posted by organizer: hyoungshick || 1574 views || tracked by 3 users: [display]

ICSSA 2015 : International Conference on Software Security and Assurance


When Jun 16, 2015 - Jul 31, 2015
Where Suwon, Korea
Submission Deadline Jul 6, 2015
Final Version Due Jul 27, 2015
Categories    security   software

Call For Papers

ICSSA 2015

The 1st International Conference on Software Security and Assurance

JULY 27, 2015
Sungkyunkwan University, Korea

Software security is about building secure software and is getting significantly more attention from the computer security community.

Although many attempts have been made to improve software security over the years, traditional software security research has focused on a few tools and techniques (e.g, for static analysis). We believe that the scope of software security and assurance is much wider than those research areas.

Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of software security and assurance and explore other facets of software security and assurance, which have not been as thoroughly studied.

This conference will be technically sponsored by IEEE Computer Society.


Secure software design/architecture
Secure software practices
Security requirements engineering
Security analysis tools and methods
Security evaluation criteria and methodology
Security education and training
Vulnerability, threat, and risk analysis
Malware detection/intrusion detection
Obfuscation and software security
Usability of secure software
Security awareness for software developers

Submission Deadline July 04, 2015
Conference July 27, 2015

Jungwoo Ryoo (Pennsylvania State University, USA)
Hyoungshick Kim (Sungkyunkwan University, Korea)

Rakesh Bobba (Oregon State University)
Jiageng Chen (JAIST, Japan)
Hyunseung Choo (Sungkyunkwan University, Korea)
Ji Won Yoon (Korea University, Korea)
Jun Ho Huh (Honeywell Labs, USA)
Dae-Kyoo Kim (Oakland University, USA)
Dong-Seong Kim (University of Canterbury, New Zealand)
Suntae Kim (Chonbuk National University, Korea)
Phil Laplante (Penn State University, USA)
Aziz Mohaisen (Verisign Labs, USA)
Younghee Park (San Jose State University, USA)
Eunjee Song (Baylor University, USA)
Jaeseung Song (Sejong University, Korea)
Simon Tjoa (St. Pölten University of Applied Sciences, Austria)
Qian Wang (Wuhan University, China)


Prepare for a full paper of from 4 pages to 6 pages (Conference Publishing Services (CPS) Proceedings Manuscripts style: two columns, single-spaced), including figures and references, using 10 fonts, and number each page. You can confirm the Conference Publishing Services (CPS) Proceedings Author Guidelines at the following web page:

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition. All papers will be reviewed by at least three members of the program committee.

Submit it to ICSSA 2015 in EDAS after registering your paper into EDAS.
* EDAS Submission:

Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance. The proceeding will be submitted for publication by Conference Publishing Services (CPS) with 4 ~ 6 pages for each paper. Conference proceedings were published in IEEE Xplore.

Authors of accepted paper(s), or at least one of them, are requested to register and present their work at the conference, otherwise their paper(s) will be removed from the digital library after the conference.

This conference is technically Co-Sponsored by the IEEE Computer Society.

Related Resources

ICSSA 2016   International Conference on Software Security and Assurance
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
ICCSN 2017   9th IEEE International Conference on Communication Software and Networks (ICCSN 2017)-JA, Ei and IEEE Xplore
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
S4CIP 2017   2nd International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
BioSTAR 2017   Workshop on Bio-inspired Security, Trust, Assurance and Resilience
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
ISSTA 2017   International Symposium on Software Testing and Analysis
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine