posted by organizer: georg987 || 10205 views || tracked by 12 users: [display]

MalIoT 2017 : International Workshop on Malicious Software and Hardware in the Internet of Things

FacebookTwitterLinkedInGoogle

Link: http://mal-iot2017.alari.ch/index.html
 
When May 14, 2017 - May 15, 2017
Where Siena, Italy
Submission Deadline Feb 10, 2017
Notification Due Mar 17, 2017
Final Version Due Mar 25, 2017
Categories    security   cyber security   embedded systems   network security
 

Call For Papers

MAL-IoT17
Malicious Software and Hardware in the Internet of Things
Co-located with ACM International Conference on Computing Frontiers 2017
Siena, Italy, 15 May 2017

Aim and Scope:
Cyber-physical and smart embedded systems, already highly networked, will be even more connected in the near future to form the Internet of Things, handling large amount of private and safety critical data. The pervasive diffusion of these devices will create several threats to privacy and could open new possibilities for attackers, since the security of even large portions of the Internet of Things could be harmed by compromising a reduced number of components. The possibility of securely updating devices should be guaranteed and it should be possible to verify and assert the root of trust of components. With respect to this context we expect contributions in different areas of security in the Internet of Things. Topics of the workshop include but are not limited to:

• Malicious firmware design and detection
• Malware in Internet of Things applications
• Hardware root of trust
• Privacy issues of smart-home systems and complex systems
• Hardware Trojans and their effects on systems
• Hardware authentication and IP protection
• Secure communication and key management
• Implementation attacks and countermeasures
• Emerging threats and attack vectors in the Internet of Things
• Supply chain security

Prospective authors are invited to submit novel contributions, work in progresses, and positional papers (4 to 6 pages for regular papers, 2 pages for extended abstracts, double-column ACM SIG alternate style). Submissions must be anonymous with no author names, affiliations, acknowledgments, or obvious references. Computing Frontiers 2017 has obtained the technical sponsorship of the ACM Association for Computing Machinery. All the papers will be published on the ACM Digital Library. At least one author of an accepted paper is required to register for the whole Computing Frontieers 2017 conference.

Workshop Organizers
Georg T. Becker, Digital Society Institute, ESMT Berlin, Germany, email: georg.becker@esmt.org
Francesco Regazzoni, ALaRI – USI, Switzerland, email: regazzoni@alari.ch

More details about MAL-IOT16 and submission instructions can be found at: http://mal-iot2017.alari.ch/
General information about CF17 are available at: http://www.computingfrontiers.org/2017/

**********************************IMPORTANT DATES********************************
Submission of full papers: February 10, 2017
Notification of acceptance/rejection: March 11, 2017
Submission of camera-ready papers and registration: March 26, 2017
**********************************************************************************

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ADON 2018   International Workshop on Anomaly Detection ON the Cloud and the Internet of Things
SECITC 2018   11th International Conference on Security for Information Technology and Communications
Special Issue A&DC IoT 2018   SENSORS (Q1) Special Issue: Algorithm and Distributed Computing for the Internet of Things
NECO 2018   7th International Conference of Networks and Communications
RaFEC_IoT 2019   Special Issue: Recent Advances in Fog/Edge Computing in Internet of Things (MDPI Sensors)
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
WF-IoT 2019   IEEE 5th World Forum on Internet of Things
CyberHunt - 2018   International Workshop on Big Data Analytics for Cyber Threat Hunting
IoTBDS 2019   3rd International Conference on Internet of Things, Big Data and Security