresponding websites:


* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org

### September 11 - Day 1 ###
09:30 - 10:30
* Keynote: Cormac Herley
  - Justifying Security Measures - a Position Paper

11:00 - 12:30

* Session 1: Security of embedded things
  - Shortfall-based Optimal Placement of Security Resources for Mobile 
IoT Scenarios

  Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
  - Analyzing the Capabilities of the CAN Attacker
  Sibylle Froeschle and Alexander Stühring
  - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT 
Sensors
  Steffen Schulz, André Schaller, Florian Kohnhäuser, and Stefan 
Katzenbeisser


* Session 2: Cryptographic Application I
  - Per-Session Security: Password-Based Cryptography Revisited
  Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
  - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime 
Generation Algorithm
  Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David 
Naccache
  - Tightly Secure Ring-LWE Based Key Encapsulation with Short 
Ciphertexts
  Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and 
Nigel Smart


14:00 - 15:30

* Session 3: Documents and Authorship
  - Identifying Multiple Authors in a Binary Program
  Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
  - Verifiable Document Redacting
  Herve Chabanne, Rodolphe Hugel and Julien Keuffer
  - Source Code Authorship Attribution using Long Short-Term Memory 
Based Networks
  Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis 
and Rachel Greenstadt


* Session 4: Analysis of Security Protocols
  - Automated analysis of equivalence properties for security protocols 
using else branches

   Ivan Gazeau and Steve Kremer and Levente Buttyán
  - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
  Cas Cremers, Martin Dehnel-Wild and Kevin Milner
  - Modular Verification of Protocol Equivalence in the Presence of 
Randomness

  Matthew Bauer, Rohit Chadha and Mahesh Viswanathan

16:00 - 17:30

* Session 5: Threat Analysis
  - Preventing Advanced Persistent Threats in Complex Control Networks
  Juan E. Rubio, Cristina Alcaraz and Javier Lopez
  - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
  Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott 
A. Deloach

  - Is my attack tree correct?
  Maxime Audinot, Sophie Pinchinat and Barbara Kordy

* Session 6: Side Channels and data leakage
  - On-Demand Time Blurring to Support Side-Channel Defense
   Weijie Liu, Debin Gao and Mike Reiter
  - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via 
Covert Hard-Drive Noise
  Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval 
Elovici

  - Practical Keystroke Timing Attacks in Sandboxed JavaScript
  Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, 
Clémentine Maurice and Stefan Mangard


### September 12 - Day 2 ###
09:00 - 10:00
* Keynote: Paul Syverson
  - The Once and Future Onion

10:30 - 12:00

* Session 7: Vulnerabilities and Malware
  - Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for 
Android

  Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor
  - VuRLE: Automatic Vulnerability Detection and Repair by Learning from 
Examples

  Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng
  - Adversarial Examples for Malware