posted by organizer: hyoungshick || 4082 views || tracked by 3 users: [display]

ICSSA 2015 : International Conference on Software Security and Assurance


When Jun 16, 2015 - Jul 31, 2015
Where Suwon, Korea
Submission Deadline Jul 6, 2015
Final Version Due Jul 27, 2015
Categories    security   software

Call For Papers

ICSSA 2015

The 1st International Conference on Software Security and Assurance

JULY 27, 2015
Sungkyunkwan University, Korea

Software security is about building secure software and is getting significantly more attention from the computer security community.

Although many attempts have been made to improve software security over the years, traditional software security research has focused on a few tools and techniques (e.g, for static analysis). We believe that the scope of software security and assurance is much wider than those research areas.

Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of software security and assurance and explore other facets of software security and assurance, which have not been as thoroughly studied.

This conference will be technically sponsored by IEEE Computer Society.


Secure software design/architecture
Secure software practices
Security requirements engineering
Security analysis tools and methods
Security evaluation criteria and methodology
Security education and training
Vulnerability, threat, and risk analysis
Malware detection/intrusion detection
Obfuscation and software security
Usability of secure software
Security awareness for software developers

Submission Deadline July 04, 2015
Conference July 27, 2015

Jungwoo Ryoo (Pennsylvania State University, USA)
Hyoungshick Kim (Sungkyunkwan University, Korea)

Rakesh Bobba (Oregon State University)
Jiageng Chen (JAIST, Japan)
Hyunseung Choo (Sungkyunkwan University, Korea)
Ji Won Yoon (Korea University, Korea)
Jun Ho Huh (Honeywell Labs, USA)
Dae-Kyoo Kim (Oakland University, USA)
Dong-Seong Kim (University of Canterbury, New Zealand)
Suntae Kim (Chonbuk National University, Korea)
Phil Laplante (Penn State University, USA)
Aziz Mohaisen (Verisign Labs, USA)
Younghee Park (San Jose State University, USA)
Eunjee Song (Baylor University, USA)
Jaeseung Song (Sejong University, Korea)
Simon Tjoa (St. Pölten University of Applied Sciences, Austria)
Qian Wang (Wuhan University, China)


Prepare for a full paper of from 4 pages to 6 pages (Conference Publishing Services (CPS) Proceedings Manuscripts style: two columns, single-spaced), including figures and references, using 10 fonts, and number each page. You can confirm the Conference Publishing Services (CPS) Proceedings Author Guidelines at the following web page:

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition. All papers will be reviewed by at least three members of the program committee.

Submit it to ICSSA 2015 in EDAS after registering your paper into EDAS.
* EDAS Submission:

Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance. The proceeding will be submitted for publication by Conference Publishing Services (CPS) with 4 ~ 6 pages for each paper. Conference proceedings were published in IEEE Xplore.

Authors of accepted paper(s), or at least one of them, are requested to register and present their work at the conference, otherwise their paper(s) will be removed from the digital library after the conference.

This conference is technically Co-Sponsored by the IEEE Computer Society.

Related Resources

ICSSA 2018   4th International Conference on Software Security and Assurance
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
SECITC 2018   11th International Conference on Security for Information Technology and Communications
ACNS 2019   International Conference on Applied Cryptography and Network Security
DSN 2019   Dependable Systems and Networks
NECO 2018   7th International Conference of Networks and Communications
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
IJAB 2018   International Journal of Advances in Biology
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems