posted by organizer: joeri || 1388 views || tracked by 2 users: [display]

SPIDA 2018 : Workshop on Security Protocol Implementations: Development and Analysis

FacebookTwitterLinkedInGoogle

Link: https://spida.cs.ru.nl
 
When Apr 23, 2018 - Apr 23, 2018
Where London, United Kongdom
Abstract Registration Due Jan 8, 2018
Submission Deadline Jan 12, 2018
Notification Due Feb 5, 2018
Final Version Due Feb 23, 2018
Categories    security   security protocols
 

Call For Papers

Workshop on Security Protocol Implementations: Development and Analysis (SPIDA)
23 April 2018 - London, United Kingdom
https://spida.cs.ru.nl
co-located to IEEE EuroS&P 2018 - https://www.ieee-security.org/TC/EuroSP2018/

CALL FOR PAPERS

Security protocols (such as TLS for internet, WPA2 for WiFi, GSM for mobile telephony, to mention just some of the broadly used ones) play a crucial role in protecting the digital communications and interactions we rely on in our modern society. The security of such protocols can break because of fundamental, inherent flaws, but the bulk of the security flaws are due to implementation flaws. The complexity and unclarity of typical protocol specifications makes it more likely to introduce such flaws and makes it harder to spot them. SPIDA seeks novel contributions and case studies that address the challenges when implementing security protocols. How can implementations be analysed, statically or dynamically, in a systematic way? How can we make sure that the specifications are precise, but still easy to understand and implement correctly? And how to assure implementations faithfully follow such specifications?

The workshop seeks submissions from academia and industry presenting novel research results to tackle this issue. Relevant topics include, but are not limited to:
- Formal verification of code
- Software engineering approaches to go from specifications to implementations
- Protocol reverse engineering
- LangSec approaches to security protocols
- Fuzzing techniques, e.g. evolutionary or white-box fuzzing
- State machine inference
- Symbolic execution
- Model-based testing of protocol implementations
- Methods and languages to write rigorous protocol specifications

Papers should be submitted through the submission web site at https://easychair.org/conferences/?conf=spida18. Each accepted paper must be presented by an author, who will have to be registered by the early-bird registration deadline. The workshop will accept regular submissions (at most 10 pages in the IEEE double-column format, including bibliography), as well as short submissions of up to 4 pages for results that are preliminary and/or work in progress. Authors must submit an extended abstract prior to the paper submission.

Important dates:
- Abstract deadline: 8 January 2018
- Paper deadline: 12 January 2018
- Notification: 5 February 2018
- Camera-ready submission: 23 February 2018
- Workshop: 23 April 2018

Organising committee:
- Mathy Vanhoef, KU Leuven, Belgium
- Joeri de Ruiter, Radboud University, The Netherlands

Related Resources

ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IEEE Mobile Cloud 2019   The Seventh IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
SIGIR 2019   International ACM SIGIR Conference on Research and Development in Information Retrieval
ECCWS 2019   18th European Conference on Cyber Warfare and Security
ACNS 2019   International Conference on Applied Cryptography and Network Security
IJCSA 2018   International Journal on Computational Science & Applications
ICSD 2019   7th International Conference on Sustainable Development,4 - 5 September ICSD 2019
CCSEIT 2019   9th International Conference on Computer Science, Engineering and Information Technology
CAIP 2019   Computer Analysis of Images and Patterns