posted by organizer: snchong || 5729 views || tracked by 11 users: [display]

SecDev 2019 : IEEE Secure Development Conference


When Sep 25, 2019 - Sep 27, 2019
Where McLean, VA
Abstract Registration Due Apr 15, 2019
Submission Deadline Apr 22, 2019
Notification Due Jun 10, 2019
Final Version Due Aug 12, 2019
Categories    security   software engineering   software development   computer science

Call For Papers

# IEEE Secure Development Conference (SecDev) 2019 Call for Papers and Tutorials

*Sponsored by the IEEE Computer Society Technical Committee on Security and Privacy*

*September 25-September 27, 2019 at the Hilton Tysons Corner, McLean, VA, USA*

## Overview
SecDev is a venue for presenting ideas, research, and experience about how to develop secure systems. It focuses on theory, techniques, and tools to "build security in" to existing and new computing systems, and does not focus on simply discovering the absence of security.

The goal of SecDev is to encourage and disseminate ideas for secure system development among academia, industry, and government. It aims to bridge the gap between constructive security research and practice and to enable real-world impact of security research in the long run. Developers have valuable experiences and ideas that can inform academic research, and researchers have concepts, studies, and even code and tools that could benefit developers. Great SecDev contributions could come from attendees of industrial conferences like AppSec and RSA; from attendees of academic conferences like IEEE S&P, IEEE CSF, USENIX Security, CCS, NDSS, PLDI, ICSE, FSE, ISSTA, SOUPS, HOST, and others; and from newcomers.

Examples of topics that are in scope include: development libraries, tools, or processes to produce systems resilient to certain attacks; formal foundations that underpin a language, tool, or testing strategy that improves security; techniques that drastically improve the scalability of security solutions for practical deployment; and experience, designs, or applications showing how to apply cryptographic techniques effectively to secure systems.

We solicit **research papers, position papers, systematization of knowledge papers**, and **"best practice" papers**. All submissions should present novel results, provide novel perspectives and insights, or present new evidence about existing insights or techniques.

SecDev also seeks **hands-on and interactive tutorials** on processes, frameworks, languages, and tools for building security in. The goal is to share knowledge on the art and science of secure systems development.

(SecDev also seeks posters and tool demos, and abstracts from practitioners to share their practical experiences and challenges in security development. Information on these solicitations are available on the SecDev website

Areas of interest include (but are not limited to):

- Security-focused system designs (HW/SW/architecture)
- Tools and methodology for secure code development
- Risk management and testing strategies to improve security
- Security engineering processes, from requirements to maintenance
- Programming languages, development tools, and ecosystems supporting security
- Static program analysis for software security
- Dynamic analysis and runtime approaches for software security
- Automation of programming, deployment, and maintenance tasks for security
- Distributed systems design and implementation for security
- Privacy by design
- Human-centered design for systems security
- Formal verification and other high-assurance methods for security
- Code reviews, red teams, and other human-centered assurance

## Submission Details
The website for submissions is

Submissions must use the two-column IEEE Proceedings style:

Submissions must be one of two categories:

- **Papers**, up to 12 pages, excluding references and well-marked appendices. These must be well-argued and worthy of publication and citation, on the topics above. Research papers must present new work, evidence, or ideas. Position papers with exceptional visions will also be considered. Also welcome are systematization of knowledge papers and "best practice" papers, which should provide an integration and clarification of ideas on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of some aspect of secure development.

Authors of accepted papers will present their work at the conference (likely in a 30-minute slot) and their papers will appear in the conference's formal IEEE proceedings.

To improve the fairness of the reviewing process, SecDev will follow a light-weight **double-blind reviewing** process. Submitted papers must (a) omit any reference to the authors' names or the names of their institutions, and (b) reference the authors' own related work in the third person (e.g., not "We build on our previous work ..." but rather "We build on the work of ..."). Nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more difficult (e.g., important background references should not be omitted or anonymized). Please see the SecDev site for the [answers to many common concerns]( about SecDev's double-blind reviewing process. When in doubt, contact the program chairs.

