[Om-announce] [CFP]: 2nd Joint Workshop on CPS Security and Privacy (CPSIoTSec 2021)
--- C a l l F o r P a p e r s 2nd Joint Workshop on CPS Security and Privacy (CPSIoTSec 2021) Seoul, South Korea, November 15 (Monday), 2021 URL: https://cpsiotsec.github.io co-located with the ACM Conference on Computer and Communications Security (ACM CCS 2021) --- === CONFERENCE OUTLINE: === The Joint Workshop on CPS Security and Privacy invites academia, industry, and governmental entities to submit: - Original research papers on the security and privacy of CPS - Systematization of Knowledge (SoK) papers on the security and privacy of CPS - Demos (hands-on or videos) of testbeds/experiences of CPS security and privacy research We seek submissions from multiple interdisciplinary backgrounds tackling security and privacy issues in CPS, including but not limited to: - Mathematical foundations for secure CPS/IoT - Control-theoretic approaches - High assurance security architectures - Security and resilience metrics - Metrics and risk assessment approaches - Identity and access management - Privacy and trust - Network security - Game theory applied to CPS/IoT security - Human factors, humans in the loop, and usable security - Understanding dependencies among security, reliability and safety in CPS/IoT - Economics of security and privacy - Intrusion and anomaly detection - Model-based security systems engineering - Sensor and actuator attacks - CPS/IoT malware analysis - CPS/IoT firmware analysis - Hardware-assisted CPS/IoT security Also of interest will be papers that can point the research community to new research directions, and those that can set research agendas and priorities in CPS/IoT security and privacy. There will be a best paper award. = PAPER SUBMISSION: = Submissions include long papers (12 pages), short papers (6 pages), and abstracts (1 page): - Long papers include a) Original research on a CPS/IoT security and privacy topic, b) Systematization of Knowledge of CPS/IoT security and privacy; - Short papers include original work-in-progress research on a CPS/IoT security and privacy topic; and - 1-page abstracts include demos/interesting findings/insights on CPS/IoT security and privacy, which will be accompanied by a hands-on demo during the workshop. Submitted papers must include appendices and references (except for SoK papers where references are excluded). Submissions must use the ACM SIG Proceedings Templates (see https://www.acm.org/publications/proceedings-template, with a simpler version here: https://github.com/acmccs/format). Only PDF files will be accepted. Accepted papers will be published by the ACM Press and/or the ACM Digital Library. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Each accepted paper must be presented by a registered author. Submissions not meeting these guidelines risk immediate rejection. For questions about these policies, please contact the chairs. NEW FOR 2021: The workshop will feature a second paper submission deadline for papers that have been submitted but not accepted to the main conference. The deadline will be 10 days after the paper notification is out. Authors are not required to upload CCS reviews; verification of CCS submission status will be done by informing the program chairs of the paper ID of the CCS submission. Paper submission site: https://easychair.org/conferences/?conf=cpsiotsec2021 IMPORTANT DATES: - Submission deadline: June 25, 2021 (23:59 Anywhere on Earth). - Submission deadline applicable only to papers rejected from ACM CCS 2021: July 30, 2021 (23:59 Anywhere on Earth). - Notification of acceptance/rejection (tentative): August 13, 2021. - Deadline for submission of camera-ready papers (hard deadline): September 6, 2021 = Program Committee Chairs: = - Cristina Alcaraz, University of Malaga, Spain – Michail Maniatakos, New York University Abu Dhabi, UAE == Program Committee: == - Magnus Almgren, Chalmers University, Sweden – Rakesh Bobba, Oregon State University, USA - Gedare Bloom, University of Colorado Colorado Springs, USA – Alvaro Cardenas, UC Santa Cruz, USA – Mauro Conti, University of Padua, Italy – Yongkai Fan, China University of Petroleum, China – Vasileios Gkioulos, Norwegian University of Science and Technology, Norway – Dawu Gu, Shanghai Jiao Tong University, China – Le Guan, University of Georgia, USA – Gerhard Hancke, City University of Hong Kong – Monowar Hasan, Wichita State University, USA – Sokratis Katsikas, Open University
[Om-announce] [CFW - *** deadline approaching *** ]: CALL FOR WORKSHOPS IEEE ATC 2021 - 18th IEEE International Conference on Advanced and Trusted Computing
== CALL FOR WORKSHOPS IEEE ATC 2021 18th IEEE International Conference on Advanced and Trusted Computing Atlanta, USA October 18-21, 2021 Website: http://www.ieeesmartworld.org == OVERVIEW: Advances in technologies and our society will also result in an integration of our real, cyber, and virtual worlds to form smart, and cyber-physical socially aware and integrated hyper worlds. Underpinning such worlds are advanced computing (AC) infrastructure and trusted computing (TC) applications and services. For example, a robust and resilient AC infrastructure can support TC applications and services, in order to provide secure and/or privacy-preserving communications, as well as ensuring computing and communication systems and services are available, predictable, accountable, controllable, assessable, sustainable, dependable, persistent, and secure. Proposals are solicited for Workshops to be held in conjunction with IEEE ATC 2021. A Workshop should aim at providing a forum on emerging topics of high interest to the security and privacy community working on advanced and trusted technologies. IMPORTANT DATES: * Workshop proposals due: March 30, 2021 * Notification of decision: April 15, 2021 == WORKSHOP CHAIRS AND SUBMISSION: - Cristina Alcaraz, University of Malaga, Spain - Reza M. Parizi, Kennesaw State University, USA - Tianqing Zhu, University of Technology Sydney, Australia Submission via email to: ieeeatc2021.worksh...@gmail.com For further details, visit http://www.ieeesmartworld.org/atc/ ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [Deadline Approaching] CFP: 6th ACM Cyber-Physical System Security Workshop (ACM CPSS'20)
*** Apologies for multiple copies *** C a l l F o r P a p e r s 6th ACM Cyber-Physical System Security Workshop (ACM CPSS 2020) in conjunction with ACM AsiaCCS'20 Taipei, Taiwan -- June 1st, 2020 https://www.nics.uma.es/pub/CPSS2020/ Overview - Cyber-Physical Systems (CPS) of interest to this workshop consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There exist a multitude of CPS devices and applications deployed to serve critical functions in our lives thus making security an important non-functional attribute of such systems. This workshop will provide a platform for professionals from academia, government, and industry to discuss novel ways to address the ever-present security challenges facing CPS. We seek submissions describing theoretical and practical solutions to security challenges in CPS. Submissions pertinent to the security of embedded systems, IoT, SCADA, smart grid, and other critical infrastructure are welcome. Topics of interest include, but are not limited to: * Attack detection for CPS * Authentication and access control for CPS * Availability of and auditing for CPS * Blockchain for CPS security * Data security and privacy for CPS * Digital twins for CPS * Embedded systems security * Formal methods in CPS * Industrial control systems security * IoT security * Lightweight crypto * Recovery of CPS from cyber attacks * Security risk assessment for CPS * Security architectures for CPS * Security by design for CPS * Security of autonomous vehicles and vessels * Security of legacy CPS * Smart grid security * Threat modeling for CPS * Security of transportation systems * Vulnerability analysis for CPS Important Dates * Paper submission deadline: February 10, 2020 * Notification to authors: March 5, 2020 * Camera ready due: March 15, 2020 Paper Submission Guidelines Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized. Submissions must be in double-column ACM SIG Proceedings format, and should not exceed 12 pages. Position papers describing work in progress are also welcome. Only pdf files will be accepted. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each paper must be registered at the appropriate conference rate. Accepted papers will be published in the ACM Digital Library. A best paper award will be presented getting opportunities for a registration fee discount. Paper submission site: https://easychair.org/conferences/?conf=cpss20 Organisation Committee --- Steering Committee: * Dieter Gollmann (Hamburg University of Technology, Germany) * Ravishankar Iyer (UIUC, USA) * Douglas Jones (UIUC, USA) * Javier Lopez (University of Malaga, Spain) * Jianying Zhou (SUTD, Singapore) – Chair Program Committee Chairs: * Sokratis Katsikas (Open University of Cyprus, Cyprus; and Norwegian University of Science and Technology - NTNU, Norway) * Cristina Alcaraz (University of Malaga, Spain) Program Committee: - Chuadhry Mujeeb Ahmed (SUTD, Singapore) - Alvaro Cardenas (UC Santa Cruz, USA) - Mauro Conti (University of Padua, Italy) - Afonso Ferreira (CNRS, France) - Yanick Fratantonio (EURECOM, France) - Joaquin Garcia-Alfaro (Telecom SudParis, France) - Vasileios Gkioulos (NTNU, Norway) - Eunsuk Kang (Carnegie Mellon University, USA) - Huy Kang Kim (Korea University, Korea) - Kandasamy Nandha Kumar (SUTD, Singapore) - Qi Li (Tsinghua University, China) - Hoon Wei Lim (SingTel, Singapore) - Javier Lopez (University of Malaga, Spain) - Bo Luo (University of Kansas, USA) - Emil Lupu (Imperial College, UK) - Michail Maniatakos (NYU-Abu Dhabi, UAE) - Daisuke Mashima (ADSC, Singapore) - Weizhi Meng (DTU, Denmark) - Simin Nadjm-Tehrani (Linköping University, Sweden) - Martín Ochoa (Universidad del Rosario, Colombia) - Günther Pernul (Universität Regensburg, Germany) - Indraskhi Ray (Colorado State University, USA) - Rodrigo Roman (University of Malaga, Spain) - Justin Ruths (UT Dallas, USA) - Savio Sciancalepore (HBKU-CSE, Qatar) - Martin Strohmeier (University of Oxford, UK) - Qiang Tang (LIST, Luxembourg) - Nils Ole Tippenhauer (CISPA, Germany) - Zheng Yang (SUTD, Singapore) - Jianying Zhou (SUTD, Singapore) - Sencun Zhu (Pennsylvania State University, USA) - Saman Zonouz (Rutgers University, USA) Publicity Chair: * Pankaj Pandey (Norwegian University of Science and Technology - NTNU, Norway) Publication Chair: * Stefanos Gritzalis (University of Piraeus, Greece) Contact --- Email: cps...@easychair.org CPSS
[Om-announce] [Deadline approaching] CFP: IEEE Internet of Things Journal Special Issue on "Secure Embedded IoT Devices for Resilient Critical Infrastructures"
=== C a l l F o r P a p e r s IEEE INTERNET OF THINGS JOURNAL Special Issue: Secure Embedded IoT Devices for Resilient Critical Infrastructures URL: http://ieee-iotj.org/wp-content/uploads/2018/07/CFP-SI-Secure-Embedded-IoT-Devices-for-Resilient-CIs.pdf === The Internet of Things (IoT) opens the door to new technological opportunities for a wide range of applications that cover e-health, smart homes and automation, e-commerce, location-based services, smart vehicles, fleet management and remote system monitoring. However, at the same time as these technological opportunities grow so does the threat surface for potential adversaries targeting at various, interconnected ICT systems and consequently at ICT-dependent critical systems, such as SCADA (Supervisory Control and Data Acquisition Systems) systems. At this point, attackers could take advantage from the incorporation of the paradigm to exploit new security gaps, probably caused by unforeseen interoperability and adaptability problems. Indeed, the deployment of Internet-enabled embedded devices that are distributed over major critical domains, may create indirect and non-obvious inter-connections with the underlying Critical Infrastructures (CIs). Examples of such inter-connected systems may include traffic monitoring and control systems communicating with smart vehicles, energy related systems communicating with smart homes and smart meters, monitoring systems connected with autonomous sensors in nuclear plants, power grids and body area networks. There is a need to further explore the security issues related to IoT technologies to assure the resilience of CIs against advanced IoT-based attacks. The goal of this special issue is therefore to address the diverse security challenges and related to IoT-enabled CIs (IoT-CIs) and their resilience to advanced threats. Suggested topics include, but are not limited to, the following: * Security analysis and requirements in the coupling of IoT-CIs * Vulnerabilities, threat models and risk management in IoT-CIs * Reference architectures for the secure coupling of IoT in CI scenarios * Embedded security for mobile devices and BYOD * Network-layer attacks and defense mechanisms between IoT devices and CIs * Key management and access control in IoT-CIs * Resilience models for advanced threats in IoT-CIs * Advanced and lightweight awareness models for large IoT-CIs * Privacy and location privacy for IoT-CIs Important Dates * Submissions Deadline: October 1, 2018 * First Reviews Due: December 15, 2018 * Revision Due: January 15, 2019 * Second Reviews Due/Notification: Feb. 15, 2019 * Final Manuscript Due: March 15, 2019 * Publication Date: 2019 Paper Submission Guidelines All original manuscripts or revisions to the IEEE IoT Journal must be submitted electronically through IEEE Manuscript Central, http://mc.manuscriptcentral.com/iot. Solicited original submissions must not be currently under consideration for publication in other venues. Author guidelines and submission information can be found at http://iot.ieee.org/journal. Requests for additional information should be addressed to the guest editors. -- Guest Editors -- * Cristina Alcaraz, University of Malaga, Spain alca...@lcc.uma.es * Mike Burmester, Florida State University, USA burmes...@cs.fsu.edu * Jorge Cuellar, Siemens, Germany, jorge.cuel...@siemens.com * Xinyi Huang, Fujian Normal University, China, xyhuan...@gmail.com * Panayiotis Kotzanikolaou, University of Piraeus, Greece, pkotz...@unipi.gr * Mihalis Psarakis, University of Piraeus, Greece, mpsa...@unipi.gr ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [CFP]: 13th International Conference on Critical Information Infrastructures Security CRITIS 2018
-- *** Apologies for multiple copies *** C a l l F o r P a p e r s 13th International Conference on Critical Information Infrastructures Security CRITIS 2018 Kaunas, Lithuania, September 24-26, 2018 Full-text paper submission due: April 30, 2018 CONFERENCE OUTLINE: CRITIS 2018 continues the tradition of presenting innovative research and exploring new challenges in the field of critical (information) infrastructures protection (C(I)IP), resilience and fostering the dialogue with stakeholders. CRITIS 2018 aims at bringing together researchers, professionals from academia, critical (information) infrastructure operators, industry, defence sector and governmental organisations working in the field of the security of critical (information) infrastructure systems. Moreover, CRITIS aims to encourage and inspire early stage and open-minded researchers in this demanding multi-disciplinary field of research. Outstanding research performance demonstrated by young researchers may compete for the Young CRITIS Award (YCA). The Projects' Dissemination Session will be an opportunity of dissemination for ongoing European, multinational, and national projects, to share the experiences among scientist and experts working on different projects in the C(I)IP domain. CRITIS 2018 conference has a special focus on current and future energy infrastructures within a special session Energy infrastructure operators and stakeholders: key challenges and solution directions, chaired by Marcelo Masera (EC Joint Research Centre in Petten, The Netherlands). Invited speakers will be mainly from European electricity and/or gas Transmission System Operators (TSO), some representatives from European electricity and gas Distributed System Operators (DSO), NATO and European policy-makers. CRITIS 2018 topics (but not limited to): http://www.lei.lt/critis2018/call-for-papers.html Special sessions will be organized by CRITIS 2018 Supporting Chairs: - “Energy CIP”: Marcelo Masera, European Commission, Joint Research Centre, the Netherlands - “CI Resilience”: Marianthi Theocharidou, European Commission, Joint Research Centre, Italy - “Human Factor and CIP”: Grigore Havarneanu, UIC, France - “SCADA Security”: Simin Nadjm-Tehrani, Linköping University, Sweden - “Modelling and Simulation in CIP”: Erich Rome (President 2E!SAC), Fraunhofer IAIS, Germany - “Interconnected Infrastructures and Systems of Systems”: Enrico Zio, Politecnico di Milano, Italy and Ecole Centrale Paris, France - “IoT Security”: Sokratis K. Katsikas, NTNU, Norway and University of Piraeus, Greece Call for Papers (PDF to download): http://www.lei.lt/critis2018/assets/critis_2018_call_for_papers.pdf Accepted papers are to be included to post-proceedings, published by Springer-Verlag in their Lecture Notes in Computer Science (LNCS) series. IMPORTANT DATES: 30 April 2018 -- Full-text submission 18 June 2018 -- Notification of acceptance 9 September 2018 -- Camera-ready papers Programme Chair - Eric Luiijf, TNO (retired) and Luiijf Consultancy, the Netherlands Steering Committee Chairs - Bernhard M. Hämmerli, Technical University Lucerne and ACRIS GmbH, Switzerland - Javier Lopez, University of Malaga, Spain - Stephen D. Wolthusen, Royal Holloway, University of London, UK and NTNU, Norway Local Co-Chairs - Inga Žutautaitė, Lithuanian Energy Institute, Lithuania - Ričardas Krikštolaitis, Vytautas Magnus University, Lithuania Publicity Chairs - Cristina Alcaraz, University of Malaga, Spain - Rolandas Urbonas, Lithuanian Energy Institute, Lithuania CRITIS 2018 Secretary Office Lithuanian Energy Institute Breslaujos g. 3, Kaunas, Lithuania Tel. +370 37 401948 +370 37 401938 E-mail: critis2...@lei.lt Conference website: www.lei.lt/critis2018 ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [CFP]: 13th International Conference on Critical Information Infrastructures Security CRITIS 2018
-- *** Apologies for multiple copies *** C a l l F o r P a p e r s 13th International Conference on Critical Information Infrastructures Security CRITIS 2018 Kaunas, Lithuania, September 24-26, 2018 Full-text paper submission due: April 30, 2018 CONFERENCE OUTLINE: CRITIS 2018 continues the tradition of presenting innovative research and exploring new challenges in the field of critical (information) infrastructures protection (C(I)IP), resilience and fostering the dialogue with stakeholders. CRITIS 2018 aims at bringing together researchers, professionals from academia, critical (information) infrastructure operators, industry, defence sector and governmental organisations working in the field of the security of critical (information) infrastructure systems. Moreover, CRITIS aims to encourage and inspire early stage and open-minded researchers in this demanding multi-disciplinary field of research. Outstanding research performance demonstrated by young researchers may compete for the Young CRITIS Award (YCA). The Projects' Dissemination Session will be an opportunity of dissemination for ongoing European, multinational, and national projects, to share the experiences among scientist and experts working on different projects in the C(I)IP domain. CRITIS 2018 conference has a special focus on current and future energy infrastructures within a special session Energy infrastructure operators and stakeholders: key challenges and solution directions, chaired by Marcelo Masera (EC Joint Research Centre in Petten, The Netherlands). Invited speakers will be mainly from European electricity and/or gas Transmission System Operators (TSO), some representatives from European electricity and gas Distributed System Operators (DSO), NATO and European policy-makers. CRITIS 2018 topics (but not limited to): http://www.lei.lt/critis2018/call-for-papers.html Special sessions will be organized by CRITIS 2018 Supporting Chairs: - “Energy CIP”: Marcelo Masera, European Commission, Joint Research Centre, the Netherlands - “CI Resilience”: Marianthi Theocharidou, European Commission, Joint Research Centre, Italy - “Human Factor and CIP”: Grigore Havarneanu, UIC, France - “SCADA Security”: Simin Nadjm-Tehrani, Linköping University, Sweden - “Modelling and Simulation in CIP”: Erich Rome (President 2E!SAC), Fraunhofer IAIS, Germany - “Interconnected Infrastructures and Systems of Systems”: Enrico Zio, Politecnico di Milano, Italy and Ecole Centrale Paris, France - “IoT Security”: Sokratis K. Katsikas, NTNU, Norway and University of Piraeus, Greece Call for Papers (PDF to download): http://www.lei.lt/critis2018/assets/critis_2018_call_for_papers.pdf Accepted papers are to be included to post-proceedings, published by Springer-Verlag in their Lecture Notes in Computer Science (LNCS) series. IMPORTANT DATES: 30 April 2018 -- Full-text submission 18 June 2018 -- Notification of acceptance 9 September 2018 -- Camera-ready papers Programme Chair - Eric Luiijf, TNO (retired) and Luiijf Consultancy, the Netherlands Steering Committee Chairs - Bernhard M. Hämmerli, Technical University Lucerne and ACRIS GmbH, Switzerland - Javier Lopez, University of Malaga, Spain - Stephen D. Wolthusen, Royal Holloway, University of London, UK and NTNU, Norway Local Co-Chairs - Inga Žutautaitė, Lithuanian Energy Institute, Lithuania - Ričardas Krikštolaitis, Vytautas Magnus University, Lithuania Publicity Chairs - Cristina Alcaraz, University of Malaga, Spain - Rolandas Urbonas, Lithuanian Energy Institute, Lithuania CRITIS 2018 Secretary Office Lithuanian Energy Institute Breslaujos g. 3, Kaunas, Lithuania Tel. +370 37 401948 +370 37 401938 E-mail: critis2...@lei.lt Conference website: www.lei.lt/critis2018 ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [CFP]: 13th International Conference on Critical Information Infrastructures Security CRITIS 2018
-- *** Apologies for multiple copies *** C a l l F o r P a p e r s 13th International Conference on Critical Information Infrastructures Security CRITIS 2018 Kaunas, Lithuania, September 24-26, 2018 Full-text paper submission due: April 30, 2018 CONFERENCE OUTLINE: CRITIS 2018 continues the tradition of presenting innovative research and exploring new challenges in the field of critical (information) infrastructures protection (C(I)IP), resilience and fostering the dialogue with stakeholders. CRITIS 2018 aims at bringing together researchers, professionals from academia, critical (information) infrastructure operators, industry, defence sector and governmental organisations working in the field of the security of critical (information) infrastructure systems. Moreover, CRITIS aims to encourage and inspire early stage and open-minded researchers in this demanding multi-disciplinary field of research. Outstanding research performance demonstrated by young researchers may compete for the Young CRITIS Award (YCA). The Projects' Dissemination Session will be an opportunity of dissemination for ongoing European, multinational, and national projects, to share the experiences among scientist and experts working on different projects in the C(I)IP domain. CRITIS 2018 conference has a special focus on current and future energy infrastructures within a special session Energy infrastructure operators and stakeholders: key challenges and solution directions, chaired by Marcelo Masera (EC Joint Research Centre in Petten, The Netherlands). Invited speakers will be mainly from European electricity and/or gas Transmission System Operators (TSO), some representatives from European electricity and gas Distributed System Operators (DSO), NATO and European policy-makers. CRITIS 2018 topics (but not limited to): http://www.lei.lt/critis2018/call-for-papers.html Special sessions will be organized by CRITIS 2018 Supporting Chairs: - “Energy CIP”: Marcelo Masera, European Commission, Joint Research Centre, the Netherlands - “CI Resilience”: Marianthi Theocharidou, European Commission, Joint Research Centre, Italy - “Human Factor and CIP”: Grigore Havarneanu, UIC, France - “SCADA Security”: Simin Nadjm-Tehrani, Linköping University, Sweden - “Modelling and Simulation in CIP”: Erich Rome (President 2E!SAC), Fraunhofer IAIS, Germany - “Interconnected Infrastructures and Systems of Systems”: Enrico Zio, Politecnico di Milano, Italy and Ecole Centrale Paris, France - “IoT Security”: Sokratis K. Katsikas, NTNU, Norway and University of Piraeus, Greece Call for Papers (PDF to download): http://www.lei.lt/critis2018/assets/critis_2018_call_for_papers.pdf Accepted papers are to be included to post-proceedings, published by Springer-Verlag in their Lecture Notes in Computer Science (LNCS) series. IMPORTANT DATES: 30 April 2018 -- Full-text submission 18 June 2018 -- Notification of acceptance 9 September 2018 -- Camera-ready papers Programme Chair - Eric Luiijf, TNO (retired) and Luiijf Consultancy, the Netherlands Steering Committee Chairs - Bernhard M. Hämmerli, Technical University Lucerne and ACRIS GmbH, Switzerland - Javier Lopez, University of Malaga, Spain - Stephen D. Wolthusen, Royal Holloway, University of London, UK and NTNU, Norway Local Co-Chairs - Inga Žutautaitė, Lithuanian Energy Institute, Lithuania - Ričardas Krikštolaitis, Vytautas Magnus University, Lithuania Publicity Chairs - Cristina Alcaraz, University of Malaga, Spain - Rolandas Urbonas, Lithuanian Energy Institute, Lithuania CRITIS 2018 Secretary Office Lithuanian Energy Institute Breslaujos g. 3, Kaunas, Lithuania Tel. +370 37 401948 +370 37 401938 E-mail: critis2...@lei.lt Conference website: www.lei.lt/critis2018 ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [Extended deadline - Call for Papers]: Workshop on Industrial Internet of Things Security (WIIoTS)
