posted by organizer: sgandurra || 6724 views || tracked by 4 users: [display]

CYSARM 2020 : 2nd Workshop on Cyber-Security Arms Race

FacebookTwitterLinkedInGoogle

Link: https://www.cysarm.org/
 
When Nov 13, 2020 - Nov 13, 2020
Where Orlando, USA
Submission Deadline Jul 3, 2020
Notification Due Aug 8, 2020
Final Version Due Sep 2, 2020
Categories    security   trustworthiness   systems   cryptography
 

Call For Papers

Cybersecurity is a complex ecosystem that is based on several contradicting requirements. For this reason, it is often defined as an arms race between attackers and defenders: for example, when a new security model or algorithm is devised, it could act as a double-edged sword since it might both enhance the security posture of a system and introduce additional vulnerabilities. The goal of CYSARM workshop is to foster collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-offs of cybersecurity and how new security technologies and algorithms might impact the security of existing or future security models.

Topics of interest include but are not limited to:

-Arms races and trade-offs in cyber-security (e.g., attackers vs defenders, security vs privacy, security vs trust, security vs usability, etc.)
-Double-edged sword techniques in cyber-security (e.g., artificial intelligence)
-Impact of quantum computing on cyber-security (not limited to cryptography)
-Intrusion detection and evasion, and counter-evasion (also applied to malware analysis)
-Next-generation trustworthy computing security solutions and attacks (e.g., TPMs, TEEs, SGX, SE), and their impact
-Novel attacks and protection solutions in mobile, IoT and Cloud
-Security analysis of protocols, including use of formal techniques
-Standardization of cyber security and trust techniques
-Validation of cyber-security technologies
-Post-quantum cryptography and advanced cryptographic techniques (e.g., homomorphic encryption, secure multi-party computation and differential privacy)

For more information, please see: https://www.cysarm.org/

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications
CYBER 2026   The Eleventh International Conference on Cyber-Technologies and Cyber-Systems
CCCIoT 2026   7th International Conference on Cloud Computing and IoT
SCSA 2026   Span Cyber Security Arena
ENERGY 2025   3rd International Conference on Energy
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
WAPAIS 2026   5th Workshop on Applications of Artificial Intelligence for Society
MLCL 2026   7th International Conference on Machine learning and Cloud Computing
CAIJ 2025   Computer Applications: An International Journal