posted by system || 7065 views || tracked by 9 users: [display]

WISTP 2013 : Seventh Workshop in Information Security Theory and Practice

FacebookTwitterLinkedInGoogle


Conference Series : Workshop in Information Security Theory and Practice
 
Link: http://www.wistp.org
 
When May 28, 2013 - May 30, 2013
Where Heraklion, Greece
Submission Deadline Jan 31, 2013
Notification Due Mar 15, 2013
Final Version Due Mar 25, 2013
Categories    security   computer security   information security   network security
 

Call For Papers

.:: Call for Papers ::.
=======================

Seventh Workshop in Information Security Theory and Practice (WISTP 2013)
"Security of Mobile and Cyber-physical Systems"
May 28-30, 2013, Heraklion, Greece---www.wistp.org

WISTP 2013 Background and Goals
-------------------------------

Current developments in IT are characterized by an increasing use of personal
mobile devices and an increasing reliance on IT for supporting industrial
applications in the physical world. A new persepctive on socio-technical and
cyber-physical systems is required that sees in IT more than just an
infrastructure but focuses on the ever closer integration between social and
technical processes as well.

Application markets, such as Google Play and Apple App Store drive a mobile
ecosystem, offering new business models with high turnovers and new
opportunities, which however, also attract cybercriminals and raise new privacy
concerns.

In the area of cyber-physical systems, research has to go beyond securing the IT
infrastructure and to consider attacks launched by combining manipulations in
physical space and cyber space.

The workshop seeks submissions from academia and industry presenting novel
research on all aspects of security and privacy of mobile devices, such as
Android and iOS platforms, as well as studies on securing cyber-physical
systems. Topics of interest include, but are not limited to:

* Vulnerability detection
* Application security
* Usability
* Privacy
* Mobile malware
* Mobile OSes security analysis
* Cloud-enhanced mobile security
* BYOD contexts
* Securing systems controlling industrial processes

Important Dates
---------------

Submission deadline: Jan 31, 2013
Notification of authors: Mar 15, 2013
Camera ready copies due: Mar 25, 2013
Workshop dates: May, 28-30 2013

Submission Instructions
-----------------------

Submissions must describe original and previously unpublished research.
Submissions must not substantially overlap with papers that have been published
or that are simultaneously submitted to a journal or conference/workshop with
proceedings. Each submission should be at most 16 pages in total in the
Springer's LNCS format
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). All submissions
should be anonymous (i.e., no author names/affiliations and obvious citations).
Submissions are to be made to the submission web site
(http://www.wistp.org/submission-details/).

Only PDF files will be accepted. Submissions not meeting these guidelines risk
rejection without consideration of their merits. Accepted papers will be
published by Springer in the Lecture Notes in Computer Science series
(http://www.springeronline.com/lncs), and the proceedings will be available at
the workshop. The camera-ready version of the accepted papers must follow
Springer guidelines (a LaTeX source file will be required).

If a submitted paper is mainly the work of a student author, this paper is
eligible for the best student paper award. To participate in this selection
process, please add the word "STUDENT" in the affiliation field in the
submission form.

Authors of accepted papers must guarantee that their papers will be presented at
the workshop. At least one author of each accepted paper is required to register
with the workshop and present the paper. For authors presenting multiple papers,
one normal registration is valid for up to two papers.

Organizing Committees
--------------------

General Chairs
~~~~~~~~~~~~~~

* Ioannis G. Askoxylakis. FORTH-ICS, Greece
* Louis Marinos, ENISA, EU

Local Organizers
~~~~~~~~~~~~~~~~

* Nikolaos Petroulakis, FORTH-ICS, Greece

Workshop, Panel, Tutorial Chair
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
~~~~~~~~~~~~~~~~

* Mauro Conti, University of Padua, Italy

Program co-Chair
~~~~~~~~~~~~~~~~

* Lorenzo Cavallaro, Royal Holloway University of London, UK
* Dieter Gollmann, Hamburg University of Technology, Germany

Program Committee
~~~~~~~~~~~~~~~~~

* Claudio Ardagna, Universita` degli Studi di Milano, Italy
* Ioannis G. Askoxylakis. FORTH-ICS, Greece
* Lejla Batina, Radboud University Nijmegen, The Netherlands
* Danilo Bruschi, University degli Studi di Milano, Italy
* Mauro Conti, University of Padua, Italy
* Marco Cova, University of Birmingham, UK
* Manuel Egele, Carnegie Mellon University, USA
* Jaap-Henk Hoepman, Radboud University Nijmegen, The Netherlands
* Andrea Lanzi, Insitut Eurecom, France
* Corrado Leita, Symantec Research Europe, EU
* Federico Maggi, Politecnico di Milano, Italy
* Evangelos Markatos, FORTH-ICS, Greece
* Lorenzo Martignoni, Google Inc., Switzerland
* Sjouke Mauw, University of Luxembourg, Luxembourg
* Igor Muttik, McAfee Labs, UK
* Flemming Nielson, Danish Technical University, Danmark
* Wolter Pieters, TU Delft, The Netherlands
* Christina Pöpper, ETH Zürich, Switzerland
* Joachim Posegga, Institute of IT-Security and Security Law, Germany
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* William Robertson, Northeastern University, USA
* Pierangela Samarati, Universita` degli Studi di Milano, Italy
* Asia Slowinska, Vrije Universiteit Amsterdam, The Netherlands
* Stefano Zanero, Politecnico di Milan, Italy
* Jianying Zhou, Institute for Infocomm Research, Singapore
TBC

Steering Committee
~~~~~~~~~~~~~~~~~~

* Ioannis G. Askoxylakis. FORTH-ICS, Greece
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Joachim Posegga, Institute of IT-Security and Security Law, Germany
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France

Related Resources

WISTP 2019   13th WISTP International Conference on Information Security Theory and Practice
SP 2020   IEEE Symposium on Security and Privacy
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
ICSFrontiers 2020   2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)
ICCSEA 2019   9th International Conference on Computer Science, Engineering and Applications
ISD 2020   29th International Conference on Information Systems Development
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
FGCS-ETDNS 2020   Future Generation Computer Systems SI on Emerging Topics in Defending Networked Systems
PSBP 2020   Special track on Privacy and Security in Business Processes along with The Tenth International Conference on Business Intelligence and Technology