- **Tutorial proposals**. Tutorials should aim to be either 90 minutes or 180 minutes long. We strongly encourage tutorials to have hands-on components and audience interactions. We do not recommend simply slide presentations. Tutorial proposals should be 2 pages and cover (a) the topic; (b) a summary of the tutorial format highlighting hands-on aspects and possibly pointers to relevant materials; (c) the expected audience and expected learning outcomes; (d) prior tutorials or talks on similar topics by the authors (and audience size), if any. Accepted tutorials may provide an abstract that will appear in the conference's formal IEEE proceedings. Tutorials will occur on the first day of the conference (Wednesday September 25). Note that if an accepted tutorial requires special materials or environments for the hands-on participation, we expect the authors to provide necessary preparation instructions for the attendees.

Tutorial proposals do not need to be anonymized.

At least one author of each accepted paper and tutorial must attend the conference and present the paper/tutorial. In the event of difficulty in obtaining visas for travel, exceptions can be made and will be discussed on a case-by-case basis.

We are devoted to seeking broad representation in the program, and may take this into account when reviewing multiple submissions from the same authors.

If you have any questions, please email

## Important Dates

- Paper and tutorial submission: Monday April 8, 2019 (11:59 PM AoE, UTC-12)
- Paper and tutorial notification: Monday June 10, 2019
- Poster, Tool Demo, and Practitioners' Session Abstract submission: Wednesday July 10, 2019 (11:59 PM AoE, UTC-12)
- Poster, Tool Demo, and Practitioners' Session Abstract notification: Monday July 29, 2019
- Camera-ready versions of Papers and Abstracts: Monday August 12, 2019
- Conference: Wednesday September 25 to Friday September 27, 2019

## Organizers

* Program Chairs
- Stephen Chong (Harvard University)
- Nikhil Swamy (Microsoft Research)
* General Chairs
- Lee W. Lerner (GTRI CIPHER Lab)
- Yousef Iskander (Cisco)
* Program Committee
- Yasemin Acar (Leibniz University Hannover)
- Lennart Beringer (Princeton University)
- Nataliia Bielova (Inria)
- Nathan Dautenhahn (Rice University)
- Dan Geer (IQT)
- Ronghui Gu (Columbia University)
- Michael Hicks (University of Maryland)
- Catalin Hritcu (Inria Paris)
- Trent Jaeger (Penn State University)
- Limin Jia (Carnegie Mellon University)
- Christoph Kern (Google)
- Joe Kiniry (Galois)
- Shriram Krishnamurthi (Brown University)
- Stephen Magill (Galois)
- Morley Mao (University of Michigan)
- Toby Murray (University of Melbourne)
- Daniela Seabra Oliveira (University of Florida)
- Madhusudan Parthasarathy (University of Illinois at Urbana-Champaign)
- Benjamin C. Pierce (University of Pennsylvania)
- Nadia Polikarpova (University of California, San Diego)
- Tamara Rezk (Inria)
- M Angela Sasse (Ruhr University Bochum)
- Patrick Schaumont (Virginia Tech)
- Fred B. Schneider (Cornell University)
- David Tarditi (Microsoft)
- Laurie Williams (North Carolina State University)
- Danfeng (Daphne) Yao (Virginia Tech)

Related Resources

SecDev 2022   IEEE Secure Development Conference
EI-CFAIS 2022   2022 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2022)
IEEE ICA 2022   The 6th IEEE International Conference on Agents
CBW 2023   4th International Conference on Cloud, Big Data and Web Services
IEEE SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
AAMAS 2023   The 22nd International Conference on Autonomous Agents and Multiagent Systems
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
IEEE--ISCMI 2022   IEEE--2022 9th Intl. Conference on Soft Computing & Machine Intelligence (ISCMI 2022)--SCIE
SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
AISO 2022   8th International Conference on Artificial Intelligence and Soft Computing