posted by organizer: hyoungshick || 3634 views || tracked by 3 users: [display]

ICSSA 2015 : International Conference on Software Security and Assurance


When Jun 16, 2015 - Jul 31, 2015
Where Suwon, Korea
Submission Deadline Jul 6, 2015
Final Version Due Jul 27, 2015
Categories    security   software

Call For Papers

ICSSA 2015

The 1st International Conference on Software Security and Assurance

JULY 27, 2015
Sungkyunkwan University, Korea

Software security is about building secure software and is getting significantly more attention from the computer security community.

Although many attempts have been made to improve software security over the years, traditional software security research has focused on a few tools and techniques (e.g, for static analysis). We believe that the scope of software security and assurance is much wider than those research areas.

Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of software security and assurance and explore other facets of software security and assurance, which have not been as thoroughly studied.

This conference will be technically sponsored by IEEE Computer Society.


Secure software design/architecture
Secure software practices
Security requirements engineering
Security analysis tools and methods
Security evaluation criteria and methodology
Security education and training
Vulnerability, threat, and risk analysis
Malware detection/intrusion detection
Obfuscation and software security
Usability of secure software
Security awareness for software developers

Submission Deadline July 04, 2015
Conference July 27, 2015

Jungwoo Ryoo (Pennsylvania State University, USA)
Hyoungshick Kim (Sungkyunkwan University, Korea)

Rakesh Bobba (Oregon State University)
Jiageng Chen (JAIST, Japan)
Hyunseung Choo (Sungkyunkwan University, Korea)
Ji Won Yoon (Korea University, Korea)
Jun Ho Huh (Honeywell Labs, USA)
Dae-Kyoo Kim (Oakland University, USA)
Dong-Seong Kim (University of Canterbury, New Zealand)
Suntae Kim (Chonbuk National University, Korea)
Phil Laplante (Penn State University, USA)
Aziz Mohaisen (Verisign Labs, USA)
Younghee Park (San Jose State University, USA)
Eunjee Song (Baylor University, USA)
Jaeseung Song (Sejong University, Korea)
Simon Tjoa (St. Pölten University of Applied Sciences, Austria)
Qian Wang (Wuhan University, China)


Prepare for a full paper of from 4 pages to 6 pages (Conference Publishing Services (CPS) Proceedings Manuscripts style: two columns, single-spaced), including figures and references, using 10 fonts, and number each page. You can confirm the Conference Publishing Services (CPS) Proceedings Author Guidelines at the following web page:

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition. All papers will be reviewed by at least three members of the program committee.

Submit it to ICSSA 2015 in EDAS after registering your paper into EDAS.
* EDAS Submission:

Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance. The proceeding will be submitted for publication by Conference Publishing Services (CPS) with 4 ~ 6 pages for each paper. Conference proceedings were published in IEEE Xplore.

Authors of accepted paper(s), or at least one of them, are requested to register and present their work at the conference, otherwise their paper(s) will be removed from the digital library after the conference.

This conference is technically Co-Sponsored by the IEEE Computer Society.

Related Resources

ICSSA 2017   3rd International Conference on Software Security and Assurance
RAID 2017   20th International Symposium on Research in Attacks, Intrusions and Defenses
SWQD 2018   Software Quality Days 2018
AVSS 2017   14-th IEEE International Conference on Advanced Video and Signal-Based Surveillance
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
STV 2017   11th Workshop on System Testing and Validation
S4CIP 2017   2nd International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
SPURS 2017   Sound and Practical Unanticipated Reuse of Software - Special Issue of Journal of Software: Evolution and Process
ASE 2017   The 32nd IEEE/ACM International Conference on Automated Software Engineering