![]() |
| |||||||||||||||
WISTP 2013 : Seventh Workshop in Information Security Theory and PracticeConference Series : Workshop in Information Security Theory and Practice | |||||||||||||||
Link: http://www.wistp.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
.:: Call for Papers ::.
======================= Seventh Workshop in Information Security Theory and Practice (WISTP 2013) "Security of Mobile and Cyber-physical Systems" May 28-30, 2013, Heraklion, Greece---www.wistp.org WISTP 2013 Background and Goals ------------------------------- Current developments in IT are characterized by an increasing use of personal mobile devices and an increasing reliance on IT for supporting industrial applications in the physical world. A new persepctive on socio-technical and cyber-physical systems is required that sees in IT more than just an infrastructure but focuses on the ever closer integration between social and technical processes as well. Application markets, such as Google Play and Apple App Store drive a mobile ecosystem, offering new business models with high turnovers and new opportunities, which however, also attract cybercriminals and raise new privacy concerns. In the area of cyber-physical systems, research has to go beyond securing the IT infrastructure and to consider attacks launched by combining manipulations in physical space and cyber space. The workshop seeks submissions from academia and industry presenting novel research on all aspects of security and privacy of mobile devices, such as Android and iOS platforms, as well as studies on securing cyber-physical systems. Topics of interest include, but are not limited to: * Vulnerability detection * Application security * Usability * Privacy * Mobile malware * Mobile OSes security analysis * Cloud-enhanced mobile security * BYOD contexts * Securing systems controlling industrial processes Important Dates --------------- Submission deadline: Jan 31, 2013 Notification of authors: Mar 15, 2013 Camera ready copies due: Mar 25, 2013 Workshop dates: May, 28-30 2013 Submission Instructions ----------------------- Submissions must describe original and previously unpublished research. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 16 pages in total in the Springer's LNCS format (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). All submissions should be anonymous (i.e., no author names/affiliations and obvious citations). Submissions are to be made to the submission web site (http://www.wistp.org/submission-details/). Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series (http://www.springeronline.com/lncs), and the proceedings will be available at the workshop. The camera-ready version of the accepted papers must follow Springer guidelines (a LaTeX source file will be required). If a submitted paper is mainly the work of a student author, this paper is eligible for the best student paper award. To participate in this selection process, please add the word "STUDENT" in the affiliation field in the submission form. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each accepted paper is required to register with the workshop and present the paper. For authors presenting multiple papers, one normal registration is valid for up to two papers. Organizing Committees -------------------- General Chairs ~~~~~~~~~~~~~~ * Ioannis G. Askoxylakis. FORTH-ICS, Greece * Louis Marinos, ENISA, EU Local Organizers ~~~~~~~~~~~~~~~~ * Nikolaos Petroulakis, FORTH-ICS, Greece Workshop, Panel, Tutorial Chair ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ * Damien Sauveron, XLIM, University of Limoges, France Publicity Chairs ~~~~~~~~~~~~~~~~ * Mauro Conti, University of Padua, Italy Program co-Chair ~~~~~~~~~~~~~~~~ * Lorenzo Cavallaro, Royal Holloway University of London, UK * Dieter Gollmann, Hamburg University of Technology, Germany Program Committee ~~~~~~~~~~~~~~~~~ * Claudio Ardagna, Universita` degli Studi di Milano, Italy * Ioannis G. Askoxylakis. FORTH-ICS, Greece * Lejla Batina, Radboud University Nijmegen, The Netherlands * Danilo Bruschi, University degli Studi di Milano, Italy * Mauro Conti, University of Padua, Italy * Marco Cova, University of Birmingham, UK * Manuel Egele, Carnegie Mellon University, USA * Jaap-Henk Hoepman, Radboud University Nijmegen, The Netherlands * Andrea Lanzi, Insitut Eurecom, France * Corrado Leita, Symantec Research Europe, EU * Federico Maggi, Politecnico di Milano, Italy * Evangelos Markatos, FORTH-ICS, Greece * Lorenzo Martignoni, Google Inc., Switzerland * Sjouke Mauw, University of Luxembourg, Luxembourg * Igor Muttik, McAfee Labs, UK * Flemming Nielson, Danish Technical University, Danmark * Wolter Pieters, TU Delft, The Netherlands * Christina Pöpper, ETH Zürich, Switzerland * Joachim Posegga, Institute of IT-Security and Security Law, Germany * Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium * William Robertson, Northeastern University, USA * Pierangela Samarati, Universita` degli Studi di Milano, Italy * Asia Slowinska, Vrije Universiteit Amsterdam, The Netherlands * Stefano Zanero, Politecnico di Milan, Italy * Jianying Zhou, Institute for Infocomm Research, Singapore TBC Steering Committee ~~~~~~~~~~~~~~~~~~ * Ioannis G. Askoxylakis. FORTH-ICS, Greece * Angelos Bilas, FORTH-ICS & University of Crete, Greece * Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK * Joachim Posegga, Institute of IT-Security and Security Law, Germany * Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium * Damien Sauveron, XLIM, University of Limoges, France |
|