posted by organizer: andrea_fornaia || 2729 views || tracked by 4 users: [display]

VSC @IEEE WETICE 2020 : Track on Validating Software for Critical Systems (VSC) @IEEE WETICE 2020

FacebookTwitterLinkedInGoogle

Link: http://www.cs.unict.it/~fornaia/vsc/
 
When Sep 24, 2020 - Sep 24, 2020
Where virtual conference
Submission Deadline Jul 22, 2020
Notification Due Aug 15, 2020
Final Version Due Sep 10, 2020
Categories    software testing   static analysis   formal verification   security & privacy
 

Call For Papers

==========================================================
CALL FOR PAPERS : VSC @ IEEE WETICE 2020
==========================================================
Track on Validating Software for Critical Systems
http://www.cs.unict.it/~fornaia/vsc/

Conference Track @ 29th IEEE WETICE 2020
==========================================================

Important Announcement
===================

The safety and well-being of all conference participants is our priority. After studying and evaluating the announcements, guidance, and news released by relevant national departments, we announce that 2020 edition of WETICE will be maintained as virtual conference.

Important Dates
============

First-round submission:
- Submission deadline: ​(EXTENDED) March 22, 2020
- Notification of acceptance:​ April 25, 2020
- Camera ready papers:​ May 15, 2020

Second-round submission:
- Submission deadline: ​(EXTENDED) July 22, 2020
- Notification of acceptance:​ August 15, 2020
- Camera ready papers:​ September 10, 2020

Objectives
========

VSC track brings the opportunity for researchers and developers from industry and the
academic world to report the state of the art and exchange ideas on correctness,
confidentiality, security, privacy and reliability of software technologies. The idea is
to foster research and development for the advanced support needed to enhance the
level of quality and of user trust on services holding personal data and involving
collaboration with unknown remote parties.

Nowadays, the widespread use of smart devices, such as smart cards, watches, phones,
and tablets, connected by the ubiquitous public Internet network, enables us to easily
access a vast range of useful services. Distributed technologies such as blockchains have
emerged to foster collaboration and data preservation. In this context, applications that
hold or exchange sensitive user data, like personal details, security pin-codes, or
biometric data, need special protection against software failures or malicious behaviour
of downloaded code, that may expose the user to highly undesired consequences, such
as threats to confidentiality and even financial or health danger.

New and specially designed techniques can be devised and applied in order to reach the
goal of increasing the trust on such a distributed computing environment to a level of
strength matching with the high strength of the above safety critical requirements.


Topics Covered
============

Submission is encouraged, but not limited, to the following topics:

- Verification techniques
- Novel testing and validation algorithms
- Dependability assessment techniques
- Model-based validation and testing techniques for security and privacy
- Analysis of threats and countermeasures to the security of smart devices
- Blockchain analysis tailored to security and privacy
- Static and run-time techniques for byte-code verification and validation
- Validation testing of safety critical technologies
- Validation of large-scale distributed applications
- Software testing in multi-core environments
- Risk-based approaches to software validation
- Assessing security and robustness of applications
- Software architectures for securing software on collaboration devices
- Static code analysis tailored to security and privacy for iOS and Android
- Performance analysis of security-related features
- Performance and QoS testing
- Testing and analysis tools
- Security and Privacy in Cyber-Physical Systems
- Cyber Insurance


Chairs
=====

Andrea CALVAGNA, Università degli Studi di Catania, Italy
Andrea FORNAIA, Università degli Studi di Catania, Italy
Emiliano TRAMONTANA, Università degli Studi di Catania, Italy


Paper Submission
==============

Papers up to six double-column pages (including figures, tables and
references) should contain original contributions not published
or submitted elsewhere and are to be formatted according to the IEEE template.
Each paper will be reviewed by at least three reviewers for ensuring
high quality.

Authors must upload their paper as PDF file using the EasyChair submission system:
https://www.easychair.org/conferences/?conf=wetice2020

Accepted papers will be published in the conference proceedings, and will be published
by the IEEE Computer Society Press, indexed by Scopus, Google Scholar, etc.

Authors of high quality papers will be invited to submit their work for a special
issue of a journal to be selected.

==========================================================

Related Resources

ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ACM ICSCA 2025   ACM--2025 14th International Conference on Software and Computer Applications (ICSCA 2025)
SOMET 2025   24th International Conference on Intelligent Software Methodologies Tools and Techniques
ACITY 2024   14th International Conference on Advances in Computing and Information Technology
IEA/AIE 2025   The 37th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems
SOFEA 2024   10th International Conference on Software Engineering and Applications
ACIE 2024   CPS--2024 4th Asia Conference on Information Engineering (ACIE 2024)
CBIoT 2024   5th International Conference on Cloud, Big Data and IoT
Critical Thinking and the Middle Ages 2025   'Doctor Virtualis. Journal of History of Medieval Philosophy' n. 20 - Critical Thinking and the Middle Ages