SVCC 2020 : Silicon Valley Cybersecurity Conference 2020
Call For Papers
The annual Silicon Valley Cybersecurity Conference (SVCC) focuses on research in dependability, reliability, and security to address cyber-attacks, vulnerabilities, faults, and errors in networks and systems. This conference is a forum to present research in robustness and resilience in a wide spectrum of computing systems and networks. All aspects of the research and practice of applied security are within the scope of this conference. Relevant topics include innovative system design, protocols, and algorithms for detecting and responding to malicious threats in dependable and secure systems and networks including experimentation and assessment.
Topics of Interest are in the security of hardware, software, networks, clouds, cyber-physical systems, socio-technical systems, blockchain, and healthcare with multiple tracks for each.
Authors are invited to submit original papers on the current areas of emphasis, but not limited to:
Network Security Track:
- ML/DL techniques for Internet-of-Things, wireless networks, and open networking
- Software-defined networking and network function virtualization
- Edge-computing security and privacy
- Attack detection and prevention
- Anonymous communications
- Cryptography for network security
- Identity management
- Firewall technologies
- Formal trust models and security modeling
- Mobile and wireless network security
- Internet-of-Things security and privacy
Blockchain Security Track
- Distributed Ledger Technologies (DLT)
- Security and privacy in decentralized applications (dAPPs)/DLT/Blockchain
- Comparing proof-of-work vs. proof-of-stake blockchains
- Attacks on blockchains: double-spending, selfish mining, re-entrance attack
- Blockchain Theory and algorithm
- Smart Contract Theory
- Consensus protocols for dApps
- Infrastructures for dApps
- Communication protocols and standards for dApps
- Decentralized Identity
- Identity Management for dApps
System and Hardware Security Track:
- Security primitives in system architecture and systems
- Side-channel attacks and mitigation
- Smartphones and smart devices
- Firmware security in Internet-of-things
- Cyberattacks in systems
- Trusted execution environments
- Anti-counterfeit, anti-tamper
- SoC platform security
- Reconfigurable fabric security
Software Security Track:
- Secure software design/architecture
- Secure software practices
- Security requirements engineering
- Security analysis tools and methods
- Security evaluation criteria and methodology
- Security education and training
- Vulnerability, threat, and risk analysis
- Malware detection/intrusion detection
- Obfuscation and software security
- Usability of secure/security software
- Security awareness for software developers
* November. 21, 2020 at Midnight (PDT): Paper submission deadline (Hard Deadline due to the tight schedule. We encourage you to submit your paper in advance. We will review your paper immediately.)
* December 5, 2020: Author notification
The conference solicits research papers describing novel and previously unpublished scientific contributions to the field of cybersecurity in diverse areas. The authors need to submit your original paper to EasyChair.
Two different types of papers can be submitted:
* Regular papers (7-8 pages IEEE double-column conference proceeding
* Short papers (4-5 pages IEEE double-column conference proceeding format)
Regular papers should describe novel and previously unpublished scientific contributions to the field of cybersecurity. Each regular paper is limited to 7-8 pages, including tables, figures, and references.
Short papers aim at presenting novel work in progress, novel applications, and novel industry perspective. Each short paper is limited to 4-5pages, including tables, figures, and references. Short papers will also be peer-reviewed, however, they will be evaluated with a focus on the potential for establishing new ideas and for sparking the interest of participants.
All papers must be written in English. Authors can purchase extra pages up to 2 pages. Manuscripts must include a title, an abstract with 200-250 words, and a list of 4-6 keywords. All papers must be prepared in the IEEE double-column proceedings format. SVCSI 2020 uses a double-blind review policy. Authors are required to remove their names, affiliation(s), and other identifying information from the header of the manuscript. This also includes meta-data in the submitted document as well as acknowledgment sections. Papers that do not meet these anonymization requirements
may be rejected without further review.
Authors are encouraged, but not required, to cite their previous work in a neutral manner, for example, avoid “in our previous work ” and instead use “as shown in ”.
All submitted papers will be peer-reviewed. The name(s) of the author(s) will not be visible to the reviewers of a paper. The name(s) of the author(s) will be visible in the submission system to the Program Committee Chairs. The authors should report any conflict of interest with the list of Program Committee members during the submission of the manuscript, in which case the Program Committee Chairs will exclude the corresponding PC member(s) from reviewing the paper.
All accepted full papers will be published by an open article system and special issues with the current following journals. We will add more special issues soon. If the journal reviewers are satisfied with the revisions made to address the weaknesses identified during the initial review process at this conference, this category of papers will be
published in the special issue. Special issue “Building Trustworthy and dependable Infrastructure for in Internet of Things” in Journal of MDPI Sensor (impact factor: 3.275)
All the accepted original papers as for preprint will be available through our SVCSI website as a digital book with an ISBN number. We can also invite accepted short papers if the authors can extend their manuscripts to be suitable for the special issue through a full review process. We will ask the authors to improve their accepted papers within two and a half months after finishing the conference.
Each accepted paper for this conference is required to be registered by one of its authors, and at least one author is required to attend and present the paper for 25 minutes including Q&A online at the conference for the paper to be included in the final technical program and the Digital Library. Journal publications require extra publication fees according to the journal publisher policy.
Divyesh Jadav, IBM Research
Younghee Park, San Jose State University