*** Apologies for multiple copies *** E x t e n d e d D e a d l i n e C a l l F o r P a p e r s Workshop on Industrial Internet of Things Security (WIIoTS) Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 2018) http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf Extended Submission due: March 27, 2018 (GMT) Conference Outline: The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users. Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to: • Interoperable IIoT ecosystem-level security and privacy challenges • IIoT governance, regulation and standards • Cross-layer threat modelling in IIoT and risk assessment • Lightweight cryptography and key management • Lightweight IIoT security protocols and AAA services for IIoT • Collaborative and trustworthy IIoT frameworks and architectures • Privacy-preserving models and anonymization techniques for IIoT • Secure IIoT data storage and Big Data • Location privacy and trust management • Intrusion detection, anomaly diagnosis and situational awareness for IIoT • Response and resilience to IIoT cyber-attacks • Incident management and IIoT forensics • Case studies and practical validations: SCADA, energy, water, smart factory, etc. Important Dates: • Extended Submission due: March 27, 2018 (GMT) • Notification: April 25, 2018 • Camera-ready due: May 10, 2018 Program Chair: == • Cristina Alcaraz (University of Malaga, Spain) General Co-Chairs: == • Javier Lopez (University of Malaga, Spain) • Yan Zhang (University of Oslo, Norway) Technical Program Committee: • Alvaro Cardenas (University of Dallas, USA) • Christos Xenakis (University of Piraeus) • Dimitris Gritzalis (Athens University of Economics and Business) • Federica Pascucci (University of Roma Tre, Italy) • Kim-Kwang Raymond Choo (University of Texas, USA) • Luca Faramondi (University Campus Bio-Medico) • Mihalis Psarakis (University of Piraeus, Greece) • Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore) • Panayiotis kotzanikolaou (University of Piraeus, Greece) • Rakesh Bobba (Oregon State University, USA) • Rodrigo Roman (University of Malaga, Spain) • Sherali Zeadally (University of Kentucky, USA) • Urko Zurutuza Ortega (University of Mondragon, Spain) • Xinyi Huang (Fujian Normal University, China) Publicity Chair: • Juan E. Rubio (University of Malaga, Spain) Submission Instructions: Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS. "IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference." Contact: Email: alca...@lcc.uma.es WIIoTS Home: http://globaliotsummit.org ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [CFP]: 13th International Conference on Critical Information Infrastructures Security CRITIS 2018
-- *** Apologies for multiple copies *** C a l l F o r P a p e r s 13th International Conference on Critical Information Infrastructures Security CRITIS 2018 Kaunas, Lithuania, September 24-26, 2018 Full-text paper submission due: April 30, 2018 CONFERENCE OUTLINE: CRITIS 2018 continues the tradition of presenting innovative research and exploring new challenges in the field of critical (information) infrastructures protection (C(I)IP), resilience and fostering the dialogue with stakeholders. CRITIS 2018 aims at bringing together researchers, professionals from academia, critical (information) infrastructure operators, industry, defence sector and governmental organisations working in the field of the security of critical (information) infrastructure systems. Moreover, CRITIS aims to encourage and inspire early stage and open-minded researchers in this demanding multi-disciplinary field of research. Outstanding research performance demonstrated by young researchers may compete for the Young CRITIS Award (YCA). The Projects' Dissemination Session will be an opportunity of dissemination for ongoing European, multinational, and national projects, to share the experiences among scientist and experts working on different projects in the C(I)IP domain. CRITIS 2018 conference has a special focus on current and future energy infrastructures within a special session Energy infrastructure operators and stakeholders: key challenges and solution directions, chaired by Marcelo Masera (EC Joint Research Centre in Petten, The Netherlands). Invited speakers will be mainly from European electricity and/or gas Transmission System Operators (TSO), some representatives from European electricity and gas Distributed System Operators (DSO), NATO and European policy-makers. CRITIS 2018 topics (but not limited to): http://www.lei.lt/critis2018/call-for-papers.html Special sessions will be organized by CRITIS 2018 Supporting Chairs: - “Energy CIP”: Marcelo Masera, European Commission, Joint Research Centre, the Netherlands - “CI Resilience”: Marianthi Theocharidou, European Commission, Joint Research Centre, Italy - “Human Factor and CIP”: Grigore Havarneanu, UIC, France - “SCADA Security”: Simin Nadjm-Tehrani, Linköping University, Sweden - “Modelling and Simulation in CIP”: Erich Rome (President 2E!SAC), Fraunhofer IAIS, Germany - “Interconnected Infrastructures and Systems of Systems”: Enrico Zio, Politecnico di Milano, Italy and Ecole Centrale Paris, France - “IoT Security”: Sokratis K. Katsikas, NTNU, Norway and University of Piraeus, Greece Call for Papers (PDF to download): http://www.lei.lt/critis2018/assets/critis_2018_call_for_papers.pdf Accepted papers are to be included to post-proceedings, published by Springer-Verlag in their Lecture Notes in Computer Science (LNCS) series. IMPORTANT DATES: 30 April 2018 -- Full-text submission 18 June 2018 -- Notification of acceptance 9 September 2018 -- Camera-ready papers Programme Chair - Eric Luiijf, TNO (retired) and Luiijf Consultancy, the Netherlands Steering Committee Chairs - Bernhard M. Hämmerli, Technical University Lucerne and ACRIS GmbH, Switzerland - Javier Lopez, University of Malaga, Spain - Stephen D. Wolthusen, Royal Holloway, University of London, UK and NTNU, Norway Local Co-Chairs - Inga Žutautaitė, Lithuanian Energy Institute, Lithuania - Ričardas Krikštolaitis, Vytautas Magnus University, Lithuania Publicity Chairs - Cristina Alcaraz, University of Malaga, Spain - Rolandas Urbonas, Lithuanian Energy Institute, Lithuania CRITIS 2018 Secretary Office Lithuanian Energy Institute Breslaujos g. 3, Kaunas, Lithuania Tel. +370 37 401948 +370 37 401938 E-mail: critis2...@lei.lt Conference website: www.lei.lt/critis2018 ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [Extended deadline - Call for Papers]: Workshop on Industrial Internet of Things Security (WIIoTS)
*** Apologies for multiple copies *** E x t e n d e d D e a d l i n e C a l l F o r P a p e r s Workshop on Industrial Internet of Things Security (WIIoTS) Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 2018) http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf Extended Submission due: March 27, 2018 (GMT) Conference Outline: The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users. Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to: • Interoperable IIoT ecosystem-level security and privacy challenges • IIoT governance, regulation and standards • Cross-layer threat modelling in IIoT and risk assessment • Lightweight cryptography and key management • Lightweight IIoT security protocols and AAA services for IIoT • Collaborative and trustworthy IIoT frameworks and architectures • Privacy-preserving models and anonymization techniques for IIoT • Secure IIoT data storage and Big Data • Location privacy and trust management • Intrusion detection, anomaly diagnosis and situational awareness for IIoT • Response and resilience to IIoT cyber-attacks • Incident management and IIoT forensics • Case studies and practical validations: SCADA, energy, water, smart factory, etc. Important Dates: • Extended Submission due: March 27, 2018 (GMT) • Notification: April 25, 2018 • Camera-ready due: May 10, 2018 Program Chair: == • Cristina Alcaraz (University of Malaga, Spain) General Co-Chairs: == • Javier Lopez (University of Malaga, Spain) • Yan Zhang (University of Oslo, Norway) Technical Program Committee: • Alvaro Cardenas (University of Dallas, USA) • Christos Xenakis (University of Piraeus) • Dimitris Gritzalis (Athens University of Economics and Business) • Federica Pascucci (University of Roma Tre, Italy) • Kim-Kwang Raymond Choo (University of Texas, USA) • Luca Faramondi (University Campus Bio-Medico) • Mihalis Psarakis (University of Piraeus, Greece) • Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore) • Panayiotis kotzanikolaou (University of Piraeus, Greece) • Rakesh Bobba (Oregon State University, USA) • Rodrigo Roman (University of Malaga, Spain) • Sherali Zeadally (University of Kentucky, USA) • Urko Zurutuza Ortega (University of Mondragon, Spain) • Xinyi Huang (Fujian Normal University, China) Publicity Chair: • Juan E. Rubio (University of Malaga, Spain) Submission Instructions: Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS. "IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference." Contact: Email: alca...@lcc.uma.es WIIoTS Home: http://globaliotsummit.org ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [Extended deadline - Call for Papers]: Workshop on Industrial Internet of Things Security (WIIoTS)
*** Apologies for multiple copies *** E x t e n d e d D e a d l i n e C a l l F o r P a p e r s Workshop on Industrial Internet of Things Security (WIIoTS) Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 2018) http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf Extended Submission due: March 27, 2018 (GMT) Conference Outline: The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users. Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to: • Interoperable IIoT ecosystem-level security and privacy challenges • IIoT governance, regulation and standards • Cross-layer threat modelling in IIoT and risk assessment • Lightweight cryptography and key management • Lightweight IIoT security protocols and AAA services for IIoT • Collaborative and trustworthy IIoT frameworks and architectures • Privacy-preserving models and anonymization techniques for IIoT • Secure IIoT data storage and Big Data • Location privacy and trust management • Intrusion detection, anomaly diagnosis and situational awareness for IIoT • Response and resilience to IIoT cyber-attacks • Incident management and IIoT forensics • Case studies and practical validations: SCADA, energy, water, smart factory, etc. Important Dates: • Extended Submission due: March 27, 2018 (GMT) • Notification: April 25, 2018 • Camera-ready due: May 10, 2018 Program Chair: == • Cristina Alcaraz (University of Malaga, Spain) General Co-Chairs: == • Javier Lopez (University of Malaga, Spain) • Yan Zhang (University of Oslo, Norway) Technical Program Committee: • Alvaro Cardenas (University of Dallas, USA) • Christos Xenakis (University of Piraeus) • Dimitris Gritzalis (Athens University of Economics and Business) • Federica Pascucci (University of Roma Tre, Italy) • Kim-Kwang Raymond Choo (University of Texas, USA) • Luca Faramondi (University Campus Bio-Medico) • Mihalis Psarakis (University of Piraeus, Greece) • Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore) • Panayiotis kotzanikolaou (University of Piraeus, Greece) • Rakesh Bobba (Oregon State University, USA) • Rodrigo Roman (University of Malaga, Spain) • Sherali Zeadally (University of Kentucky, USA) • Urko Zurutuza Ortega (University of Mondragon, Spain) • Xinyi Huang (Fujian Normal University, China) Publicity Chair: • Juan E. Rubio (University of Malaga, Spain) Submission Instructions: Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS. "IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference." Contact: Email: alca...@lcc.uma.es WIIoTS Home: http://globaliotsummit.org ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [CFP]: 13th International Conference on Critical Information Infrastructures Security CRITIS 2018
-- *** Apologies for multiple copies *** C a l l F o r P a p e r s 13th International Conference on Critical Information Infrastructures Security CRITIS 2018 Kaunas, Lithuania, September 24-26, 2018 Full-text paper submission due: April 30, 2018 CONFERENCE OUTLINE: CRITIS 2018 continues the tradition of presenting innovative research and exploring new challenges in the field of critical (information) infrastructures protection (C(I)IP), resilience and fostering the dialogue with stakeholders. CRITIS 2018 aims at bringing together researchers, professionals from academia, critical (information) infrastructure operators, industry, defence sector and governmental organisations working in the field of the security of critical (information) infrastructure systems. Moreover, CRITIS aims to encourage and inspire early stage and open-minded researchers in this demanding multi-disciplinary field of research. Outstanding research performance demonstrated by young researchers may compete for the Young CRITIS Award (YCA). The Projects' Dissemination Session will be an opportunity of dissemination for ongoing European, multinational, and national projects, to share the experiences among scientist and experts working on different projects in the C(I)IP domain. CRITIS 2018 conference has a special focus on current and future energy infrastructures within a special session Energy infrastructure operators and stakeholders: key challenges and solution directions, chaired by Marcelo Masera (EC Joint Research Centre in Petten, The Netherlands). Invited speakers will be mainly from European electricity and/or gas Transmission System Operators (TSO), some representatives from European electricity and gas Distributed System Operators (DSO), NATO and European policy-makers. CRITIS 2018 topics (but not limited to): http://www.lei.lt/critis2018/call-for-papers.html Special sessions will be organized by CRITIS 2018 Supporting Chairs: - “Energy CIP”: Marcelo Masera, European Commission, Joint Research Centre, the Netherlands - “CI Resilience”: Marianthi Theocharidou, European Commission, Joint Research Centre, Italy - “Human Factor and CIP”: Grigore Havarneanu, UIC, France - “SCADA Security”: Simin Nadjm-Tehrani, Linköping University, Sweden - “Modelling and Simulation in CIP”: Erich Rome (President 2E!SAC), Fraunhofer IAIS, Germany - “Interconnected Infrastructures and Systems of Systems”: Enrico Zio, Politecnico di Milano, Italy and Ecole Centrale Paris, France - “IoT Security”: Sokratis K. Katsikas, NTNU, Norway and University of Piraeus, Greece Call for Papers (PDF to download): http://www.lei.lt/critis2018/assets/critis_2018_call_for_papers.pdf Accepted papers are to be included to post-proceedings, published by Springer-Verlag in their Lecture Notes in Computer Science (LNCS) series. IMPORTANT DATES: 30 April 2018 -- Full-text submission 18 June 2018 -- Notification of acceptance 9 September 2018 -- Camera-ready papers Programme Chair - Eric Luiijf, TNO (retired) and Luiijf Consultancy, the Netherlands Steering Committee Chairs - Bernhard M. Hämmerli, Technical University Lucerne and ACRIS GmbH, Switzerland - Javier Lopez, University of Malaga, Spain - Stephen D. Wolthusen, Royal Holloway, University of London, UK and NTNU, Norway Local Co-Chairs - Inga Žutautaitė, Lithuanian Energy Institute, Lithuania - Ričardas Krikštolaitis, Vytautas Magnus University, Lithuania Publicity Chairs - Cristina Alcaraz, University of Malaga, Spain - Rolandas Urbonas, Lithuanian Energy Institute, Lithuania CRITIS 2018 Secretary Office Lithuanian Energy Institute Breslaujos g. 3, Kaunas, Lithuania Tel. +370 37 401948 +370 37 401938 E-mail: critis2...@lei.lt Conference website: www.lei.lt/critis2018 ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [Deadline Approaching: Feb, 28th] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Workshop on Industrial Internet of Things Security (WIIoTS) Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 2018) http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf Submission due: Feb 28, 2018 (GMT) Conference Outline: The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users. Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to: • Interoperable IIoT ecosystem-level security and privacy challenges • IIoT governance, regulation and standards • Cross-layer threat modelling in IIoT and risk assessment • Lightweight cryptography and key management • Lightweight IIoT security protocols and AAA services for IIoT • Collaborative and trustworthy IIoT frameworks and architectures • Privacy-preserving models and anonymization techniques for IIoT • Secure IIoT data storage and Big Data • Location privacy and trust management • Intrusion detection, anomaly diagnosis and situational awareness for IIoT • Response and resilience to IIoT cyber-attacks • Incident management and IIoT forensics • Case studies and practical validations: SCADA, energy, water, smart factory, etc. Important Dates: • Submission due: Feb 28, 2018 (GMT) • Notification: Mar 31, 2018 • Camera-ready due: Apr 30, 2018 Program Chair: == • Cristina Alcaraz (University of Malaga, Spain) General Co-Chairs: == • Javier Lopez (University of Malaga, Spain) • Yan Zhang (University of Oslo, Norway) Technical Program Committee: • Alvaro Cardenas (University of Dallas, USA) • Christos Xenakis (University of Piraeus) • Dimitris Gritzalis (Athens University of Economics and Business) • Federica Pascucci (University of Roma Tre, Italy) • Kim-Kwang Raymond Choo (University of Texas, USA) • Luca Faramondi (University Campus Bio-Medico) • Mihalis Psarakis (University of Piraeus, Greece) • Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore) • Panayiotis kotzanikolaou (University of Piraeus, Greece) • Rakesh Bobba (Oregon State University, USA) • Rodrigo Roman (University of Malaga, Spain) • Sherali Zeadally (University of Kentucky, USA) • Urko Zurutuza Ortega (University of Mondragon, Spain) • Xinyi Huang (Fujian Normal University, China) Publicity Chair: • Juan E. Rubio (University of Malaga, Spain) Submission Instructions: Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS. "IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference." Contact: Email: alca...@lcc.uma.es WIIoTS Home: http://globaliotsummit.org ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [Deadline Approaching: Feb, 28th] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Workshop on Industrial Internet of Things Security (WIIoTS) Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 2018) http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf Submission due: Feb 28, 2018 (GMT) Conference Outline: The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users. Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to: • Interoperable IIoT ecosystem-level security and privacy challenges • IIoT governance, regulation and standards • Cross-layer threat modelling in IIoT and risk assessment • Lightweight cryptography and key management • Lightweight IIoT security protocols and AAA services for IIoT • Collaborative and trustworthy IIoT frameworks and architectures • Privacy-preserving models and anonymization techniques for IIoT • Secure IIoT data storage and Big Data • Location privacy and trust management • Intrusion detection, anomaly diagnosis and situational awareness for IIoT • Response and resilience to IIoT cyber-attacks • Incident management and IIoT forensics • Case studies and practical validations: SCADA, energy, water, smart factory, etc. Important Dates: • Submission due: Feb 28, 2018 (GMT) • Notification: Mar 31, 2018 • Camera-ready due: Apr 30, 2018 Program Chair: == • Cristina Alcaraz (University of Malaga, Spain) General Co-Chairs: == • Javier Lopez (University of Malaga, Spain) • Yan Zhang (University of Oslo, Norway) Technical Program Committee: • Alvaro Cardenas (University of Dallas, USA) • Christos Xenakis (University of Piraeus) • Dimitris Gritzalis (Athens University of Economics and Business) • Federica Pascucci (University of Roma Tre, Italy) • Kim-Kwang Raymond Choo (University of Texas, USA) • Luca Faramondi (University Campus Bio-Medico) • Mihalis Psarakis (University of Piraeus, Greece) • Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore) • Panayiotis kotzanikolaou (University of Piraeus, Greece) • Rakesh Bobba (Oregon State University, USA) • Rodrigo Roman (University of Malaga, Spain) • Sherali Zeadally (University of Kentucky, USA) • Urko Zurutuza Ortega (University of Mondragon, Spain) • Xinyi Huang (Fujian Normal University, China) Publicity Chair: • Juan E. Rubio (University of Malaga, Spain) Submission Instructions: Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS. "IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference." Contact: Email: alca...@lcc.uma.es WIIoTS Home: http://globaliotsummit.org ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [Deadline Approaching: Feb, 28th] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Workshop on Industrial Internet of Things Security (WIIoTS) Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 2018) http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf Submission due: Feb 28, 2018 (GMT) Conference Outline: The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users. Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to: • Interoperable IIoT ecosystem-level security and privacy challenges • IIoT governance, regulation and standards • Cross-layer threat modelling in IIoT and risk assessment • Lightweight cryptography and key management • Lightweight IIoT security protocols and AAA services for IIoT • Collaborative and trustworthy IIoT frameworks and architectures • Privacy-preserving models and anonymization techniques for IIoT • Secure IIoT data storage and Big Data • Location privacy and trust management • Intrusion detection, anomaly diagnosis and situational awareness for IIoT • Response and resilience to IIoT cyber-attacks • Incident management and IIoT forensics • Case studies and practical validations: SCADA, energy, water, smart factory, etc. Important Dates: • Submission due: Feb 28, 2018 (GMT) • Notification: Mar 31, 2018 • Camera-ready due: Apr 30, 2018 Program Chair: == • Cristina Alcaraz (University of Malaga, Spain) General Co-Chairs: == • Javier Lopez (University of Malaga, Spain) • Yan Zhang (University of Oslo, Norway) Technical Program Committee: • Alvaro Cardenas (University of Dallas, USA) • Christos Xenakis (University of Piraeus) • Dimitris Gritzalis (Athens University of Economics and Business) • Federica Pascucci (University of Roma Tre, Italy) • Kim-Kwang Raymond Choo (University of Texas, USA) • Luca Faramondi (University Campus Bio-Medico) • Mihalis Psarakis (University of Piraeus, Greece) • Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore) • Panayiotis kotzanikolaou (University of Piraeus, Greece) • Rakesh Bobba (Oregon State University, USA) • Rodrigo Roman (University of Malaga, Spain) • Sherali Zeadally (University of Kentucky, USA) • Urko Zurutuza Ortega (University of Mondragon, Spain) • Xinyi Huang (Fujian Normal University, China) Publicity Chair: • Juan E. Rubio (University of Malaga, Spain) Submission Instructions: Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS. "IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference." Contact: Email: alca...@lcc.uma.es WIIoTS Home: http://globaliotsummit.org ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [Deadline Approaching] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Workshop on Industrial Internet of Things Security (WIIoTS) Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 2018) http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf Submission due: Feb 16, 2018 (GMT) Conference Outline: The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users. Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to: • Interoperable IIoT ecosystem-level security and privacy challenges • IIoT governance, regulation and standards • Cross-layer threat modelling in IIoT and risk assessment • Lightweight cryptography and key management • Lightweight IIoT security protocols and AAA services for IIoT • Collaborative and trustworthy IIoT frameworks and architectures • Privacy-preserving models and anonymization techniques for IIoT • Secure IIoT data storage and Big Data • Location privacy and trust management • Intrusion detection, anomaly diagnosis and situational awareness for IIoT • Response and resilience to IIoT cyber-attacks • Incident management and IIoT forensics • Case studies and practical validations: SCADA, energy, water, smart factory, etc. Important Dates: • Submission due: Feb 16, 2018 (GMT) • Notification: Mar 31, 2018 • Camera-ready due: Apr 30, 2018 Program Chair: == • Cristina Alcaraz (University of Malaga, Spain) General Co-Chairs: == • Javier Lopez (University of Malaga, Spain) • Yan Zhang (University of Oslo, Norway) Technical Program Committee: • Alvaro Cardenas (University of Dallas, USA) • Christos Xenakis (University of Piraeus) • Dimitris Gritzalis (Athens University of Economics and Business) • Federica Pascucci (University of Roma Tre, Italy) • Kim-Kwang Raymond Choo (University of Texas, USA) • Luca Faramondi (University Campus Bio-Medico) • Mihalis Psarakis (University of Piraeus, Greece) • Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore) • Panayiotis kotzanikolaou (University of Piraeus, Greece) • Rakesh Bobba (Oregon State University, USA) • Rodrigo Roman (University of Malaga, Spain) • Sherali Zeadally (University of Kentucky, USA) • Urko Zurutuza Ortega (University of Mondragon, Spain) • Xinyi Huang (Fujian Normal University, China) Publicity Chair: • Juan E. Rubio (University of Malaga, Spain) Submission Instructions: Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS. "IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference." Contact: Email: alca...@lcc.uma.es WIIoTS Home: http://globaliotsummit.org ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [Deadline Approaching] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Workshop on Industrial Internet of Things Security (WIIoTS) Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 2018) http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf Submission due: Feb 16, 2018 (GMT) Conference Outline: The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users. Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to: • Interoperable IIoT ecosystem-level security and privacy challenges • IIoT governance, regulation and standards • Cross-layer threat modelling in IIoT and risk assessment • Lightweight cryptography and key management • Lightweight IIoT security protocols and AAA services for IIoT • Collaborative and trustworthy IIoT frameworks and architectures • Privacy-preserving models and anonymization techniques for IIoT • Secure IIoT data storage and Big Data • Location privacy and trust management • Intrusion detection, anomaly diagnosis and situational awareness for IIoT • Response and resilience to IIoT cyber-attacks • Incident management and IIoT forensics • Case studies and practical validations: SCADA, energy, water, smart factory, etc. Important Dates: • Submission due: Feb 16, 2018 (GMT) • Notification: Mar 31, 2018 • Camera-ready due: Apr 30, 2018 Program Chair: == • Cristina Alcaraz (University of Malaga, Spain) General Co-Chairs: == • Javier Lopez (University of Malaga, Spain) • Yan Zhang (University of Oslo, Norway) Technical Program Committee: • Alvaro Cardenas (University of Dallas, USA) • Christos Xenakis (University of Piraeus) • Dimitris Gritzalis (Athens University of Economics and Business) • Federica Pascucci (University of Roma Tre, Italy) • Kim-Kwang Raymond Choo (University of Texas, USA) • Luca Faramondi (University Campus Bio-Medico) • Mihalis Psarakis (University of Piraeus, Greece) • Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore) • Panayiotis kotzanikolaou (University of Piraeus, Greece) • Rakesh Bobba (Oregon State University, USA) • Rodrigo Roman (University of Malaga, Spain) • Sherali Zeadally (University of Kentucky, USA) • Urko Zurutuza Ortega (University of Mondragon, Spain) • Xinyi Huang (Fujian Normal University, China) Publicity Chair: • Juan E. Rubio (University of Malaga, Spain) Submission Instructions: Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS. "IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference." Contact: Email: alca...@lcc.uma.es WIIoTS Home: http://globaliotsummit.org ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Workshop on Industrial Internet of Things Security (WIIoTS) Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 2018) http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf Submission due: Feb 16, 2018 (GMT) Conference Outline: The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users. Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to: • Interoperable IIoT ecosystem-level security and privacy challenges • IIoT governance, regulation and standards • Cross-layer threat modelling in IIoT and risk assessment • Lightweight cryptography and key management • Lightweight IIoT security protocols and AAA services for IIoT • Collaborative and trustworthy IIoT frameworks and architectures • Privacy-preserving models and anonymization techniques for IIoT • Secure IIoT data storage and Big Data • Location privacy and trust management • Intrusion detection, anomaly diagnosis and situational awareness for IIoT • Response and resilience to IIoT cyber-attacks • Incident management and IIoT forensics • Case studies and practical validations: SCADA, energy, water, smart factory, etc. Important Dates: • Submission due: Feb 16, 2018 (GMT) • Notification: Mar 31, 2018 • Camera-ready due: Apr 30, 2018 Program Chair: == • Cristina Alcaraz (University of Malaga, Spain) General Co-Chairs: == • Javier Lopez (University of Malaga, Spain) • Yan Zhang (University of Oslo, Norway) Technical Program Committee: • Alvaro Cardenas (University of Dallas, USA) • Christos Xenakis (University of Piraeus) • Dimitris Gritzalis (Athens University of Economics and Business) • Federica Pascucci (University of Roma Tre, Italy) • Kim-Kwang Raymond Choo (University of Texas, USA) • Luca Faramondi (University Campus Bio-Medico) • Mihalis Psarakis (University of Piraeus, Greece) • Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore) • Panayiotis kotzanikolaou (University of Piraeus, Greece) • Rakesh Bobba (Oregon State University, USA) • Rodrigo Roman (University of Malaga, Spain) • Sherali Zeadally (University of Kentucky, USA) • Urko Zurutuza Ortega (University of Mondragon, Spain) • Xinyi Huang (Fujian Normal University, China) Publicity Chair: • Juan E. Rubio (University of Malaga, Spain) Submission Instructions: Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS. "IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference." Contact: Email: alca...@lcc.uma.es WIIoTS Home: http://globaliotsummit.org ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] ESORICS 2017: Call for Participation
== ESORICS 2017: CALL FOR PARTICIPATION 22nd European Symposium on Research in Computer Security Oslo, Norway — September 11-15, 2017 == WWW: https://www.ntnu.edu/web/esorics2017/ Overview ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. The 22nd European Symposium on Research in Computer Security (ESORICS 2017) will be held in Oslo, Norway. ESORICS 2017 spans a total of 3 days, featuring: * 3 keynote speeches (Cormac Herley, Paul Syverson, Sandro Etalle) * 54 paper presentations in 3 days (Sep 11-13) * 8 workshops (Sept 14 - 15) Presentations Program The 54 papers of ESORICS 2017 are distributed between **18 sessions** in **two parallel tracks**. Following is the list of paper presentations for the main ESORICS conference. For the workshop programs, please consult their corresponding websites: * SECPRE 2017: https://samosweb.aegean.gr/secpre2017/ * SecSE 2017: http://secse.org * CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/ * DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/ * STM 2017: http://stm2017.di.unimi.it * QASA 2017: http://www.iit.cnr.it/qasa2017/ * CyberICPS: http://www.ds.unipi.gr/cybericps2017/ * SIoT 2017: http://siot-workshop.org ### September 11 - Day 1 ### 09:30 - 10:30 * Keynote: Cormac Herley - Justifying Security Measures - a Position Paper 11:00 - 12:30 * Session 1: Security of embedded things - Shortfall-based Optimal Placement of Security Resources for Mobile IoT Scenarios Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo - Analyzing the Capabilities of the CAN Attacker Sibylle Froeschle and Alexander Stühring - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors Steffen Schulz, André Schaller, Florian Kohnhäuser, and Stefan Katzenbeisser * Session 2: Cryptographic Application I - Per-Session Security: Password-Based Cryptography Revisited Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithm Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David Naccache - Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and Nigel Smart 14:00 - 15:30 * Session 3: Documents and Authorship - Identifying Multiple Authors in a Binary Program Xiaozhu Meng, Barton Miller and Kwang-Sung Jun - Verifiable Document Redacting Herve Chabanne, Rodolphe Hugel and Julien Keuffer - Source Code Authorship Attribution using Long Short-Term Memory Based Networks Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis and Rachel Greenstadt * Session 4: Analysis of Security Protocols - Automated analysis of equivalence properties for security protocols using else branches Ivan Gazeau and Steve Kremer and Levente Buttyán - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5 Cas Cremers, Martin Dehnel-Wild and Kevin Milner - Modular Verification of Protocol Equivalence in the Presence of Randomness Matthew Bauer, Rohit Chadha and Mahesh Viswanathan 16:00 - 17:30 * Session 5: Threat Analysis - Preventing Advanced Persistent Threats in Complex Control Networks Juan E. Rubio, Cristina Alcaraz and Javier Lopez - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott A. Deloach - Is my attack tree correct? Maxime Audinot, Sophie Pinchinat and Barbara Kordy * Session 6: Side Channels and data leakage - On-Demand Time Blurring to Support Side-Channel Defense Weijie Liu, Debin Gao and Mike Reiter - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval Elovici - Practical Keystroke Timing Attacks in Sandboxed JavaScript Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice and Stefan Mangard ### September 12 - Day 2 ### 09:00 - 10:00 * Keynote: Paul Syverson - The Once and Future Onion 10:30 - 12:00 * Session 7: Vulnerabilities and Malware - Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor - VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng - Adversarial Examples for Malware
[Om-announce] ESORICS 2017: Call for Participation
== ESORICS 2017: CALL FOR PARTICIPATION 22nd European Symposium on Research in Computer Security Oslo, Norway — September 11-15, 2017 == WWW: https://www.ntnu.edu/web/esorics2017/ Overview ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. The 22nd European Symposium on Research in Computer Security (ESORICS 2017) will be held in Oslo, Norway. ESORICS 2017 spans a total of 3 days, featuring: * 3 keynote speeches (Cormac Herley, Paul Syverson, Sandro Etalle) * 54 paper presentations in 3 days (Sep 11-13) * 8 workshops (Sept 14 - 15) Presentations Program The 54 papers of ESORICS 2017 are distributed between **18 sessions** in **two parallel tracks**. Following is the list of paper presentations for the main ESORICS conference. For the workshop programs, please consult their corresponding websites: * SECPRE 2017: https://samosweb.aegean.gr/secpre2017/ * SecSE 2017: http://secse.org * CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/ * DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/ * STM 2017: http://stm2017.di.unimi.it * QASA 2017: http://www.iit.cnr.it/qasa2017/ * CyberICPS: http://www.ds.unipi.gr/cybericps2017/ * SIoT 2017: http://siot-workshop.org ### September 11 - Day 1 ### 09:30 - 10:30 * Keynote: Cormac Herley - Justifying Security Measures - a Position Paper 11:00 - 12:30 * Session 1: Security of embedded things - Shortfall-based Optimal Placement of Security Resources for Mobile IoT Scenarios Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo - Analyzing the Capabilities of the CAN Attacker Sibylle Froeschle and Alexander Stühring - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors Steffen Schulz, André Schaller, Florian Kohnhäuser, and Stefan Katzenbeisser * Session 2: Cryptographic Application I - Per-Session Security: Password-Based Cryptography Revisited Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithm Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David Naccache - Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and Nigel Smart 14:00 - 15:30 * Session 3: Documents and Authorship - Identifying Multiple Authors in a Binary Program Xiaozhu Meng, Barton Miller and Kwang-Sung Jun - Verifiable Document Redacting Herve Chabanne, Rodolphe Hugel and Julien Keuffer - Source Code Authorship Attribution using Long Short-Term Memory Based Networks Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis and Rachel Greenstadt * Session 4: Analysis of Security Protocols - Automated analysis of equivalence properties for security protocols using else branches Ivan Gazeau and Steve Kremer and Levente Buttyán - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5 Cas Cremers, Martin Dehnel-Wild and Kevin Milner - Modular Verification of Protocol Equivalence in the Presence of Randomness Matthew Bauer, Rohit Chadha and Mahesh Viswanathan 16:00 - 17:30 * Session 5: Threat Analysis - Preventing Advanced Persistent Threats in Complex Control Networks Juan E. Rubio, Cristina Alcaraz and Javier Lopez - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott A. Deloach - Is my attack tree correct? Maxime Audinot, Sophie Pinchinat and Barbara Kordy * Session 6: Side Channels and data leakage - On-Demand Time Blurring to Support Side-Channel Defense Weijie Liu, Debin Gao and Mike Reiter - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval Elovici - Practical Keystroke Timing Attacks in Sandboxed JavaScript Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice and Stefan Mangard ### September 12 - Day 2 ### 09:00 - 10:00 * Keynote: Paul Syverson - The Once and Future Onion 10:30 - 12:00 * Session 7: Vulnerabilities and Malware - Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor - VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng - Adversarial Examples for Malware
[Om-announce] ESORICS 2017: Call for Participation
== ESORICS 2017: CALL FOR PARTICIPATION 22nd European Symposium on Research in Computer Security Oslo, Norway — September 11-15, 2017 == WWW: https://www.ntnu.edu/web/esorics2017/ Overview ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. The 22nd European Symposium on Research in Computer Security (ESORICS 2017) will be held in Oslo, Norway. ESORICS 2017 spans a total of 3 days, featuring: * 3 keynote speeches (Cormac Herley, Paul Syverson, Sandro Etalle) * 54 paper presentations in 3 days (Sep 11-13) * NN workshops (Sept 14 - 15) Registration Early Registration for ESORICS+Workshops 2017 is open, but will end soon. Early registration deadline is ***August, 15th 2017*** Registration rates: https://www.ntnu.edu/web/esorics2017/registration If an invitation letter is needed (e.g. VISA) the letter will be provided after the registration. To do this, it is necessary to send an email to the organizing committee: mailto:esorics2...@ntnu.edu Venue page: https://www.ntnu.edu/web/esorics2017/venue Travel and accommodation page: https://www.ntnu.edu/web/esorics2017/travel-accomodation We hope to see you in Oslo, Norway! Presentations Program The 54 papers of ESORICS 2017 are distributed between **18 sessions** in **two parallel tracks**. Following is the list of paper presentations for the main ESORICS conference. For the workshop programs, please consult their corresponding websites: * SECPRE 2017: https://samosweb.aegean.gr/secpre2017/ * SecSE 2017: http://secse.org * CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/ * DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/ * STM 2017: http://stm2017.di.unimi.it * QASA 2017: http://www.iit.cnr.it/qasa2017/ * CyberICPS: http://www.ds.unipi.gr/cybericps2017/ * SIoT 2017: http://siot-workshop.org ### September 11 - Day 1 ### 09:30 - 10:30 * Keynote: Cormac Herley 11:00 - 12:30 * Session 1: Security of embedded things - Shortfall-based Optimal Placement of Security Resources for Mobile IoT Scenarios Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo - Analyzing the Capabilities of the CAN Attacker Sibylle Froeschle and Alexander Stühring - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors André Schaller, Florian Kohnhäuser, Steffen Schulz and Stefan Katzenbeisser * Session 2: Cryptographic Application I - Per-Session Security: Password-Based Cryptography Revisited Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithm Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David Naccache - Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and Nigel Smart 14:00 - 15:30 * Session 3: Documents and Authorship - Identifying Multiple Authors in a Binary Program Xiaozhu Meng, Barton Miller and Kwang-Sung Jun - Verifiable Document Redacting Herve Chabanne, Rodolphe Hugel and Julien Keuffer - Source Code Authorship Attribution using Long Short-Term Memory Based Networks Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis and Rachel Greenstadt * Session 4: Analysis of Security Protocols - Automated analysis of equivalence properties for security protocols using else branches Ivan Gazeau and Steve Kremer and Levente Buttyán - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5 Cas Cremers, Martin Dehnel-Wild and Kevin Milner - Modular Verification of Protocol Equivalence in the Presence of Randomness Matthew Bauer, Rohit Chadha and Mahesh Viswanathan 16:00 - 17:30 * Session 5: Threat Analysis - Preventing Advanced Persistent Threats in Complex Control Networks Juan E. Rubio, Cristina Alcaraz and Javier Lopez - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott A. Deloach - Is my attack tree correct? Maxime Audinot, Sophie Pinchinat and Barbara Kordy * Session 6: Side Channels and data leakage - On-Demand Time Blurring to Support Side-Channel Defense Weijie Liu, Debin Gao and Mike Reiter - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval Elovici - Practical Keystroke Timing Attacks in Sandboxed JavaScript
[Om-announce] [Extended deadline] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)
*** Apologies for multiple copies *** +Extended submission deadline: July 31, 2017+ C a l l F o r P a p e r s COMPUTER NETWORKS JOURNAL - Elsevier (New 2016 JCR Impact Factor: 2.516) Special Issue: Security and Privacy in Cloud-Assisted Cyber-Physical Systems Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling between embedded computing devices and their physical environment. CPSes can be viewed as the bridge between physical components/processes and the cyber space. Specifically, the notion of CPSes is to use computing (e.g. sensing, analyzing and predicting), communication (e.g. interaction, intervene and interface management), and controlling (e.g. inter-operation, evolving and evidence-based certification) to make intelligent and autonomous systems. Recent years have seen a dramatic rise in the development of CPSes services, including ubiquitous health care, smart electricity grid, and smart buildings. However, the fast-growing data volume is hard to process. The present CPSes cannot support ultra-fast computing, and thus it cannot provide real-time and reliable services to meet the requirements, which are essential for mission-critical systems. Fortunately, cloud infrastructures and platforms can provide flexible and on-demand processing power and high-capacity storage for data streams, as well as provisioning of a variety of services using telecommunication and networking technologies. Thus, the large-scale nature of CPSes can be effectively and efficiently supported and assisted by cloud systems, which is referred to as cloud-assisted CPSes (Cloud-CPS). The coupling of cloud systems and CPSes, though advantageous, is subject to new forms of risks that have not been considered adequately in the traditional computing domain. CPSes often collect sensitive and private information about the physical environment. A loss of security for a CPS can therefore have significant negative impact including loss of privacy, potential physical harm, discrimination, and abuse. Though numerous security primitives have been developed in the cyber domain to address the very same problems, their applicability to the Cloud-CPSes domain is still questionable due to the reason that they are usually complex to implement and oblivious to cyber-physical interactions. The goal of this special issue is to unveil and address the security and privacy aspects associated to the Cloud-CPeSs. Suggested topics include, but are not limited to the following. * Secure data sharing in Cloud-CPSes * Big data security and privacy in Cloud-CPSes * Secure computation in Cloud-CPSes * Location privacy in Cloud-CPSes * Lightweight block ciphers for low-resource devices in Cloud-CPSes * Searchable encryption in Cloud-CPSes * End to end secure communications in Cloud-CPSes * Access control in Cloud-CPSes * Key management in Cloud-CPSes These topics remark the differences between the classical CPSes and Cloud-CPSes, and particularly when designing security and privacy solutions for specific Cloud-assisted CPSes applied in restricted environments with rigorous performance requirements and criticality in mind. - Important Dates - * Extended submission deadline: July 31, 2017 * Notification of acceptance: September 15, 2017 * Final manuscript due: October 15, 2017 - Paper Submission Guidelines - All submitted papers to this special issue must be well written in English, and must be original and not be under review in any other journal or conference proceedings. When submitting their papers authors must select “Security in Cloud CPS” as the article type. Submitted papers should be presented according to the journal style. For more detailed information regarding the requirements for submission, please refer to: https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors. Requests for additional information should be addressed to the guest editors. - Guest Editors - Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com Erich Rome, Fraunhofer, erich.r...@iais.fraunhofer.de ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [CFR]: ESORICS+Workshops 2017 Registration is Open (Early-bird pricing through ***August, 15th 2017***)
Dear colleagues, We would like to invite you to join us at the 22nd European Symposium on Research in Computer Security (ESORICS) 2017 in Oslo, Norway! ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Registration for ESORICS+Workshops 2017 is open, but will end soon. Early registration deadline is ***August, 15th 2017*** Registration rates: https://www.ntnu.edu/web/esorics2017/registration If an invitation letter is needed (e.g. VISA) the letter will be provided after the registration. To do this, it is necessary to send an email to the organizing committee: mailto:esorics2...@ntnu.edu Venu page: https://www.ntnu.edu/web/esorics2017/venue Travel and accommodation page: https://www.ntnu.edu/web/esorics2017/travel-accomodation We hope to see you in Oslo, Norway! -- Cristina Alcaraz ESORICS 2017 Publicity Chair University of Malaga ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [CFR]: ESORICS+Workshops 2017 Registration is Open (Early-bird pricing through ***August, 15th 2017***)
Dear colleagues, We would like to invite you to join us at the 22nd European Symposium on Research in Computer Security (ESORICS) 2017 in Oslo, Norway! ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Registration for ESORICS+Workshops 2017 is open, but will end soon. Early registration deadline is ***August, 15th 2017*** Registration rates: https://www.ntnu.edu/web/esorics2017/registration If an invitation letter is needed (e.g. VISA) the letter will be provided after the registration. To do this, it is necessary to send an email to the organizing committee: mailto:esorics2...@ntnu.edu Venu page: https://www.ntnu.edu/web/esorics2017/venue Travel and accommodation page: https://www.ntnu.edu/web/esorics2017/travel-accomodation We hope to see you in Oslo, Norway! -- Cristina Alcaraz ESORICS 2017 Publicity Chair University of Malaga ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [Extended deadline] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)
*** Apologies for multiple copies *** +Extended submission deadline: July 31, 2017+ C a l l F o r P a p e r s COMPUTER NETWORKS JOURNAL - Elsevier (New 2016 JCR Impact Factor: 2.516) Special Issue: Security and Privacy in Cloud-Assisted Cyber-Physical Systems Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling between embedded computing devices and their physical environment. CPSes can be viewed as the bridge between physical components/processes and the cyber space. Specifically, the notion of CPSes is to use computing (e.g. sensing, analyzing and predicting), communication (e.g. interaction, intervene and interface management), and controlling (e.g. inter-operation, evolving and evidence-based certification) to make intelligent and autonomous systems. Recent years have seen a dramatic rise in the development of CPSes services, including ubiquitous health care, smart electricity grid, and smart buildings. However, the fast-growing data volume is hard to process. The present CPSes cannot support ultra-fast computing, and thus it cannot provide real-time and reliable services to meet the requirements, which are essential for mission-critical systems. Fortunately, cloud infrastructures and platforms can provide flexible and on-demand processing power and high-capacity storage for data streams, as well as provisioning of a variety of services using telecommunication and networking technologies. Thus, the large-scale nature of CPSes can be effectively and efficiently supported and assisted by cloud systems, which is referred to as cloud-assisted CPSes (Cloud-CPS). The coupling of cloud systems and CPSes, though advantageous, is subject to new forms of risks that have not been considered adequately in the traditional computing domain. CPSes often collect sensitive and private information about the physical environment. A loss of security for a CPS can therefore have significant negative impact including loss of privacy, potential physical harm, discrimination, and abuse. Though numerous security primitives have been developed in the cyber domain to address the very same problems, their applicability to the Cloud-CPSes domain is still questionable due to the reason that they are usually complex to implement and oblivious to cyber-physical interactions. The goal of this special issue is to unveil and address the security and privacy aspects associated to the Cloud-CPeSs. Suggested topics include, but are not limited to the following. * Secure data sharing in Cloud-CPSes * Big data security and privacy in Cloud-CPSes * Secure computation in Cloud-CPSes * Location privacy in Cloud-CPSes * Lightweight block ciphers for low-resource devices in Cloud-CPSes * Searchable encryption in Cloud-CPSes * End to end secure communications in Cloud-CPSes * Access control in Cloud-CPSes * Key management in Cloud-CPSes These topics remark the differences between the classical CPSes and Cloud-CPSes, and particularly when designing security and privacy solutions for specific Cloud-assisted CPSes applied in restricted environments with rigorous performance requirements and criticality in mind. - Important Dates - * Extended submission deadline: July 31, 2017 * Notification of acceptance: September 15, 2017 * Final manuscript due: October 15, 2017 - Paper Submission Guidelines - All submitted papers to this special issue must be well written in English, and must be original and not be under review in any other journal or conference proceedings. When submitting their papers authors must select “Security in Cloud CPS” as the article type. Submitted papers should be presented according to the journal style. For more detailed information regarding the requirements for submission, please refer to: https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors. Requests for additional information should be addressed to the guest editors. - Guest Editors - Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com Erich Rome, Fraunhofer, erich.r...@iais.fraunhofer.de ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] [Deadline approaching] CFP: The 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017)
Dear Colleague, apologies for multiple receptions of this message. This message is to remind you that the deadline for submissions to CRITIS 2017 has been post-poned at June 23-rd. This year the conference will take place in Lucca, a gorgeous Renaissance city in Tuscany, 9-11 October 2017. A Young Critis Award will be awarded to the best contribution presented by a young author. Three finalists will also receive reduced funds. The attached Leaflet provides a preview of our invited speakers. Looking forward to meeting you in Lucca Best regards The organizers: Cristina Alcaraz, Hypatia Nassopoulos, Grigore Havarneanu Antonio Scala, Gregorio D’Agostino ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)
*** Apologies for multiple copies *** C a l l F o r P a p e r s COMPUTER NETWORKS JOURNAL - Elsevier Special Issue: Security and Privacy in Cloud-Assisted Cyber-Physical Systems Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling between embedded computing devices and their physical environment. CPSes can be viewed as the bridge between physical components/processes and the cyber space. Specifically, the notion of CPSes is to use computing (e.g. sensing, analyzing and predicting), communication (e.g. interaction, intervene and interface management), and controlling (e.g. inter-operation, evolving and evidence-based certification) to make intelligent and autonomous systems. Recent years have seen a dramatic rise in the development of CPSes services, including ubiquitous health care, smart electricity grid, and smart buildings. However, the fast-growing data volume is hard to process. The present CPSes cannot support ultra-fast computing, and thus it cannot provide real-time and reliable services to meet the requirements, which are essential for mission-critical systems. Fortunately, cloud infrastructures and platforms can provide flexible and on-demand processing power and high-capacity storage for data streams, as well as provisioning of a variety of services using telecommunication and networking technologies. Thus, the large-scale nature of CPSes can be effectively and efficiently supported and assisted by cloud systems, which is referred to as cloud-assisted CPSes (Cloud-CPS). The coupling of cloud systems and CPSes, though advantageous, is subject to new forms of risks that have not been considered adequately in the traditional computing domain. CPSes often collect sensitive and private information about the physical environment. A loss of security for a CPS can therefore have significant negative impact including loss of privacy, potential physical harm, discrimination, and abuse. Though numerous security primitives have been developed in the cyber domain to address the very same problems, their applicability to the Cloud-CPSes domain is still questionable due to the reason that they are usually complex to implement and oblivious to cyber-physical interactions. The goal of this special issue is to unveil and address the security and privacy aspects associated to the Cloud-CPeSs. Suggested topics include, but are not limited to the following. * Secure data sharing in Cloud-CPSes * Big data security and privacy in Cloud-CPSes * Secure computation in Cloud-CPSes * Location privacy in Cloud-CPSes * Lightweight block ciphers for low-resource devices in Cloud-CPSes * Searchable encryption in Cloud-CPSes * End to end secure communications in Cloud-CPSes * Access control in Cloud-CPSes * Key management in Cloud-CPSes These topics remark the differences between the classical CPSes and Cloud-CPSes, and particularly when designing security and privacy solutions for specific Cloud-assisted CPSes applied in restricted environments with rigorous performance requirements and criticality in mind. - Important Dates - * Submission deadline: June 30, 2017 * Notification of acceptance: August 31, 2017 * Final manuscript due: October 15, 2017 - Paper Submission Guidelines - All submitted papers to this special issue must be well written in English, and must be original and not be under review in any other journal or conference proceedings. When submitting their papers authors must select “Security in Cloud CPS” as the article type. Submitted papers should be presented according to the journal style. For more detailed information regarding the requirements for submission, please refer to: https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors. Requests for additional information should be addressed to the guest editors. - Guest Editors - Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com Erich Rome, Fraunhofer, erich.r...@iais.fraunhofer.de ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)
*** Apologies for multiple copies *** C a l l F o r P a p e r s COMPUTER NETWORKS JOURNAL - Elsevier Special Issue: Security and Privacy in Cloud-Assisted Cyber-Physical Systems Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling between embedded computing devices and their physical environment. CPSes can be viewed as the bridge between physical components/processes and the cyber space. Specifically, the notion of CPSes is to use computing (e.g. sensing, analyzing and predicting), communication (e.g. interaction, intervene and interface management), and controlling (e.g. inter-operation, evolving and evidence-based certification) to make intelligent and autonomous systems. Recent years have seen a dramatic rise in the development of CPSes services, including ubiquitous health care, smart electricity grid, and smart buildings. However, the fast-growing data volume is hard to process. The present CPSes cannot support ultra-fast computing, and thus it cannot provide real-time and reliable services to meet the requirements, which are essential for mission-critical systems. Fortunately, cloud infrastructures and platforms can provide flexible and on-demand processing power and high-capacity storage for data streams, as well as provisioning of a variety of services using telecommunication and networking technologies. Thus, the large-scale nature of CPSes can be effectively and efficiently supported and assisted by cloud systems, which is referred to as cloud-assisted CPSes (Cloud-CPS). The coupling of cloud systems and CPSes, though advantageous, is subject to new forms of risks that have not been considered adequately in the traditional computing domain. CPSes often collect sensitive and private information about the physical environment. A loss of security for a CPS can therefore have significant negative impact including loss of privacy, potential physical harm, discrimination, and abuse. Though numerous security primitives have been developed in the cyber domain to address the very same problems, their applicability to the Cloud-CPSes domain is still questionable due to the reason that they are usually complex to implement and oblivious to cyber-physical interactions. The goal of this special issue is to unveil and address the security and privacy aspects associated to the Cloud-CPeSs. Suggested topics include, but are not limited to the following. * Secure data sharing in Cloud-CPSes * Big data security and privacy in Cloud-CPSes * Secure computation in Cloud-CPSes * Location privacy in Cloud-CPSes * Lightweight block ciphers for low-resource devices in Cloud-CPSes * Searchable encryption in Cloud-CPSes * End to end secure communications in Cloud-CPSes * Access control in Cloud-CPSes * Key management in Cloud-CPSes These topics remark the differences between the classical CPSes and Cloud-CPSes, and particularly when designing security and privacy solutions for specific Cloud-assisted CPSes applied in restricted environments with rigorous performance requirements and criticality in mind. - Important Dates - * Submission deadline: June 30, 2017 * Notification of acceptance: August 31, 2017 * Final manuscript due: October 15, 2017 - Paper Submission Guidelines - All submitted papers to this special issue must be well written in English, and must be original and not be under review in any other journal or conference proceedings. When submitting their papers authors must select “Security in Cloud CPS” as the article type. Submitted papers should be presented according to the journal style. For more detailed information regarding the requirements for submission, please refer to: https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors. Requests for additional information should be addressed to the guest editors. - Guest Editors - Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com Erich Rome, Fraunhofer, erich.r...@iais.fraunhofer.de ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)
*** Apologies for multiple copies *** C a l l F o r P a p e r s COMPUTER NETWORKS JOURNAL - Elsevier Special Issue: Security and Privacy in Cloud-Assisted Cyber-Physical Systems Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling between embedded computing devices and their physical environment. CPSes can be viewed as the bridge between physical components/processes and the cyber space. Specifically, the notion of CPSes is to use computing (e.g. sensing, analyzing and predicting), communication (e.g. interaction, intervene and interface management), and controlling (e.g. inter-operation, evolving and evidence-based certification) to make intelligent and autonomous systems. Recent years have seen a dramatic rise in the development of CPSes services, including ubiquitous health care, smart electricity grid, and smart buildings. However, the fast-growing data volume is hard to process. The present CPSes cannot support ultra-fast computing, and thus it cannot provide real-time and reliable services to meet the requirements, which are essential for mission-critical systems. Fortunately, cloud infrastructures and platforms can provide flexible and on-demand processing power and high-capacity storage for data streams, as well as provisioning of a variety of services using telecommunication and networking technologies. Thus, the large-scale nature of CPSes can be effectively and efficiently supported and assisted by cloud systems, which is referred to as cloud-assisted CPSes (Cloud-CPS). The coupling of cloud systems and CPSes, though advantageous, is subject to new forms of risks that have not been considered adequately in the traditional computing domain. CPSes often collect sensitive and private information about the physical environment. A loss of security for a CPS can therefore have significant negative impact including loss of privacy, potential physical harm, discrimination, and abuse. Though numerous security primitives have been developed in the cyber domain to address the very same problems, their applicability to the Cloud-CPSes domain is still questionable due to the reason that they are usually complex to implement and oblivious to cyber-physical interactions. The goal of this special issue is to unveil and address the security and privacy aspects associated to the Cloud-CPeSs. Suggested topics include, but are not limited to the following. * Secure data sharing in Cloud-CPSes * Big data security and privacy in Cloud-CPSes * Secure computation in Cloud-CPSes * Location privacy in Cloud-CPSes * Lightweight block ciphers for low-resource devices in Cloud-CPSes * Searchable encryption in Cloud-CPSes * End to end secure communications in Cloud-CPSes * Access control in Cloud-CPSes * Key management in Cloud-CPSes These topics remark the differences between the classical CPSes and Cloud-CPSes, and particularly when designing security and privacy solutions for specific Cloud-assisted CPSes applied in restricted environments with rigorous performance requirements and criticality in mind. - Important Dates - * Submission deadline: June 30, 2017 * Notification of acceptance: August 31, 2017 * Final manuscript due: October 15, 2017 - Paper Submission Guidelines - All submitted papers to this special issue must be well written in English, and must be original and not be under review in any other journal or conference proceedings. When submitting their papers authors must select “Security in Cloud CPS” as the article type. Submitted papers should be presented according to the journal style. For more detailed information regarding the requirements for submission, please refer to: https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors. Requests for additional information should be addressed to the guest editors. - Guest Editors - Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com Eric Rome, Fraunhofer, erich.r...@iais.fraunhofer.de ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)
*** Apologies for multiple copies *** C a l l F o r P a p e r s COMPUTER NETWORKS JOURNAL - Elsevier Special Issue: Security and Privacy in Cloud-Assisted Cyber-Physical Systems Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling between embedded computing devices and their physical environment. CPSes can be viewed as the bridge between physical components/processes and the cyber space. Specifically, the notion of CPSes is to use computing (e.g. sensing, analyzing and predicting), communication (e.g. interaction, intervene and interface management), and controlling (e.g. inter-operation, evolving and evidence-based certification) to make intelligent and autonomous systems. Recent years have seen a dramatic rise in the development of CPSes services, including ubiquitous health care, smart electricity grid, and smart buildings. However, the fast-growing data volume is hard to process. The present CPSes cannot support ultra-fast computing, and thus it cannot provide real-time and reliable services to meet the requirements, which are essential for mission-critical systems. Fortunately, cloud infrastructures and platforms can provide flexible and on-demand processing power and high-capacity storage for data streams, as well as provisioning of a variety of services using telecommunication and networking technologies. Thus, the large-scale nature of CPSes can be effectively and efficiently supported and assisted by cloud systems, which is referred to as cloud-assisted CPSes (Cloud-CPS). The coupling of cloud systems and CPSes, though advantageous, is subject to new forms of risks that have not been considered adequately in the traditional computing domain. CPSes often collect sensitive and private information about the physical environment. A loss of security for a CPS can therefore have significant negative impact including loss of privacy, potential physical harm, discrimination, and abuse. Though numerous security primitives have been developed in the cyber domain to address the very same problems, their applicability to the Cloud-CPSes domain is still questionable due to the reason that they are usually complex to implement and oblivious to cyber-physical interactions. The goal of this special issue is to unveil and address the security and privacy aspects associated to the Cloud-CPeSs. Suggested topics include, but are not limited to the following. * Secure data sharing in Cloud-CPSes * Big data security and privacy in Cloud-CPSes * Secure computation in Cloud-CPSes * Location privacy in Cloud-CPSes * Lightweight block ciphers for low-resource devices in Cloud-CPSes * Searchable encryption in Cloud-CPSes * End to end secure communications in Cloud-CPSes * Access control in Cloud-CPSes * Key management in Cloud-CPSes These topics remark the differences between the classical CPSes and Cloud-CPSes, and particularly when designing security and privacy solutions for specific Cloud-assisted CPSes applied in restricted environments with rigorous performance requirements and criticality in mind. - Important Dates - * Submission deadline: June 30, 2017 * Notification of acceptance: August 31, 2017 * Final manuscript due: October 15, 2017 - Paper Submission Guidelines - All submitted papers to this special issue must be well written in English, and must be original and not be under review in any other journal or conference proceedings. When submitting their papers authors must select “Security in Cloud CPS” as the article type. Submitted papers should be presented according to the journal style. For more detailed information regarding the requirements for submission, please refer to: https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors. Requests for additional information should be addressed to the guest editors. - Guest Editors - Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com Eric Rome, Fraunhofer, erich.r...@iais.fraunhofer.de ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: Twenty-second European Symposium on Research in Computer Security (ESORICS 2017)
ity, Greece Vijay Varadharajan, Macquarie University, Australia Luca Viganò, King's College London, UK Michael Waidner, Fraunhofer SIT & TU Darmstadt, Germany Cong Wang, City University of Hong Kong, China Ben Smyth, Huawei, France Edgar Weippl, SBA Research, Austria Stephen Wolthusen, Royal Holloway university, UK Christos Xenakis, University of Piraeus, Greece Jeff Yan, Lancaster University, UK Meng Yu, University of Texas at San Antonio, USA Ben Zhao, University of California at Santa Barbara, USA Jianying Zhou, Singapore University of Technology and Design, Singapore Jörg Schwenk, Ruhr-Universität, Bochum Publicity Chair * Cristina Alcaraz, University of Malaga, Spain ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: Twenty-second European Symposium on Research in Computer Security (ESORICS 2017)
ity, Greece Vijay Varadharajan, Macquarie University, Australia Luca Viganò, King's College London, UK Michael Waidner, Fraunhofer SIT & TU Darmstadt, Germany Cong Wang, City University of Hong Kong, China Ben Smyth, Huawei, France Edgar Weippl, SBA Research, Austria Stephen Wolthusen, Royal Holloway university, UK Christos Xenakis, University of Piraeus, Greece Jeff Yan, Lancaster University, UK Meng Yu, University of Texas at San Antonio, USA Ben Zhao, University of California at Santa Barbara, USA Jianying Zhou, Singapore University of Technology and Design, Singapore Jörg Schwenk, Ruhr-Universität, Bochum Publicity Chair * Cristina Alcaraz, University of Malaga, Spain ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: Twenty-second European Symposium on Research in Computer Security (ESORICS 2017)
ity, Greece Vijay Varadharajan, Macquarie University, Australia Luca Viganò, King's College London, UK Michael Waidner, Fraunhofer SIT & TU Darmstadt, Germany Cong Wang, City University of Hong Kong, China Ben Smyth, Huawei, France Edgar Weippl, SBA Research, Austria Stephen Wolthusen, Royal Holloway university, UK Christos Xenakis, University of Piraeus, Greece Jeff Yan, Lancaster University, UK Meng Yu, University of Texas at San Antonio, USA Ben Zhao, University of California at Santa Barbara, USA Jianying Zhou, Singapore University of Technology and Design, Singapore Jörg Schwenk, Ruhr-Universität, Bochum Publicity Chair * Cristina Alcaraz, University of Malaga, Spain ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: Twenty-second European Symposium on Research in Computer Security (ESORICS 2017)
ity, Greece Vijay Varadharajan, Macquarie University, Australia Luca Viganò, King's College London, UK Michael Waidner, Fraunhofer SIT & TU Darmstadt, Germany Cong Wang, City University of Hong Kong, China Ben Smyth, Huawei, France Edgar Weippl, SBA Research, Austria Stephen Wolthusen, Royal Holloway university, UK Christos Xenakis, University of Piraeus, Greece Jeff Yan, Lancaster University, UK Meng Yu, University of Texas at San Antonio, USA Ben Zhao, University of California at Santa Barbara, USA Jianying Zhou, Singapore University of Technology and Design, Singapore Jörg Schwenk, Ruhr-Universität, Bochum Publicity Chair * Cristina Alcaraz, University of Malaga, Spain ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] The International Conference on Critical Information Infrastructures Security (CRITIS 2017)
Dear CRITIS Community and CI(I)P Community in general, The International Conference on Critical Information Infrastructures Security (CRITIS 2017) reaches its 12th anniversary this year. After several successful editions in the past, CRITIS continues the tradition of presenting innovative research and exploring new challenges in the field of critical (information) infrastructures protection (C(I)IP) and fostering the dialogue with stakeholders. The event will take place in Lucca from Oct 9th to 11th with the following thematic sessions: CS Cyber Security HF Human Factors TR Transport EM Emergency Management UR Urban Resilience IS Trust and Information Sharing Together with CRITIS, and in the line with the tradition, Satellite Workshops with take place just after the main conference, from Oct 12th to 13th. Moreover, apart from the traditional sessions where original works and significant improvements will be presented, there will be other sessions devoted to Ongoing Projects and Operators. Given this, we invite to participate in where the event will serve to meet and exchange ideas and concerns with experts in the field. For any other information of the event, do not hesitate to check the official website at: http://www.critis2017.org Looking forward to seeing you at CRITIS 2017! Yours sincerely, Programme Chairs ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce