Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Past Conferences and Journal Special Issues

Last Modified:01/02/17

Note: Please contact cipher-cfp@ieee-security.org by email if you have any questions..

Contents

 

Past Conferences and Other Announcements - 2016

ICISS 2016 12th International Conference on Information Systems Security, Jaipur, India, December 16-20, 2016. [posted here 4/4/16]
The ICISS Conference held annually, provides a forum for disseminating latest research results in information and systems security. Like previous years, proceedings of the conference will be published as part of the Springer Verlag series of Lecture Notes in Computer Science. Submissions are encouraged from academia, industry and government, addressing theoretical and practical problems in information and systems security and related areas. Topics of interest include but are not limited to:
- Access and Usage Control
- Authentication and Audit
- Cloud Security
- Cyber-physical Systems Security
- Digital Forensics
- Distributed Systems Security
- Identity Management
- Intrusion Tolerance and Recovery
- Language-based Security
- Network Security
- Privacy and Anonymity
- Security and Usability
- Sensor and Ad Hoc Network Security
- Software Security
- Vulnerability Detection and Mitigation
- Application Security
- Biometric Security
- Cryptographic Protocols
- Data Security and Privacy
- Digital Rights Management
- Formal Models in Security
- Intrusion Detection and Prevention
- Key Management
- Malware Analysis and Mitigation
- Operating Systems Security
- Secure Data Streams
- Security Testing
- Smartphone Security
- Usable Security
- Web Security

For more information, please see http://www.iciss.org.in.

SPACE 2016 6th International Conference on Security, Privacy and Applied Cryptography Engineering, Hyderabad, India, December 16-18, 2016. [posted here 3/28/16]
SPACE 2016 is the sixth in this series of conferences which started in 2011. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. SPACE 2016 is being organized by C.R.Rao Advanced Institute of Mathematics, Statistics and Computer Science, Hyderabad-India (AIMSCS). The conference will include invited tutorials and keynote talks from world-renowned experts. The conference will be accompanied by two days of tutorials aiming at Master's and Ph.D. students featuring lectures in the mornings and practical sessions in the afternoon. Original papers are invited on all aspects of security, privacy, and cryptography engineering.

For more information, please see http://www.math.umn.edu/~math-sa-sara0050/space16/.

BigTrust 2016 1st International Workshop on Trust, Security and Privacy for Big Data, Granada, Spain, December 14-16, 2016. [posted here 5/16/16]
Big Data has the potential for enabling new insights to change science, engineering, medicine, healthcare, finance, business, and ultimately society itself. Current work on Big Data focuses on information processing such as data mining and analysis. However, trust, security and privacy of Big Data are vital concerns that have received less research focus. Regarding the above context, this workshop proposal is aimed at bringing together people from both academia and industry to present their most recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in order to identify emerging research topics and define the future of Big Data. BigTrust 2016 is a part of ICA3PP 2016 16th International Conference on Algorithms and Architectures for Parallel Processing. The scope and interests for the special issue include but are not limited to the following list:
- Big Data Science, Foundations, and applications
- Trust in Big Data
- Security & Privacy in Big Data

For more information, please see http://csee.hnu.edu.cn/hbs/.

ICSS 2016 Industrial Control System Security Workshop, Held in conjunction with 32nd Annual Computer Security Applications Conference (ACSAC 2016), Los Angeles, CA, USA, December 6, 2016. [posted here 07/18/16]
Supervisory control and data acquisition (SCADA) and industrial control systems monitor and control a wide range of industrial and infrastructure processes such as water treatment, power generation and transmission, oil and gas refining and steal manufacturing. Such systems are usually built using a variety of commodity computer and networking components, and are becoming increasingly interconnected with corporate and other Internet-visible networks. As a result, they face significant threats from internal and external actors. For example, in 2010 the Stuxnet malware was specifically written to attack SCADA systems and caused millions of dollars in damages.The critical requirement for high availability in SCADA and industrial control systems, along with the use of resource constrained computing devices, legacy operating systems and proprietary software applications limits the applicability of traditional information security solutions. The goal of this workshop is to explore new security techniques that are applicable in the control systems context. Papers of interest including (but not limited to) the following subject categories are solicited:
- Intrusion detection and prevention
- Malware
- Vulnerability analysis and risk management
- Digital forensics
- Virtualization
- Application security
- Performance evaluation of security methods and tools in control systems
- Cybersecurity Education

For more information, please see https://www.acsac.org/2016/workshops/icss/.

SSR 2016 3rd International conference on Security Standardization Research, Gaithersburg, MD, USA, December 5-6, 2016. [posted here 2/29/16]
Over the last two decades a huge range of standards have been developed covering many different aspects of cyber security. These documents have been published by national and international formal standardization bodies, as well as by industry consortia. Many of these standards have become very widely used - to take just one example, the ISO/IEC 27000 series have become a commonly used basis for managing corporate information security. Despite their wide use, there will always be a need to revise existing security standards and to add new standards to cover new domains. The purpose of this conference is to discuss the many research problems deriving from studies of existing standards, the development of revisions to existing standards, and the exploration of completely new areas of standardization. Indeed, many security standards bodies are only beginning to address the issue of transparency, so that the process of selecting security techniques for standardization can be seen to be as scientific and unbiased as possible. This conference is intended to cover the full spectrum of research on security standardization, including, but not restricted to, work on cryptographic techniques (including ANSI, IEEE, IETF, ISO/IEC JTC 1/SC 27, ITU-T and NIST), security management, security evaluation criteria, network security, privacy and identity management, smart cards and RFID tags, biometrics, security modules, and industry-specific security standards (e.g. those produced by the payments, telecommunications and computing industries for such things as payment protocols, mobile telephony and trusted computing). Papers offering research contributions to the area of security standardization are solicited for submission to the SSR 2016 conference. Papers may present theory, applications or practical experience in the field of security standardization, including, but not necessarily limited to:
- access control
- biometrics
- cloud computing
- critical national infrastructure (CNI) protection
- consistency and comparison of multiple standards
- critiques of standards
- cryptanalysis
- cryptographic protocols
- cryptographic techniques
- evaluation criteria
- formal analysis of standards
- history of standardization
- identity management
- industrial control systems security
- internet security
- interoperability of standards
- intrusion detection
- key management and PKIs
- management of the standardization process
- mobile security
- network security
- open standards and open source
- payment system security
- privacy
- regional and international standards
- RFID tag security
- risk analysis
- security controls
- security management
- security protocols
- security services
- security tokens
- smart cards
- telecommunications security
- trusted computing
- web security

For more information, please see http://csrc.nist.gov/groups/ST/ssr2016/.

WIFS 2016 8th IEEE International Workshop on Information Forensics and Security, Abu Dhabi, UAE, December 4-7, 2016. [posted here 7/4/16]
WIFS is the flagship workshop on information forensics and security organised by IEEE signal processing society. Its major objective is to bring together researchers from relevant disciplines to exchange latest results and to discuss emerging challenges in different areas of information security. Topics of interest include, but are not limited to:
- Forensics
- Information and system security
- Biometrics
- Multimedia content security
- Steganography and covert communications
- Hardware security
- Network traffic analysis
- Surveillance
- Sousvelliance and anti-surveillance
- Privacy in data analytics
- Privacy in the Internet of everything

For more information, please see http://www.wifs2016.org.

Mycrypt 2016 2nd International Conference on Cryptology & Malicious Security, Kuala Lumpur, Malaysia, December 1-2, 2016. [posted here 3/7/16]
Original papers of substantial technical contribution in the areas of cryptology and malicious security are solicited for submission to the International Conference on Cryptology & Malicious Security. Submissions to Mycrypt 2016 should be aimed towards the following topic categories:
- paradigm-shifting, unconventional cryptology (e.g. malicious crypto, unconventional formulations of underlying problems, or new hard problems)
- position papers on breakthrough cryptologic/security research
- revisits/critiques/analysis of long-standing crypto paradigms/approaches/models/formulations (in fact, we also encourage paired submissions by crypto factions of opposing views, where each paper in the pair argues for/against a paradigm)
- approaches/solutions to long-standing open problems; or formulations of long-standing/thus-far adhoc security approaches
- analysis of crypto/security standardization processes & how they may be subverted
- cryptofications of the real world (e.g. new types of adversarial models and/or notions inspired by real world incidences/problems, modelling humans-in-the-security-loop)
- crypto & beyond: cryptologic techniques in union with techniques from other disciplines

For more information, please see https://foe.mmu.edu.my/mycrypt2016.

FNSS 2016 2nd International Conference on Future Networks Systems and Security, Paris, France, November 23 - 25, 2016. [posted here 5/2/16]
The network of the future is envisioned as an effective, intelligent, adaptive, active and high performance Internet that can enable applications ranging from smart cities to tsunami monitoring. The network of the future will be a network of billions or trillions of entities (devices, machines, things, vehicles) communicating seamlessly with one another and is rapidly gaining global attention from academia, industry, and government. The International Conference on Future Networks Systems and Security aims to provide a forum that brings together researchers from academia, practitioners from industry, standardization bodies, and government to meet and exchange ideas on recent research and future directions for the evolution of the future Internet. The technical discussion will be focused on the technology, communications, systems and security aspects of relevance to the network of the future.

For more information, please see http://fnss.org.

GenoPri 2016 3rd International Workshop on Genome Privacy and Security, Held in conjunction with the AMIA 2016 Annual Symposium, Chicago, IL, USA, November 12, 2016. [posted here 3/7/16]
Over the past several decades, genome sequencing technologies have evolved from slow and expensive systems that were limited in access to a select few scientists and forensics investigators to high-throughput, relatively low-cost tools that are available to consumers. A consequence of such technical progress is that genomics has become one of the next major challenges for privacy and security because (1) genetic diseases can be unveiled, (2) the propensity to develop specific diseases (such as Alzheimer’s) can be revealed, (3) a volunteer, accepting to have his genomic code made public, can leak substantial information about his ethnic heritage and the genomic data of his relatives (possibly against their will), and (4) complex privacy issues can arise if DNA analysis is used for criminal investigations and medical purposes. As genomics is increasingly integrated into healthcare and "recreational" services (e.g., ancestry testing), the risk of DNA data leakage is serious for both individuals and their relatives. Failure to adequately protect such information could lead to a serious backlash, impeding genomic research, that could affect the well-being of our society as a whole. This prompts the need for research and innovation in all aspects of genome privacy and security, as suggested by the non-exhaustive list of topics on the workshop website.

For more information, please see http://www.genopri.org/.

SecDev 2016 1st IEEE Cybersecurity Development, Boston, MA, USA, November 3-4, 2016. [posted here 6/6/16]
In this first year, IEEE Cybersecurity Development (SecDev) 2016 is soliciting short papers that present innovations, experience-based insights, or a vision. The goal is to share useful and thought provoking ideas, to push forward the art and science of secure development. In future years, the academic portion of SecDev will expand to include more complete articles. SecDev is a new venue for presenting ideas, research, and experience about how to develop secure systems. SecDev is distinguished by its focus on how to “build security in” (and not simply discover the absence of security). Its goal is to encourage and disseminate ideas for secure system development among both academia and industry. Developers have valuable experiences and ideas that can inform academic research, and researchers have concepts, studies, and even code and tools that could benefit developers. We anticipate that attendees from academic conferences like IEEE S&P, USENIX Security, PLDI, FSE, ISSTA, SOUPS, and many others could contribute ideas to SecDev, as could attendees of industrial conferences like AppSec, RSA, Black Hat, and Shmoocon. Papers have the option of appearing in the conference’s formal proceedings, or not. SecDev is also interested in tutorials on processes, frameworks, languages, and tools. The goal is to propose useful and thought provoking ideas, and to share knowledge on the art and science of secure system development. Areas of interest include (but are not limited to):
- Security engineering processes, from requirements to maintenance
- Dynamic/static analysis and runtime approaches towards application security
- Programming languages and frameworks supporting security
- Testing strategies to ensure security
- Explorations of formal verification and other high-assurance methods for security
- Code reviews, red teams, and other human-centered assurance
- Security-focused system (HW/SW/architecture) designs
- Human-centered design for systems security
- Distributed systems design and implementation for security

For more information, please see http://secdev.ieee.org/calls-for/papers/.

NordSec 2016 21st Nordic Conference on Secure IT Systems, Oulu, Finland, November 2-4, 2016. [posted here 3/28/16]
NordSec addresses a broad range of topics within IT security with the aim of bringing together computer security researchers and encouraging interaction between academia and industry. NordSec 2016 is co-located with the 10th International Crisis Management Workshop and Oulu Winter School. NordSec welcomes contributions within, but not limited to, the following areas:
- Access control and security models
- Applied cryptography
- Cloud security
- Commercial security policies and enforcement
- Cyber crime, warfare, and forensics
- Economic, legal, and social aspects of security
- Enterprise security
- Hardware and smart card security
- Mobile and embedded security
- Internet of Things and M2M security
- Internet, communication, and network security
- Intrusion detection
- Language-based techniques for security
- New ideas and paradigms in security
- Operating system security
- Privacy and anonymity
- Security education and training
- Security evaluation and measurement
- Security management and audit
- Security protocols
- Security usability
- Social engineering and phishing
- Software security and malware
- Trust and identity management
- Trusted computing
- Vulnerability testing

For more information, please see http://nordsec.oulu.fi.

TrustED 2016 6th International Workshop on Trustworthy Embedded Devices, Held in conjunction with 23rd ACM Conference on Computer and Communications Security (CCS 2016), Hofburg Palace, Vienna, Austria, October 28, 2016. [posted here 4/25/16]
TrustED considers selected security and privacy (S&P) aspects of cyber physical systems and their environments, which influence trust and trust establishment in such environments. A major theme of TrustED 2016 will be security and privacy aspects of the Internet of Things Paradigm. The IoTs promises to make reality Mark Weisser's vision of ubiquitous computation set out in his 1991 influential paper. Yet to make such vision successful, it is widely acknowledged that security of super large distributed systems has to be guaranteed and the privacy of the collected data protected. Submissions exploring new paradigms to assure security and privacy in the IoTs are thus strongly encouraged. The workshop topics include but are not limited to:
- Trustworthy and secure embedded systems
- Novel constructions, implementations and applications with physical security primitives (e.g., PUFs, PhySec)
- Hardware entangled cryptography
- Novel security architectures for the IoTs
- Frameworks and tools to design, validate and test trustworthy embedded systems
- Secure execution environments (e.g., TrustZone, TPMs) on mobile devices
- Remote attestation and integrity validation
- Privacy aspects of embedded systems (e.g., medical devices, electronic IDs)
- Physical and logical convergence (e.g., secure and privacy-preserving facility management)
- Novel paradigms to established trust in large distributed environments

For more information, please see http://www.trusted-workshop.de.

CCSW 2016 8th ACM Cloud Computing Security Workshop, Held in conjunction with 23rd ACM Conference on Computer and Communications Security (CCS 2016), Hofburg Palace, Vienna, Austria, October 28, 2016. [posted here 7/4/16]
Cloud computing is a dominant trend in computing for the foreseeable future; e.g., major cloud operators are now estimated to house over a million machines each and to host substantial (and growing) fractions of our IT and web infrastructure. CCSW is a forum for bringing together researchers and practitioners to discuss the implications of this trend to the security of cloud operators, tenants, and the larger Internet community. We invite submissions on new threats, countermeasures, and opportunities brought about by the move to cloud computing, with a preference for unconventional approaches, as well as measurement studies and case studies that shed light on the security implications of clouds.

For more information, please see https://www.zurich.ibm.com/ccsw16/index.html.

CPS-SPC 2016 2nd ACM Workshop on Cyber-Physical Systems Security & Privacy, Held in conjunction with 23rd ACM Conference on Computer and Communications Security (CCS 2016), Hofburg Palace, Vienna, Austria, October 28, 2016. [posted here 7/4/16]
Cyber-Physical Systems (CPS) integrate computing and communication capabilities with monitoring and control of entities in the physical world. These systems are usually composed of a set of networked agents, including sensors, actuators, control processing units, and communication devices. While some forms of CPS are already in use, the widespread growth of wireless embedded sensors and actuators is creating several new applications in areas such as medical devices, autonomous vehicles, and smart infrastructure, and is increasing the role that the information infrastructure plays in existing control systems such as in the process control industry or the power grid. Many CPS applications are safety-critical: their failure can cause irreparable harm to the physical system under control, and to the people who depend, use or operate it. In particular, critical cyber-physical infrastructures such as the electric power generation, transmission and distribution grids, oil and natural gas systems, water and waste-water treatment plants, and transportation networks play a fundamental and large-scale role in our society and their disruption can have a significant impact to individuals, and nations at large. Securing these CPS infrastructures is therefore vitally important. Similarly because many CPS systems collect sensor data non-intrusively, users of these systems are often unaware of their exposure. Therefore in addition to security, CPS systems must be designed with privacy considerations. To address some of these issues, we invite original research papers on the security and/or privacy of Cyber-Physical Systems. We seek submissions from multiple interdisciplinary backgrounds tackling security and privacy issues in CPS.

For more information, please see http://eecs.oregonstate.edu/cps-spc/index.html.

ACM CCS 2016 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. [posted here 2/15/16]
The conference seeks submissions from academia, government, and industry presenting novel research results in all practical and theoretical aspects of computer and communications security. Papers should be related to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the relevance of the results to secure systems. All topic areas related to computer and communications security are of interest and in scope. Accepted papers will be published by ACM Press in the conference proceedings.

For more information, please see http://www.sigsac.org/ccs/CCS2016/call-for-papers/.

WISCS 2016 3rd ACM Workshop on Information Sharing and Collaborative Security, Held in conjunction with 23rd ACM Conference on Computer and Communications Security (CCS 2016), Hofburg Palace, Vienna, Austria, October 24, 2016. [posted here 5/9/16]
Sharing of cyber-security related information is believed to greatly enhance the ability of organizations to defend themselves against sophisticated attacks. If one organization detects a breach sharing associated security indicators (such as attacker IP addresses, domain names, file hashes etc.) provides valuable, actionable information to other organizations. The analysis of shared security data promises novel insights into emerging attacks. Sharing higher level intelligence about threat actors, the tools they use and mitigations provides defenders with much needed context for better preparing and responding to attacks. In the US and the EU major efforts are underway to strengthen information sharing. Yet, there are a number of technical and policy challenges to realizing this vision. Which information exactly should be shared? How can privacy and confidentiality be protected? How can we create high-fidelity intelligence from shared data without getting overwhelmed by false positives? The 3rd Workshop on Information Sharing and Collaborative Security (WISCS 2016) aims to bring together experts and practitioners from academia, industry and government to present innovative research, case studies, and legal and policy issues. The workshop solicits original research papers in these areas, both full and short papers.

For more information, please see https://sites.google.com/site/wiscs2016/.

SPC 2016 2nd IEEE Workshop on Security and Privacy in the Cloud, Philadelphia, PA, USA, October 19, 2016. [posted here 6/6/16]
Cloud computing is today the reference paradigm for large-scale data storage and processing due to the convenient and efficient network access to configurable resources that can be easily adjusted according to the users' needs. Although the benefits of cloud computing are tremendous, security and privacy concerns have still a detrimental impact on the adoption and acceptability of cloud services. In fact, users as well as companies that rely on cloud storage and computation services lose the direct control over the systems managing their data and applications, thus putting the confidentiality, integrity and availability of the data at risk. The goal of this workshop is to bring together researchers and practitioners who are interested in discussing the security, privacy, and data protection issues emerging in cloud scenarios, and possible solutions to them. The workshop seeks submissions from academia, industry, and government presenting novel research, as well as experimental studies, on all theoretical and practical aspects of security, privacy, and data protection in cloud scenarios. Topics of interest include, but are not limited to:
- Anonymity in cloud scenarios
- Applied cryptography in cloud scenarios
- Cloud-based biometric systems
- Data and application security
- Data and system integrity
- Data availability in outsourcing scenarios
- Data protection
- Efficient access to outsourced data
- Key management in cloud scenarios
- Privacy
- Privacy of accesses
- Secure computation over encrypted data
- Security and trust metrics
- Security and privacy in crowdsourcing
- Security and privacy in multi-clouds and federated clouds
- Security and privacy in data outsourcing
- Security and privacy in the Internet of Things
- Security and privacy of big data
- Security and privacy of distributed computations
- Security and privacy of fog computing
- Security and privacy policies
- Selective information sharing
- Threats, vulnerabilities, and risk management

For more information, please see http://cns2016.ieee-cns.org/workshop/2nd-workshop-security-and-privacy-cloud-spc.

CNS 2016 4th IEEE Conference on Communications and Network Security, Philadelphia, PA, USA, October 17-19, 2016. [posted here 2/29/16]
IEEE Conference on Communications and Network Security (CNS) is a conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cyber security. IEEE CNS is also a spin-off of IEEE INFOCOM, the premier ComSoc conference on networking. The goal of CNS is to provide an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security. Building on the success of the past three years’ conferences, IEEE CNS 2016 seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, all the way from the physical layer to the various network layers to the variety of applications reliant on a secure communication substrate.

For more information, please see http://cns2016.ieee-cns.org/.

SecureComm 2016 12th EAI International Conference on Security and Privacy in Communication Networks, Guangzhou, China, October 10-12, 2016. [posted here 2/22/16]
SecureComm seeks high-quality research contributions in the form of well-developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. Topics of interest include, but are not limited to the following:
- Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
- Network Intrusion Detection and Prevention, Firewalls, Packet Filters
- Malware Analysis and Detection including Botnets, Trojans and APTs
- Web and Systems Security
- Distributed Denial of Service Attacks and Defenses
- Communication Privacy and Anonymity
- Circumvention and Anti-Censorship Technologies
- Network and Internet Forensics Techniques
- Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
- Secure Routing, Naming/Addressing, Network Management
- Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
- Security & Privacy in Peer-to-Peer and Overlay Networks
- Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
- Security & Isolation in Cloud, Data Center and Software-Defined Networks

For more information, please see http://securecomm.org.

ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Crete, September 26-30, 2016. [posted here 1/25/16]
ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Topics of interest include, but are not limited to:
- access control
- accountability
- ad hoc networks
- anonymity
- applied cryptography
- authentication
- biometrics
- data and computation integrity
- database security
- data protection
- digital content protection
- digital forensics
- distributed systems security
- embedded systems security
- inference control
- information hiding
- identity management
- information flow control
- information security governance and management
- intrusion detection
- formal security methods
- language-based security
- network security
- phishing and spam prevention
- privacy
- privacy preserving data mining
- risk analysis and management
- secure electronic voting
- security architectures
- security economics
- security metrics
- security models
- security and privacy for big data
- security and privacy in cloud scenarios
- security and privacy in complex systems
- security and privacy in content centric networking
- security and privacy in crowdsourcing
- security and privacy in the IoT
- security and privacy in location services
- security and privacy for mobile code
- security and privacy in pervasive / ubiquitous computing
- security and privacy policies
- security and privacy in social networks
- security and privacy in web services
- security and privacy in cyber-physical systems
- security, privacy and resilience in critical infrastructures
- security verification
- software security
- systems security
- trust models and management
- trustworthy user devices
- usable security and privacy
- web security
- wireless security

For more information, please see http://www.ics.forth.gr/esorics2016/.

WISTP 2016 10th WISTP International Conference on Information Security Theory and Practice, Heraklion, Crete, Greece, September 26-27, 2016. [posted here 2/29/16]
The 10th WISTP International Conference on Information Security Theory and Practice (WISTP 2016) seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues.

For more information, please see http://www.wistp.org/.

SADFE 2016 11th International Conference on Systematic Approaches to Digital Forensics Engineering, Kyoto, Japan, September 20-22, 2016. [posted here 2/15/16]
SADFE-2016 is concerned with the generation, analysis and sustainability of digital evidence and evolving t tools and techniques that are used in this effort. Advancement in this field requires innovative methods, systems, and practices, which are grounded in solid research coupled with an understanding of user needs. Digital forensics at SADFE focuses on the issues introduced by the coupling of rapidly advancing technologies and increased globalization. We believe digital forensic engineering is vital to security, the administration of justice and the evolution of culture. Potential topics include, but are not limited to:
Digital Data and Evidence Collection:
- Identification, authentication and collection of digital evidence
- Extraction and management of forensic artifacts
- Identification and redaction of personally identifying/sensitive information
- Evidence and digital memory preservation, curation and storage
- Compliance of architectures and processes (including network processes) with forensic requirements
- Data, digital knowledge, and web mining systems for identification and authentication of data
- Honeynets and other deception technologies that collect data for forensic analysis
- Innovative forensic techniques for new technologies
Digital Evidence Management, Integrity and Analytics:
- Advanced search, analysis, and presentation of digital evidence
- Cybercrime analysis, modeling and reconstruction technologies
- Tools and techniques for combining digital and non-digital evidence
- Supporting both qualitative and quantitative evidence
- Handling of evidence and the preservation of data integrity and admissibility
- Digital evidence in the face of encryption
- Forensic-support technologies: forensic-enabled and proactive monitoring/response
Scientific Principle-Based Digital Forensic Processes
- Examination environments for digital data
- Legal/technical aspects of admissibility and evidence tests
- Forensic tool validation: legal implications and issues
- Handling increasing volumes of digital discovery
- Computational Forensics and Validation Issues in Forensic Authentication and Validation.
- Forensic Readiness by Design
- Forensics tool validation
- Computational systems and computational forensic analysis
Legal, Ethical and Technical Challenges
- Forensics, policy and ethical implications new and evolving technologies
- Legal and privacy implications for digital and computational forensic analysis
- New Evidence Decisions
- Legal case construction and digital evidence support
- Transnational Investigations/Case Integration
- Managing geographically, politically and/or jurisdictionally dispersed data artifacts
- Case studies illustrating privacy, legal and legislative issues
- Courtroom expert witness and case presentation
The Impacts of the following on any of the above
- Technological challenges
- Legal and ethical challenges
- Economic challenges
- Political challenges
- Cultural and professional challenges
- New Trends (Internet of Things, Cloud Computing, Smart City, Big Data, etc.)

For more information, please see http://sadfe.org.

RAID 2016 19th International Symposium on Research in Attacks, Intrusions and Defenses, Paris, France, September 19-21, 2016. [posted here 2/15/16]
The 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016) aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to computer and information security. Research papers on all topics related to cyber attacks, intrusions or defenses are within scope, including papers on:
- Malware and unwanted software
- Mobile and Web security and privacy
- Cloud computing security
- Computer and network security
- Denial-of-Service attacks
- Formal models, analysis, and standards
- Vulnerability analysis
- Secure software development
- Machine learning for security
- Computer security visualization techniques
- Cyber crime and underground economies
- Hardware security
- Program analysis and reverse engineering
- Digital forensics
- Usable security and privacy
- Intrusion detection and prevention
- Cyber physical systems
- Security measurement studies
- Security and privacy of the Internet of Things
- Threats against critical infrastructures and mitigation thereof
- Cyber intelligence techniques and threats intel sharing

For more information, please see http://www.raid2016.org/.

IWDW 2016 15th International Workshop on Digital-forensics and Watermarking, Beijing, China, September 17-19, 2016. [posted here 2/29/16]
The 15th International Workshop on Digital-forensics and Watermarking (IWDW 2016) is a premier forum for researchers and practitioners working on novel research, development and applications of digital watermarking and forensics techniques for multimedia security. We invite submissions of high-quality original research papers. Areas of interest include, but are not limited to:
- Mathematical modeling of embedding and detection
- Information theoretic, stochastic aspects of data hiding
- Security issues, including attacks and counter-attacks
- Combination of data hiding and cryptography
- Optimum watermark detection and reliable recovery
- Estimation of watermark capacity
- Channel coding techniques for watermarking
- Large-scale experimental tests and benchmarking
- New statistical and perceptual models of multimedia content
- Reversible data hiding
- Data hiding in special media
- Data hiding and authentication
- Steganography and steganalysis
- Digital multimedia forensics & anti-forensics
- Copyright protection, DRM, forensic watermarking
- Visual cryptography & secret image sharing
- Security based on human vision system

For more information, please see http://www.iwdw.net/.

IWSEC 2016 11th International Workshop on Security, Tokyo, Japan, September 12-14, 2016. [posted here 11/23/15]
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2016. Topics of interest for IWSEC 2016 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops. In particular, we encourage the following topics in this year:
- Big Data Analysis for Security
- Critical Infrastructure Security
- Cryptanalysis
- Cryptographic Protocols
- Cybersecurity Economics
- Digital Forensics
- Enriched Cryptography
- Formal Methods
- IoT security
- Machine Learning for Security
- Malware Countermeasures
- Measurements for Cybersecurity
- Multiparty Computation
- Post Quantum Cryptography
- Privacy Preserving
- Real World Cryptography
- Visualization for Security

For more information, please see http://www.iwsec.org/2016/.

ISC 2016 19th Information Security Conference, Honolulu, Hawaii, USA, September 7-9, 2016. [posted here 1/25/16]
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. ISC has been held in five continents. Papers on all technical aspects of these topics are solicited for submission. Areas of interest include, but are not restricted to:
- access control
- accountability
- anonymity and pseudonymity
- applied cryptography
- authentication
- biometrics
- computer forensics
- critical infrastructure security
- cryptographic protocols
- database security
- data protection
- data/system integrity
- digital right management
- economics of security and privacy
- electronic frauds
- embedded security
- formal methods in security
- identity management
- information hiding & watermarking
- intrusion detection
- network security
- peer-to-peer security
- privacy
- secure group communications
- security in information flow
- security for Internet of Things
- security for mobile code
- secure cloud computing
- security in location services
- security modeling & architectures
- security and privacy in social networks
- security and privacy in pervasive and ubiquitous computing
- security of eCommerce, eBusiness and eGovernment
- security models for ambient intelligence environments
- trust models and trust policies
- economics of security and privacy
- information dissemination control

For more information, please see http://manoa.hawaii.edu/isc2016.

APF 2016 Annual Privacy Forum, Frankfurt am Main, Germany, September 7-8, 2016. [posted here 2/1/16]
Nowadays electronic communication networks and digital services are an essential part of an increasing number of everyday commodities. In the era of automated profiling and electronic surveillance, citizens face a serious threat against their right to privacy and informational self-determination, especially when using the internet and mobile services. The lack of transparency regarding the functionality and interconnection of such services increases the risk of uncontrollable processing of personal data. In this regard, the upcoming Data Protection Regulation will be a useful instrument to protect the privacy of individuals. However, for its successful implementation, this new framework needs to be enforced by proper technologies and encompassed with sustainable business models along with mechanisms to promote privacy awareness and help users to understand the value of their data. In the light of the upcoming data protection regulation and the European digital agenda, DG CONNECT, ENISA and, Goethe University Frankfurt is organizing APF 2016.

For more information, please see http://privacyforum.eu/.

ARES 2016 11th International Conference on Availability, Reliability and Security, Salzburg, Austria, August 31 - September 2, 2016. [posted here 2/1/16]
The 11th International Conference on Availability, Reliability and Security ("ARES") will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.

For more information, please see http://www.ares-conference.eu.

IWCC 2016 5th International Workshop on Cyber Crime, Co-located with the 11th International Conference on Availability, Reliability and Security (ARES 2016), Salzburg, Austria, August 29 - September 2, 2016. [posted here 2/15/16]
Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals. Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders. This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies. The aim of 5th International Workshop on Cyber Crime is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches. Topics of interest include, but are not limited to:
- Cyber crimes: evolution, new trends and detection
- Cyber crime related investigations
- Computer and network forensics
- Digital forensics tools and applications
- Digital forensics case studies and best practices
- Privacy issues in digital forensics
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Integrity of digital evidence and live investigations
- Identification, authentication and collection of digital evidence
- Anti-forensic techniques and methods
- Watermarking and intellectual property theft
- Social networking forensics
- Steganography/steganalysis and covert/subliminal channels
- Network anomalies detection
- Novel applications of information hiding in networks
- Political and business issues related to digital forensics and anti-forensic techniques

For more information, please see http://stegano.net/IWCC2016/.

TRUST 2016 9th International Conference on Trust & Trustworthy Computing, Vienna, Austria, August 29-30, 2016. [posted here 3/14/16]
TRUST 2016 is an international conference that explores new ideas and experiences in building, designing, using and understanding trustworthy computing systems. We are now calling for papers. Interested authors are invited to submit papers describing novel and previously unpublished results in building, designing, using and understanding trustworthy computing systems. Paper topics include, but are not limited to:
- Architectures for trustworthy infrastructures
- Emerging applications and technologies, including recent industrial research and development on trusted/trustworthy computing
- Hardware security, including secure storage, cryptographic coprocessors, smartcards, and physically unclonable functions (PUFs)
- Trustworthy applications, including webbased systems
- Trusted mobile computing platforms
- Trustworthy embedded, CyberPhysical, and Internet of Things systems
- Security analysis and formal techniques for trusted/trustworthy computing
- Verification of trusted/trustworthy computing (architectures, platforms, software, protocols)
- Usability of trusted/trustworthy computing solutions and humancomputer interactions
- Cloud security and trustworthy services
- Trust management
- Software engineering techniques for trustworthiness
- Operating system security, including virtualization and monitoring
- Cryptography for trusted computing and related applications
- Intrusion detection and resilience leveraging trusted computing
- Security policies and management of trusted/trustworthy systems
- Experimental, userbased or testbed studies

For more information, please see http://trust2016.sba-esearch.org/.

TrustCom 2016 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Tianjin, China, August 23-26, 2016. [posted here 12/7/15]
With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security and privacy at the same time. As useful and innovative technologies, trusted computing and communications are attracting researchers with more and more attention. The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field. Topics of interest include, but not limited to:
Trust Track
- Trust semantics, metrics and models
- Trusted computing platform
- Trusted network computing
- Trusted operating systems
- Trusted software and applications
- Trust in social networks
- Trust in e-commerce and e-government
- Trust in mobile and wireless communications
- Risk and reputation management
- Survivable computer systems/networks
- Trust of 5G
- Miscellaneous trust issues
Security Track
- Network security
- Computer security
- Database security
- Web applications security
- Security policy, model and architecture
- Security in social networks
- Security in parallel and distributed systems
- Security in mobile and wireless communications
- Security in grid/cloud/pervasive computing
- Authentication, authorization and accounting
- Security of 5G
- Miscellaneous security issues
Privacy Track
- Privacy in Web-based applications and services
- Privacy in database systems
- Privacy in parallel and distributed systems
- Privacy in grid/cloud/pervasive computing
- Privacy in mobile and wireless communications
- Privacy in e-commerce and e-government
- Privacy in network deployment and management
- Privacy and trust
- Privacy and security
- Privacy and anonymity
- Privacy preservation in 5G
- Miscellaneous privacy issues
Forensics Track
- Anti-forensics
- Biometrics
- Cryptanalysis
- Big data forensics
- CCTV forensics
- Cloud forensics
- Computational forensics
- Cyber-physical system forensics
- Datamining for forensics
- Facial recognition
- Fingerprint forensics
- Image forensics
- Malware forensics
- Mobile app forensics (e.g. Skype, WeChat and Facebook)
- Mobile device forensics
- Multimedia forensics
- Network forensics
- Steganography and steganalysis
- System reverse engineering
- Watermarking

For more information, please see http://adnet.tju.edu.cn/TrustCom2016/.

PROOFS 2016 5th International Workshop on Security Proofs for Embedded Systems, Santa Barbara, California, USA, August 20, 2016. [posted here 3/21/16]
This workshop, the fifth in an annual series, brings together leading researchers and practitioners from academia, government, and industry to discuss the application of formal methods to the field of embedded systems security. PROOFS seeks contributions about methodologies that increase the confidence level in the security of embedded systems, especially those which contain cryptographic algorithms. Exploratory works and use-cases are especially welcomed.

For more information, please see http://www.proofs-workshop.org/.

USENIX-Security 2016 25th USENIX Security Symposium, Austin, TX, USA, August 10–12, 2016. [posted here 2/15/16]
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:
- System security (Operating systems security, Web security, Mobile systems security, Distributed systems security, Cloud computing security)
- Network security (Intrusion and anomaly detection and prevention, Network infrastructure security, Denial-of-service attacks and countermeasures, Wireless security)
- Cryptographic implementation analysis and construction
- Applied cryptography
- Security analysis (Malware analysis, Analysis of network and security protocols, Attacks with novel insights, techniques, or results, Forensics and diagnostics for security, Automated security analysis of hardware designs and implementation, Automated security analysis of source code and binaries, Program analysis)
- Security measurement studies (Measurements of fraud, malware, spam, Measurements of human behavior and security, Privacy-enhancing technologies and anonymity)
- Usable security and privacy
- Language-based security
- Hardware security (Secure computer architectures, Embedded systems security, Methods for detection of malicious or counterfeit hardware, Side channels)
- Research on surveillance and censorship
- Social issues and security (Research on computer security law and policy, Ethics of computer security research, Research on security education and training)

For more information, please see https://www.usenix.org/conference/usenixsecurity16/call-for-papers.

CSET 2016 9th Workshop on Cyber Security Experimentation and Test, Austin, TX, USA, August 8, 2016. [posted here 4/11/16]
The science of cyber security poses significant challenges. For example, experiments must recreate relevant, realistic features in order to be meaningful, yet identifying those features and modeling them is very difficult. Repeatability and measurement accuracy are essential in any scientific experiment, yet hard to achieve in practice. Few security-relevant datasets are publicly available for research use and little is understood about what "good datasets" look like. Finally, cyber security experiments carry significant risks if not properly contained and controlled, yet often require some degree of interaction with the larger world in order to be useful. Meeting these challenges requires transformational advances, including understanding the relationship between scientific method and cyber security evaluation, advancing capabilities of underlying experimental infrastructure, and improving data usability. Topics of interest include but are not limited to:
- Science of cyber security: e.g., experiences with and discussions of experimental methodologies; experiment design and conduct addressing cyber security challenges.
- Measurement and metrics: e.g., what are useful or valid metrics, test cases, and benchmarks? How do we know? How does measurement interact with (or interfere with) evaluation?
- Testbeds and experimental infrastructure: e.g., tools for improving speed and fidelity of testbed configuration; sensors for robust data collection with minimal testbed artifacts; support for interconnected non-IT systems such as telecommunications or industrial control.
- Simulations and emulations: e.g., what makes good ones? How do they scale (up or down)?
- Data sets: e.g., what makes good data sets? How do we know? How do we compare data sets? How do we collect new ones or generate derived ones? How do they hold up over time?
- Ethics of cyber security research: e.g., experiences balancing stakeholder considerations; frameworks for evaluating the ethics of cyber security experiments.

For more information, please see https://www.usenix.org/conference/cset16/.

NSAA 2016 Workshop on Network Security Analytics and Automation, Held in conjunction with the 25th International Conference on Computer Communication and Networks (ICCCN 2016), Waikoloa, Hawaii, USA, August 1-4, 2016. [posted here 3/14/16]
This workshop provides a forum for researchers to explore promising new approaches to enable enterprises to quickly determine courses of action in response to ever changing computer network threats. Emphasis will be focused on building a sustained ecosystem for network security and using big data analytics techniques to determine appropriate responses to prevent massive attack events by neutralizing threats before they have a chance to gather momentum. To this end effective and safe automation and integration of security tools are critical. Topics of interest include, but not limited to:
- Cyber threat information sharing standards, ontologies, and infrastructure
- Assessing the reputation of cyber threat intelligence sources
- Course of action planning based on shared information
- Enrichment of shared threat information
- Application of big data analytics to identify threats
- Visualization of logs and attack information
- Integration of network security responses
- Orchestration of responses to threats
- Curriculum development related to network security analytics and automation
- Automation of responses
- Safety controls for automation
- Network resiliency

For more information, please see http://icccn.org/icccn16/.

SECRYPT 2016 13th International Conference on Security and Cryptography, Lisbon, Portugal, July 26 - 28, 2016. [posted here 11/23/15]
SECRYPT is an annual international conference covering research in information and communication security. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged. Conference topics:
- Access Control
- Applied Cryptography
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- Data Integrity
- Data Protection
- Database Security and Privacy
- Digital Forensics
- Digital Rights Management
- Ethical and Legal Implications of Security and Privacy
- Formal Methods for Security
- Human Factors and Human Behavior Recognition Techniques
- Identification, Authentication and Non-repudiation
- Identity Management
- Information Hiding
- Information Systems Auditing
- Insider Threats and Countermeasures
- Intellectual Property Protection
- Intrusion Detection & Prevention
- Management of Computing Security
- Network Security
- Organizational Security Policies
- Peer-to-Peer Security
- Personal Data Protection for Information Systems
- Privacy
- Privacy Enhancing Technologies
- Reliability and Dependability
- Risk Assessment
- Secure Software Development Methodologies
- Security and Privacy for Big Data
- Security and privacy in Complex Systems
- Security and Privacy in Crowdsourcing
- Security and Privacy in IT Outsourcing
- Security and Privacy in Location-based Services
- Security and Privacy in Mobile Systems
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Smart Grids
- Security and Privacy in Social Networks
- Security and Privacy in the Cloud
- Security and Privacy in Web Services
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security in Distributed Systems
- Security Information Systems Architecture
- Security Management
- Security Metrics and Measurement
- Security Protocols
- Security requirements
- Security Verification and Validation
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Software Security
- Trust management and Reputation Systems
- Ubiquitous Computing Security
- Wireless Network Security

For more information, please see http://www.secrypt.icete.org.

DCCL 2016 Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Co-located with PODC 2016, Chicago, IL, USA, July 25, 2016. [posted here 5/9/16]
The recent global interest in cryptocurrencies was triggered by the rise of Bitcoin, which introduced a public ledger called the blockchain to record the history of its transactions. Bitcoin maintains its blockchain through a decentralized peer-to-peer cryptographic protocol that works without any trusted central authority, but it assumes (at least) that a majority of the computing power in the system is held by honest nodes. Cryptographic techniques ensure the integrity of all transactions in the distributed ledger and new entries are appended through a consensus protocol. Many alternative cryptocurrencies have introduced variations of Bitcoin and proposed alternative designs for consensus ledgers. Novel protocols, known as "smart contracts", are constructed on top of the blockchain, achieving guarantees that were not possible before. Today many financial institutions see the disruptive power of this technology and regard it as a promising alternative to their established business practices, not depending on centralized control, eliminating intermediaries, and enabling new businesses. Several consensus mechanisms are currently under investigation: On the one hand, Bitcoin's consensus protocol, called "Nakamoto consensus", allows anonymous nodes to participate based on a "proof-of-work". On the other hand, traditional Byzantine consensus and BFT protocols play a role in settings where all nodes are known to each other. Many other systems have been proposed and lie somewhere between these extremes. Distributed knowledge, consistency, and reaching consensus among selfish and mutually distrusting nodes are core topics in the theory and practice of distributed computing. Hence, the popularity of decentralized cryptocurrencies and consensus ledgers creates a unique opportunity for the field to explore this nascent domain and to influence it. This workshop aims at discussing questions of consistency, concurrency, distributed knowledge, integrity, and reaching consensus in the context of cryptocurrencies and consensus ledgers. The workshop solicits submissions describing current work addressing decentralized cryptocurrencies and consensus ledgers, including analytical results, work on systems, and/or position papers.

For more information, please see http://www.zurich.ibm.com/dccl/.

SIN 2016 9th International Conference on Security of Information and Networks, Rutgers University, New Jersey, NJ, USA, July 20-22, 2016. [posted here 2/8/16]
Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: development and realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next generation network architectures, protocols, systems and applications; security education curriculum; industrial experiences and challenges of the above. Doctoral students are encouraged to propose papers on ongoing research. Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo. Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. Proposals of special session(s) to be held in the main conference are welcome. Proposals are invited for workshops to be held in conjunction with SIN 2016 Conference. The workshop proposal theme should be closely related to the conference topics. Broad areas of interest include theory, tools, and applications of security for information, computer, network, and cloud but are not limited to, the following:
- Access control and intrusion detection
- Security of cyber-physical systems
- Autonomous and adaptive security
- Security tools and development platforms
- Computational intelligence techniques in security
- Security ontology, models, protocols & policies
- Computer network defense
- Standards, guidelines and certification
- Cryptographic techniques and key management
- Security-aware software engineering
- Trust and privacy
- Information assurance
- Malware analysis
- Network security and protocols
- Security in Mobile/Embedded Systems
- Cloud security
- Security education and innovative curriculum

For more information, please see http://www.sinconf.org.

PETS 2016 16th Privacy Enhancing Technologies Symposium, Darmstadt, Germany, July 19-22, 2016. [posted here 08/03/15]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to discuss recent advances and new perspectives on research in privacy technologies. New model as of PETS 2015: Papers undergo a journal-style reviewing process and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). PoPETs, a scholarly, open access journal for timely research papers on privacy, has been established as a way to improve reviewing and publication quality while retaining the highly successful PETS community event. Authors can submit papers to PoPETs four times a year, every three months on a predictable schedule. Authors are notified of the decisions about two months after submission. In addition to accept and reject decisions, papers may be provided with 'major revision' decisions, in which case authors are invited to revise and resubmit their article to one of the following two submission deadlines. NEW as of PETS 2016: PETS 2016 also solicits submissions for Systematization of Knowledge (SoK) papers. These are papers that critically review, evaluate, and contextualize work in areas for which a body of prior literature exists, and whose contribution lies in systematizing the existing knowledge in that area. Authors are encouraged to view our FAQ about the submission process. Suggested topics include but are not restricted to:
- Behavioural targeting
- Building and deploying privacy-enhancing systems
- Crowdsourcing for privacy
- Cryptographic tools for privacy
- Data protection technologies
- Differential privacy
- Economics of privacy and game-theoretical approaches to privacy
- Forensics and privacy
- Human factors, usability and user-centered design for PETs
- Information leakage, data correlation and generic attacks to privacy
- Interdisciplinary research connecting privacy to economics, law, ethnography, psychology, medicine, biotechnology
- Location and mobility privacy
- Measuring and quantifying privacy
- Obfuscation-based privacy
- Policy languages and tools for privacy
- Privacy and human rights
- Privacy in ubiquitous computing and mobile devices
- Privacy in cloud and big-data applications
- Privacy in social networks and microblogging systems
- Privacy-enhanced access control, authentication, and identity management
- Profiling and data mining
- Reliability, robustness, and abuse prevention in privacy systems
- Surveillance
- Systems for anonymous communications and censorship resistance
- Traffic analysis
- Transparency enhancing tools

For more information, please see http://petsymposium.org/.

HAISA 2016 International Symposium on Human Aspects of Information Security & Assurance, Frankfurt Germany, July 19 - 21, 2016. [posted here 1/18/16]
It is commonly acknowledged that security requirements cannot be addressed by technical means alone, and that a significant aspect of protection comes down to the attitudes, awareness, behaviour and capabilities of the people involved. Indeed, people can potentially represent a key asset in achieving security, but at present, factors such as lack of awareness and understanding, combined with unreasonable demands from security technologies, can dramatically impede their ability to do so. Ensuring appropriate attention and support for the needs of users should therefore be seen as a vital element of a successful security strategy. People at all levels (i.e. from organisations to domestic environments; from system administrators to end-users) need to understand security concepts, how the issues may apply to them, and how to use the available technology to protect their systems. In addition, the technology itself can make a contribution by reducing the demands upon users, simplifying protection measures, and automating a variety of safeguards. With the above in mind, this symposium specifically addresses information security issues that relate to people. It concerns the methods that inform and guide users' understanding of security, and the technologies that can benefit and support them in achieving protection. The symposium welcomes papers addressing research and case studies in relation to any aspect of information security that pertains to the attitudes, perceptions and behaviour of people, and how human characteristics or technologies may be positively modified to improve the level of protection. Indicative themes include:
- Information security culture
- Awareness and education methods
- Enhancing risk perception
- Public understanding of security
- Usable security
- Psychological models of security software usage
- User acceptance of security policies and technologies
- User-friendly authentication methods
- Biometric technologies and impacts
- Automating security functionality
- Non-intrusive security
- Assisting security administration
- Impacts of standards, policies, compliance requirements
- Organizational governance for information assurance
- Simplifying risk and threat assessment
- Understanding motivations for misuse
- Social engineering and other human-related risks
- Privacy attitudes and practices
- Computer ethics and security

For more information, please see http://haisa.org/.

DBSec 2016 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Trento, Italy, July 18-21, 2016. [posted here 1/4/16]
DBSec is an annual international conference covering research in data and applications security and privacy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, and applications security. Topics of interest include (but are not limited to):
- access control
- anonymity
- applied cryptography in data security
- authentication
- big data security
- data and system integrity
- data protection
- database security
- digital rights management
- identity management
- intrusion detection
- knowledge discovery and privacy
- methodologies for data and application security
- network security
- organizational security
- privacy
- secure distributed systems
- secure information integration
- secure Web services
- security and privacy in crowdsourcing
- security and privacy in IT outsourcing
- security and privacy in the Internet of Things
- security and privacy in location-based services
- security and privacy in P2P scenarios and social networks
- security and privacy in pervasive/ubiquitous computing
- security and privacy in cloud scenarios
- security and privacy policies
- security management
- security metrics
- threats, vulnerabilities, and risk management
- trust and reputation systems
- trust management
- wireless and mobile security
- biometrics

For more information, please see http://dbsec2016.fbk.eu.

SHPCS 2016 11th International Workshop on Security and High Performance Computing Systems, Held in conjunction with the 2016 International Conference on High Performance Computing & Simulation (HPCS 2016), Innsbruck, Austria, July 18 - 22, 2016. [posted here 1/18/16]
Providing high performance computing and security is a challenging task. Internet, operating systems and distributed environments currently suffer from poor security support and cannot resist common attacks. Adding security measures typically degrade performance. This workshop addresses relationships between security, high performance and distributed computing systems in four directions. First, it considers how to add security properties (authentication, confidentiality, integrity, non-repudiation, access control) to high performance computing systems and how they can be formally verified both at design-time (formal verification) and at run-time (run-time verification). In this case, safety properties can also be addressed, such as availability and fault tolerance for high performance computing systems. Second, it addresses vulnerabilities and security threats (and remediation) targeting HPC, grid, cloud and mobile environments. Third, it covers how to use HPC systems to solve security problems. For instance, a grid computation can break an encryption code, a cluster can support high performance intrusion detection or a distributed formal verification system. More generally, this topic addresses every efficient use of a high performance computing systems to improve security. Fourth, it investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives. In all these directions, various formal analyses, as well as performance analyses or monitoring techniques can be conducted to show the efficiency of a security infrastructure. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security related to HPC, distributed, network and mobile environments, as well as case studies and implementation experiences. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems.

For more information, please see http://hpcs2016.cisedu.info/2-conference/workshops---hpcs2016/workshop09-shpcs.

WiSec 2016 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Darmstadt, Germany, July 18-20, 2016. [posted here 1/25/16]
ACM WiSec is the leading ACM conference dedicated to all aspects of security and privacy in wireless and mobile networks and systems and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the security and privacy of mobile software platforms, usable security and privacy, biometrics, cryptography, and the increasingly diverse range of mobile or wireless applications such as Internet of Things, and Cyber-Physical Systems. The conference welcomes both theoretical as well as systems contributions. Topics of interest include:
- Security & privacy for smart devices (e.g., smartphones)
- Wireless and mobile privacy and anonymity
- Secure localization and location privacy
- Cellular network fraud and security
- Jamming attacks and defenses
- Key management (agreement or distribution) for wireless or mobile systems
- Information-theoretic security schemes for wireless systems
- Theoretical and formal approaches for wireless and mobile security
- Cryptographic primitives for wireless and mobile security
- NFC and smart payment applications
- Security and privacy for mobile sensing systems
- Wireless or mobile security for emerging applications (e.g, privacy in health, automotive, avionics, smart grid, or IoT applications)
- Physical tracking security and privacy
- Usable mobile security and privacy
- Economics of mobile security and privacy
- Bring Your Own Device (BYOD) security
- Mobile malware and platform security
- Security for cognitive radio and dynamic spectrum access systems
- Security protocols for wireless networking

For more information, please see http://www.sigsac.org/wisec/WiSec2016/.

Infer 2016 International Workshop on Inference and Privacy in a Hyperconnected World, Darmstadt, Germany, July 18, 2016. [posted here 4/18/16]
The fields of embedded computing, wireless communication, data mining and artificial intelligence are exhibiting impressive improvements. Their combination fosters the emergence of "smart environments": Systems made of networked physical objects embedded in public places and private spheres of everyday individuals. This trend is supporting the rise of a broad variety of data-driven services that are highly customized to various aspect of our life, and hold great social and economic potential. Examples include wearable computing systems and applications for monitoring of personal health and physical/social activities; Intelligent Transport Systems (ITS) relying on cars that are becoming increasingly aware of their environment and drivers; and home automation systems that even support face and emotion recognition applications and provide web access to entirely novel types of content. Such disruptive technologies are expected to increasingly rely on sophisticated machine learning and statistical inference techniques to obtain a much clearer semantic understanding of people' states, activities, environments, contexts and goals. However, these developments also raise new technical, social, ethical and legal privacy challenges which, if left unaddressed, will jeopardize the wider deployment and thus undermine potential social and economic benefits of the aforementioned emerging technologies. Indeed, algorithms increasingly used for complex information processing in today's hyperconnected society are rarely designed with privacy and data protection in mind. On the other hand, privacy researchers are increasingly interested in leveraging machine learning and inference models when designing both attacks and innovative privacy-enhancing tools. Aiming to foster an exchange of ideas and an interdisciplinary discussion on both theoretical and practical issues that applying inference models to jeopardize/enhance data protection and privacy may entail, this workshop provides researchers and practitioners with a unique opportunity to share their perspectives with others interested in the various aspects of privacy and inference.

For more information, please see https://www.sit.fraunhofer.de/en/infer2016/.

EuroUSEC 2016 1st European Workshop on Usable Security, Affiliated with PETS 2016, Darmstadt, Germany, July 18, 2016. [posted here 1/18/16]
The aim of this workshop is to bring together researchers from different areas of computer science such as security, visualisation, artificial intelligence and machine learning as well as researchers from other domains such as psychology, social science and economics. We encourage submissions from collaborative research by authors of multiple fields. Topics of interest include:
- Usability evaluation of existing security and privacy paradigms or technologies
- Design and evaluation of novel security and privacy paradigms or technologies
- Evaluation of existing security and privacy awareness and education tools
- Design and evaluation of novel security and privacy awareness and education tools
- Lessons learned from the design, deployment, management or the evaluation of security and privacy paradigms or technologies
- Foundations of usable security and privacy
- Psychological, sociological and economic aspects of security and privacy
- Methodology for usable security and privacy research

For more information, please see https://eurousec.secuso.org/2016/.

DIMVA 2016 13th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, San Sebastian, Spain, July 7-8, 2016. [posted here 12/7/15]
The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. DIMVA solicits submission of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, and related systems security topics. As per our tradition, DIMVA encourages submissions from the following broad areas:
INTRUSION DETECTION
- Novel approaches and domains
- Insider detection
- Prevention and response
- Data leakage and exfiltration
- Result correlation and cooperation
- Evasion and other attacks
- Potentials and limitations
- Operational experiences
- Privacy, legal and social aspects
- Targeted attacks
MALWARE DETECTION
- Automated analyses
- Behavioral models
- Prevention and containment
- Classification
- Lineage
- Forensics and recovery
- Underground economy
VULNERABILITY ASSESSMENT
- Vulnerability detection
- Vulnerability prevention
- Vulnerability analysis
- Exploitation prevention
- Situational awareness
- Active probing

For more information, please see http://dimva2016.mondragon.edu.

PMSPCR 2016 Workshop on Process Mining for Security, Privacy, Compliance & Resilience, Held in conjunction with the 19th International Conference on Business Information Systems (BIS 2016), Leipzig, Germany, July 6-8, 2016. [posted here 1/25/16]
Security in Business Processes (BP) is an extension to well-known security analysis. Security rules are either defined by regulation, e.g. data protection law, or as guidelines for good conducts, e.g. Basel III or SOX. Business guidelines, e.g. ITIL and COBIT, form a specification of regulation and business conduct, but there are almost no satisfying approaches as far as computer science is concerned. This workshop deals with process mining as a means for security analysis. Three phases may be identified: process analysis before execution, monitoring, or after execution of the BP. With regard to the latter, logs recording the events executed in BP build the basis for Process Mining (PM), which provides methods and tools to ensure compliance to regulations and guidelines. This workshop aims to explore the potentials of process mining to bridge the gap between an analysis of workflows and a certification of compliance and security. We invite innovative and previously undisclosed contributions, but also case studies and best practices, which present the analysis of business processes related to security, resilience and privacy aspects "by design", during runtime, and forensically, based on the analysis of process logs. In this regard, we explicitly invite submission of practical contributions.

For more information, please see http://bis.kie.ue.poznan.pl/bis2016/workshops/pmspcr-2016/.

CSF 2016 29th IEEE Computer Security Foundations Symposium, Lisbon, Portugal, June 28 - July 1, 2016. [posted here 1/25/16]
The Computer Security Foundations Symposium is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, such as formal security models, relationships between security properties and defenses, principled techniques and tools for design and analysis of security mechanisms, as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security: submissions that lack foundational aspects risk rejection. This year, CSF will use a light form of double blind reviewing (see the conference website). New results in computer security are welcome. We also encourage challenge/vision papers, which may describe open questions and raise fundamental concerns about security. Possible topics for all papers include, but are not limited to: access control, accountability, anonymity and privacy, authentication, computer-aided cryptography, data and system integrity, database security, decidability and complexity, distributed systems security, electronic voting, formal methods and verification, decision theory, hardware-based security, information flow, intrusion detection, language-based security, network security, data provenance, mobile security, security metrics, security protocols, software security, socio-technical security, trust management, usable security, web security.

SPECIAL SESSIONS: This year, we strongly encourage papers in two foundational areas of research we would like to promote at CSF:
- PRIVACY (Chair: Daniel Kifer). CSF 2015 will include a special session on privacy foundations and invites submissions on innovations in practice, as well as definitions, models, and frameworks for communication and data privacy, principled analysis of deployed or proposed privacy protection mechanisms, and foundational aspects of practical privacy technologies. We especially encourage submissions aiming at connecting the computer science point of view on privacy with that of other disciplines (law, economics, sociology, statistics...)
- SECURITY ECONOMICS (Chair: Jens Grossklags). There is an interplay between important system properties including privacy, security, efficiency, flexibility, and usability. Diverse systems balance these properties differently, and as such provide varied benefits (for users) for different costs (for builders and attackers). In short, securing systems is ultimately an economic question. CSF 2016 will include a special session on security economics, where we invite submissions on foundational work in this area. Topics include, but are not limited to, risk management and cyber-insurance, investments in information security, security metrics, decision and game theory for security, and cryptocurrencies.
These papers will be reviewed under the supervision of the special session chairs. They will be presented at the conference, and will appear in the CSF proceedings, without any distinction from the other papers.

For more information, please see http://csf2016.tecnico.ulisboa.pt/.

MedSPT 2016 1st International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber Physical System Held in conjunction with IEEE Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE 2016), Washington DC, USA, June 27-29, 2016. [posted here 2/15/16]
Medical Cyber Physical Systems (MCPS) are life-critical, context-aware, and networked systems of medical devices that provide tight integration and coordination between the cyber world of computing and communications and the physical world. Recent advances in mobile and wearable healthcare, communication, and Cloud computing technologies are making MCPS a promising platform for scientific advancement and development of new tools that may improve patients' health and wellbeing. Coming along with the potential social economic and personal healthcare benefits are significant security, privacy, and trustworthiness challenges in MCPS, due to unreliable embedded software controlling medical devices, weak computing and networking capabilities of medical devices, and adaptive privacy requirements introduced by complicated physiological dynamics of patient bodies. So far, the security, privacy, and trustworthiness initiatives for MCPS are still at an early stage. On one hand, more and more concerns have been raised in the fields and many security, privacy, and trustworthiness-enhancing techniques have been proposed to resolve these concerns. On the other hand, the emerging mobile and wearable technologies revolutionize the entire MCPS as well as its models of security, privacy, and trustworthiness. It is still not clear that these proposed techniques are useful and effective in practice and how quickly or even possibly they are going to be adopted. This workshop aims to bring together the technologists and researchers who share interest in the area of security, privacy and trustworthiness in medical cyber physical systems, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the design of secure, privacy, or trustworthiness architectures, protocols, algorithms, services, and applications on medical cyber physical systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for security, privacy and trustworthiness related issues in the context of medical cyber physical system. To ensure complete coverage of the advances in this field, the 2016 MedSPT workshop solicits original contributions in, but not limited to, the following topic areas:
- Mobile Healthcare Security
- Smartphone Security for Healthcare
- Wearable Device Security
- Medical Device Security
- Security and Privacy on Implantable Medical Sensors
- Biometrics
- Wireless Communication Security
- Security and Privacy for Wireless Body Area Networks
- Secure RFID technology in MCPS
- Secure Cloud Health System
- Big Health Data Security
- Differential Privacy on Health Data
- Secure Machine Learning on Health Data
- Privacy Preserving Big Health Data Analysis
- Novel Threats and Attack Models
- Novel Trust Models
- Security Detection and Evaluation
- Key Management
- Cryptography for Health Systems
- Security Management (administration and training) in Health Systems
- Security in Virtualized Health Systems
- Security Risk Assessment
- Security and Privacy Policies in Health Systems
- Security in Electronic Health Record Systems

For more information, please see http://faculty.umb.edu/xiaohui.liang/MedSPT16/.

GraMSec 2016 3rd International Workshop on Graphical Models for Security, Co-located with CSF 2016, Lisbon, Portugal, June 27, 2016. [posted here 3/7/16]
Graphical security models provide an intuitive but systematic approach to analyze security weaknesses of systems and to evaluate potential protection measures. Formal methods and cyber security researchers, as well as security professionals from industry and government, have proposed various graphical security modeling schemes. Such models are used to capture different security facets (digital, physical, and social) and address a range of challenges including vulnerability assessment, risk analysis, defense analysis, automated defensing, secure services composition, policy validation and verification. The objective of the GraMSec workshop is to contribute to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage. The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of graphical models for security. The topics of the workshop include, but are not limited to:
- Graphical models for threat modeling and analysis
- Graphical models for risk analysis and management
- Graphical models for requirements analysis and management
- Textual and graphical representation for system, organizational, and business security
- Visual security modeling and analysis of socio-technical and cyber-physical systems
- Graphical security modeling for cyber situational awareness
- Graphical models supporting the security by design paradigm
- Methods for quantitative and qualitative analysis of graphical security models
- Formal semantics and verification of graphical security models
- Methods for (semi-)automatic generation of graphical security models
- Enhancement and/or optimization of existing graphical security models
- Scalable evaluation of graphical security models
- Evaluation algorithms for graphical security models
- Dynamic update of graphical security models
- Game theoretical approaches to graphical security modeling
- Attack trees, attack graphs and their variants
- Stochastic Petri nets, Markov chains, and Bayesian networks for security
- UML-based models and other graphical modeling approaches for security
- Software tools for graphical security modeling and analysis
- Case studies and experience reports on the use of graphical security modeling paradigm

For more information, please see http://gramsec.uni.lu/.

ACNS 2016 14th International Conference on Applied Cryptography and Network Security, London, United Kingdom, June 19-22, 2016. [posted here 08/24/15]
The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (incl. network and computer security) and privacy. This includes submissions from academia/industry on traditional and emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems or applications. Submissions may focus on the modelling, design, analysis (incl. security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms/protocols/standards/implementations/technologies/devices/systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Some topics of interest include but not limited to:
- Access control
- Applied cryptography
- Automated security analysis
- Biometric security/privacy
- Complex systems security
- Critical infrastructures
- Cryptographic primitives
- Cryptographic protocols
- Data protection
- Database/system security
- Digital rights management
- Email and web security
- Future Internet security
- Identity management
- IP protection
- Internet fraud, cybercrime
- Internet-of-Things security
- Intrusion detection
- Key management
- Malware
- Mobile/wireless/5G security
- Network security protocols
- Privacy/anonymity, PETs
- Pervasive security
- Security in e-commerce
- Security in P2P systems
- Security in grid systems
- Cloud security/privacy
- Security/privacy metrics
- Trust management
- Ubiquitous security/privacy
- Human factors in security
- Usability in security/privacy

For more information, please see http://acns2016.sccs.surrey.ac.uk/.

I-SAT 2016 International Workshop on Information Security, Assurance, and Trust, Vancouver, BC, Canada, June 16-18, 2016. [posted here 1/18/16]
The goal of this workshop is to provide a forum for researchers, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the areas of information and system security, assurance, and trust. I-SAT2016 will address novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms and solutions targeting emerging topics in such fields will be presented and discussed by researchers and industrial experts. The main focus of the workshop will include, but not limited to the following:
- Application Security and Threat Management
- Cyber Security, Privacy and Trust
- Modern Authentication Paradigms
- Big data security
- Database security
- Digital Fraud detection
- Social engineering and insider threats
- Cyber threat intelligence
- Cloud, Mobile, and Internet-of-Things security
- Digital forensics
- Intrusion Detection
- Biometrics
- Botnet and DDoS detection and control

For more information, please see http://i-sat.ca.

LACI 2016 1st IEEE International Workshop on Log Analytics for Cyber Intelligence, Held in conjunction with the IEEE Signature Conference on Computers, Software, & Applications (COMPSAC 2016), Atlanta, Georgia, USA, June 10-14, 2016. [posted here 2/8/16]
This workshop will bring researchers from academia and industry to discuss platforms, tools, and techniques to store, process and analyze large amount of log data with the intent to gather meaningful information for practical purposes such as monitoring of data security breaches, conducting of forensic investigation, auditing of policies for compliance, and debugging and testing of applications. This workshop will focus on challenges, experiences and lessons learned on various aspects of log data analysis-based intelligence gathering for various embedded, decentralized, and distributed systems, including but not limited to web, mobile, cloud, and Internet of Things (IoT). Topics of interest include, but are not limited to, the following:
- Platforms, tools, language supports for storing, processing, and querying log data to gather intelligence
- Log analytics and intelligence gathering for various types of applications (web, mobile, cloud, IoT) and environments (wired network, wireless network)
- Information visualization support for log analytics
- Requirement and design of software and applications to store adequate log data to support analytics and gathering of intelligence
- Analysis and gathering of intelligence from log data under anonymized, obfuscated, and encrypted state
- Analysis and gathering of intelligence from log data obtained from firewall, intrusion detection systems, operating systems, embedded systems, hand held devices, and cyber physical systems
- Threat intelligence from large volumes of cyber threat log data like STIX and CybOX feeds
- Analyzing multiple and dissimilar log data sources to gather intelligence
- Disaster recovery through offline log analytics and intelligence gathering
- Integration of log analytics-based intelligence gathering research into teaching and hands on labs
- Application of log data analysis to provide intelligence support for forensics and criminal investigation
- Impact or need for laws and policies to support intelligence gathering through log analytics
- Experience and lessons learned from log data analytics-based intelligence gathering
- Standardization of new log data format for intelligence gathering

For more information, please see http://www.computer.org/web/compsac2016/laci.

STPSA 2016 11th IEEE International Workshop on Security, Trust, and Privacy for Software Applications, Held in conjunction with COMPSAC 2016, Atlanta, GA, USA, June 10-14, 2016. [posted here 1/25/16]
Information security has become a major concern for both pervasive and non-pervasive software applications. Software systems must be engineered with reliable protection mechanisms with respect to security, privacy, and trust, while still delivering the expected value of the software to their customers. The traditional approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security, trust, and privacy (STP) issues. These issues should be addressed by building more effective STP-aware software applications. The principal obstacle in developing STP-aware software is that current software specification, design, implementation, and testing practices do not include adequate methods and tools to achieve security, trust, and privacy goals. As most systems now are Internet-based, the number of attackers is increased dramatically and threat scenarios have changed. Traditional security measures do not fit well for the software of pervasive applications. Since location and contexts are key attributes of pervasive applications, the privacy issues need to be handled in a novel manner than traditional software applications. The devices in pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need for new trust models for pervasive computing applications. In this workshop, we will also welcome papers on the challenges and requirements of security, privacy, and trust for pervasive software applications. This workshop will bring researchers from academia and industry to discuss methods and tools to achieve security, trust, and privacy goals of both pervasive and pervasive software applications. This workshop will focus on techniques, experiences and lessons learned with respect to the state of art for the security, trust, and privacy aspects of both pervasive and non-pervasive software applications along with some open issues.

For more information, please see http://staging.computer.org/web/compsac2016/stpsa.

TELERISE 2016 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, Co-located with ICWE 2016, Università della Svizzera Italiana (USI) Lugano, Switzerland, June 9, 2016. [posted here 2/1/16]
Information sharing on the Web is essential for today's business and societal transactions. Nevertheless, such a sharing should not violate the security and privacy requirements either dictated by Law to protect data subjects or by internal regulations provided both at organisation and individual level. An effectual, rapid, and unfailing electronic data sharing among different parties, while protecting legitimate rights on these data, is a key issue with several shades. Among them, how to translate the high-level law obligations, business constraints, and users' requirements into system-level privacy policies, as well as engineering efficient and practical Web applications-based solutions for policy definition and enforcement. TELERISE aims at providing a forum for researchers and engineers, in academia as well as in industry, to foster an exchange of research results, experiences, and products in the area of privacy preserving, secure data management, and engineering on the Web, from a technical and legal perspective. The ultimate goal is to conceive new trends and ideas on designing, implementing, and evaluating solutions for privacy-preserving information sharing, with an eye to the cross-relations between ICT and regulatory aspects of data management and engineering. Topics of interest are (but not limited to):
- Model-based and experimental assessment of data protection
- Privacy in identity management and authentication
- Modeling and analysis languages for representation, visualization, specification of legal regulations
- Technical, legal, and user requirements for data protection
- User-friendly authoring tools to edit privacy preferences
- IT infrastructures for privacy and security policies management
- IT infrastructure for supporting privacy and security policies evolution
- Privacy and security policies conflict analysis and resolution strategies
- Electronic Data Sharing Agreements representation: languages and management infrastructure
- Cross-relations between privacy-preserving technical solutions and legal regulations
- Privacy aware access and usage control
- Privacy and security policies enforcement mechanisms
- Privacy preserving data allocation and storage
- Software systems compliance with applicable laws and regulations
- Heuristic for pattern identification in law text
- Empirical analysis of consumer's awareness of privacy and security policies

For more information, please see http://www.iit.cnr.it/telerise2016/.

MSPN 2016 International Conference on Mobile, Secure and Programmable Networking, Paris, France, June 1-3, 2016. [posted here 2/15/16]
The rapid deployment of new infrastructures based on network virtualization and Cloud computing triggers new applications and services that in turn generate new constraints such as security and/or mobility. The International Conference on Mobile, Secure and Programmable Networking aims at providing a top forum for researchers and practitioners to present and discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and Cloud computing, network programming, Internet of things and Cloud computing convergence, Software Defined Networks (SDN) and their security. Position papers are also welcome and should be clearly marked as such. The accepted papers wil be published as a post-proceedings in Springer's LNCS. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal, including, but not limited to, the following topic areas:
- Software Defined Networks (tools, software, concepts)
- Virtualization and Cloud computing
- Networks and Cloud computing
- Mobile computing and Mobile Cloud computing
- Security, Privacy and Trust in Networks, Services and Applications
- Green computing and networking
- Ubiquitous Computing and Sensor Networks
- System design and testbeds
- Cross-Layer Design and Optimization
- Modeling and performance evaluation
- 4G and 5G networks
- Social networks
- Cooperative networking and Self-Organizing networks
- Distributed sensing, actuation, and control in cyber-physical systems
- Internet of Things
- Vehicular networks and Connected Cars
- Crowdsourcing
- Datacenter networking
- Location-based Services
- Smart cities

For more information, please see http://cedric.cnam.fr/workshops/mspn2016/.

CPSS 2016 2nd ACM Cyber-Physical System Security Workshop, Held in conjunction with ACM AsiaCCS 2016 Conference, Xi'an, China, May 31, 2016. [posted here 08/17/15]
Cyber-Physical Systems (CPS) consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There are a multitude of CPS devices and applications being deployed to serve critical functions in our lives. The security of CPS becomes extremely important. This workshop will provide a platform for professionals from academia, government, and industry to discuss how to address the increasing security challenges facing CPS. Besides invited talks, we also seek novel submissions describing theoretical and practical security solutions to CPS. Papers that are pertinent to the security of embedded systems, SCADA, smart grid, and critical infrastructure networks are all welcome, especially in the domains of energy and transportation. Topics of interest include, but are not limited to:
- Adaptive attack mitigation for CPS
- Authentication and access control for CPS
- Availability, recovery and auditing for CPS
- Data security and privacy for CPS
- Embedded systems security
- EV charging system security
- Intrusion detection for CPS
- IoT security
- Key management in CPS
- Legacy CPS system protection
- Lightweight crypto and security
- SCADA security
- Security of industrial control systems
- Smart grid security
- Threat modeling for CPS
- Urban transportation system security
- Vulnerability analysis for CPS
- Wireless sensor network security

For more information, please see http://icsd.i2r.a-star.edu.sg/cpss16/.

ASIACCS 2016 11th ACM Asia Conference on Computer and Communications Security, Xi'an, China, May 31 - June 3, 2016. [posted here 08/03/15]
Building on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then ASIACCS has been held in Singapore (2007), Tokyo (2008), Sydney (2009), Beijing (2010), Hong Kong (2011), Seoul (2012), Hangzhou (2013), Kyoto (2014), and Singapore (2015). Considering that this series of meetings has moved beyond a symposium and it is now widely regarded as the Asia version of CCS, the full name of AsiaCCS is officially changed to ACM Asia Conference on Computer and Communications Security starting in June 2015. The 11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016) will be held in 31 May - 3 June, 2016 in Xi'an, China. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2016 include, but are not limited to:
- Access control
- Accounting and audit
- Applied cryptography
- Authentication
- Cloud computing security
- Cyber-physical security
- Data and application security
- Digital forensics
- Embedded systems security
- Formal methods for security
- Hardware-based security
- Intrusion detection
- Key management
- Malware and botnets
- Mobile computing security
- Network security
- Operating system security
- Privacy-enhancing technology
- Security architectures
- Security metrics
- Software security
- Smart grid security
- Threat modeling
- Trusted computing
- Usable security and privacy
- Web security
- Wireless security

For more information, please see http://meeting.xidian.edu.cn/conference/AsiaCCS2016/home.html.

IFIP SEC 2016 31th IFIP TC-11 SEC 2016 International Information Security and Privacy Conference, Ghent, Belgium, May 30 - June 1, 2016. [posted here 07/27/15]
The IFIP SEC conference is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 on Security and Privacy Protection in Information Processing Systems (TC-11, www.ifiptc11.org). We seek submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy protection in ICT Systems. Topics of interest:
- Access control and authentication
- Applied cryptography
- Audit and risk analysis
- Big data security and privacy
- Cloud security and privacy
- Critical infrastructure protection
- Cyber-physical systems security
- Data and applications security
- Digital forensics
- Human aspects of security and privacy
- Identity management
- Information security education
- Information security management
- Information technology misuse and the law
- Managing information security functions
- Mobile security
- Multilateral security
- Network & distributed systems security
- Pervasive systems security
- Privacy protection and Privacy-by-design
- privacy enhancing technologies
- Surveillance and counter-surveillance
- Trust management

For more information, please see http://ifipsec.org/2016/.

IoTPTS 2016 2nd ACM International Workshop on IoT Privacy, Trust, and Security, Held in conjunction with the 11th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2016), Xian, China, May 30, 2016. [posted here 11/2/15]
The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and now is the time to ensure privacy, trust, and security are designed into these systems from the beginning. We encourage submissions on all aspects of IoT privacy, trust, and security. Topics of interest include (but are not limited) to the following areas:
- Privacy and IoT data
- Privacy attacks for IoT
- Trust management and device discoverability for IoT
- Usability of privacy and security systems in IoT
- User risk perceptions and modeling for IoT
- Policy Management and enforcement for IoT
- Authentication and access control for users for IoT
- Cryptography for IoT
- Attack detection and remediation for IoT
- Security architectures for IoT systems and applications

For more information, please see https://sites.google.com/site/iotpts2016/.

WTMC 2016 International Workshop on Traffic Measurements for Cybersecurity, Co-located with 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016), Xi'an, China, May 30, 2016 . [posted here 11/16/15]
Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals. Current communication networks are increasingly becoming pervasive, complex, and ever-evolving due to factors like enormous growth in the number of network users, continuous appearance of network applications, increasing amount of data transferred, and diversity of user behaviors. Understanding and measuring traffic in such networks is a difficult yet vital task for network management but recently also for cybersecurity purposes. Network traffic measuring and monitoring can, for example, enable the analysis of the spreading of malicious software and its capabilities or can help to understand the nature of various network threats including those that exploit users' behavior and other user's sensitive information. On the other hand network traffic investigation can also help to assess the effectiveness of the existing countermeasures or contribute to building new, better ones. Recently, traffic measurements have been utilized in the area of economics of cybersecurity e.g. to assess ISP "badness" or to estimate the revenue of cyber criminals. Topics of interest include, but are not limited to:
- Measurements for network incidents response, investigation and evidence handling
- Measurements for network anomalies detection
- Measurements for economics of cybersecurity
- Network traffic analysis to discover the nature and evolution of the cybersecurity threats
- Measurements for assessing the effectiveness of the threats detection/prevention methods and countermeasures
- Novel passive, active and hybrid measurements techniques for cybersecurity purposes
- Traffic classification and topology discovery tools for monitoring the evolving status of the network from the cybersecurity perspective
- Correlation of measurements across multiple layers, protocols or networks for cybersecurity purposes
- Novel visualization approaches to detect network attacks and other threats
- Analysis of network traffic to provide new insights about network structure and behavior from the security perspective
- Measurements of network protocol and applications behavior and its impact on cybersecurity and users' privacy
- Measurements related to network security and privacy

For more information, please see http://wtmc.info.

MOST 2016 Workshop on Mobile Security Technologies, Co-located with 37th IEEE Symposium on Security and Privacy (IEEE S&P 2016), San Jose, CA, USA, May 26, 2016. [posted here 11/9/15]
Mobile Security Technologies (MoST) brings together researchers, practitioners, policy makers, and hardware and software developers of mobile systems to explore the latest understanding and advances in the security and privacy for mobile devices, applications, and systems. With the development of new mobile platforms, such as Android and iOS, mobile computing has shown exponential growth in popularity in recent years. To benefit from the availability of constantly-growing consumer base, new services and applications are being built from the composition of existing ones at breakneck speed. This rapid growth has also been coupled with new security and privacy concerns and challenges. For instance, more and more sensitive content is being collected and shared by third-party applications that, if misused, can have serious security and privacy repercussions. Consequently, there is a growing need to study and address these new challenges. We are seeking both short position papers (2-4 pages) and longer papers (a maximum of 10 pages). The topics of interest include, but are not limited to:
- Identity and access control for mobile platforms
- Mobile app security
- Mobile cloud security
- Mobile hardware security
- Mobile middleware and OS security
- Mobile web and advertisement security
- Protecting security-critical applications of mobile platforms
- Secure application development tools and practices
- Security study of mobile ecosystems
- Unmanned aerial vehicles (UAVs) security
- Wearable and IoT security

For more information, please see http://ieee-security.org/TC/SPW2016/MoST/cfp.html.

LASER 2016 4th Workshop on Learning from Authoritative Security Experiment Results, Co-located with 37th IEEE Symposium on Security and Privacy (IEEE S&P 2016), San Jose, CA, USA, May 26, 2016. [posted here 11/16/15]
The Learning from Authoritative Security Experiment Results (LASER) workshop series focuses on learning from and improving cyber security experimental results. LASER explores both positive and negative results, the latter of which are not often published. LASER's overarching goal is to foster a dramatic change in the paradigm of cyber security research and experimentation, improving the overall quality of practiced science. This year, LASER will focus on cyber security experimentation methods and results that demonstrate approaches to increasing the repeatability and archiving of experiments, methods, results, and data. Participants will find LASER to be a constructive and highly interactive venue featuring informal paper presentations and extended discussions. To promote a high level of interaction, attendance will be limited, with first preference given to participating authors. Additional seats will be available on a first-come first-served basis. LASER also seeks to foster good science in the next generation of cyber security researchers. As such, LASER offers a limited number of student scholarships for participation.

For more information, please see http://2016.laser-workshop.org/.

BioSTAR 2016 International Workshop on Bio-inspired Security, Trust, Assurance and Resilience, Co-located with 37th IEEE Symposium on Security and Privacy (IEEE S&P 2016), San Jose, CA, USA, May 26, 2016. [posted here 10/26/15]
As computing and communication systems continue to expand and offer new services, these advancements require more dynamic, diverse, and interconnected computing infrastructures. Unfortunately, defending and maintaining resilient and trustworthy operation of these complex systems are increasingly difficult challenges. Conventional approaches to Security, Trust, Assurance and Resilience (STAR for short) are often too narrowly focused and cannot easily scale to manage large, coordinated and persistent attacks in these environments. Designs found in nature are increasingly used as a source of inspiration for STAR and related networking and intelligence solutions for complex computing and communication environments. Nature's footprint is present in the world of Information Technology, where there are an astounding number of computational bio-inspired techniques. These well-regarded approaches include genetic algorithms, neural networks, ant algorithms, immune systems just to name a few. For example several networking management and security technologies have successfully adopted some of nature's approaches, such as swarm intelligence, artificial immune systems, sensor networks, moving target defense, diversity-based software design, etc. Nature has also developed an outstanding ability to recognize individuals or foreign objects and adapt/evolve to protect a group or a single organism. Solutions that incorporate these nature-inspired characteristics often have improved performance and/or provided new capabilities beyond more traditional methods. The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of nature-inspired STAR aspects in computing and communications. Topics of interests include, but are not limited to:
- Nature-inspired anomaly and intrusion detection
- Adaptation algorithms
- Biometrics
- Nature-inspired algorithms and technologies for STAR
- Biomimetics
- Artificial Immune Systems
- Adaptive and Evolvable Systems
- Machine Learning, neural networks, genetic algorithms for STAR
- Nature-inspired analytics and prediction
- Cognitive systems
- Sensor and actuator networks and systems
- Information hiding solutions (steganography, watermarking) for network traffic
- Cooperative defense systems
- Cloud-supported matire-inspired STAR
- Theoretical development in heuristics
- Management of decentralized networks
- Nature-inspired algorithms for dependable networks
- Platforms for STAR services
- Diversity in computing and communications
- Survivable and sustainable systems
- STAR management systems
- Autonomic cyber defenses

For more information, please see http://biostar.cybersecurity.bio/.

SPW 2016 Security and Privacy Workshops, Held in conjunction with the 37th IEEE Symposium on Security and Privacy (SP 2016), San Jose, CA, USA, May 26, 2016. [posted here 08/03/15]
Since 1980, the IEEE Symposium on Security and Privacy (SP) has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. To expand opportunities for scientific exchanges, the IEEE CS Technical Committee on Security and Privacy created the Security and Privacy Workshops (SPW). The typical purpose of such a workshop is to cover a specific aspect of security and privacy in more detail, making it easy for the participants to attend IEEE SP and a specialized workshop at SPW with just one trip. Furthermore, the co-location offers synergies for the organizers. The number of workshops and attendees has grown steadily during recent years. Workshops can be annual events, one time events, or aperiodic. The Security and Privacy Workshops in 2016 will be held on Thursday, May 26. All workshops will occur on that day. Up to six workshops will be hosted by SPW.

For more information, please see http://www.ieee-security.org/TC/SP2016/cfworkshops.html.

ICC-CISS 2016 IEEE International Conference on Communications (ICC 2016), Communication & Information System Security Symposium (CISS 2016), Kuala Lumpur, Malaysia, May 23-27, 2016. [posted here 10/5/15]
Over the past few decades, we have witnessed that the security issues are becoming more and more important in communication and information systems. Recent analysis shows that the global market for cyber security is about 100 billion US dollars in 2014 and it could expand to a few hundred billion US dollars in the next five years. To address the concerns from both academia and industry, this symposium is calling for original manuscripts that address any security aspects in communication and information systems, from the fundamental algorithm and protocol, to complex cyber system. For these systems, various criteria can be focused on, such as confidentiality, integrity, availability, privacy, etc., and different steps in the whole design, deployment and operation process can be considered, including the modeling, optimization, implementation, evaluation, management, etc. The Communication & Information Systems Security Symposium seeks original contributions in the following topical areas, and any other closely related areas:
- Anonymous communication, metrics and performance
- Attack, detection and prevention
- Authentication protocols and key management
- Availability and survivability of secure services and systems
- Biometric security: technologies, risks, vulnerabilities, bio-cryptography, mobile template protection
- Cloud, data center and distributed systems security
- Computer and network forensics
- Cryptography for network security
- Cyber security
- Digital rights management
- Firewall technologies
- Formal trust models, security modeling, and design of secure protocols
- Information systems security and security management
- Internet security and privacy
- Malware detection and damage recovery
- Network security metrics and performance
- Operating systems and application security
- Physical security and hardware/software security
- Privacy and privacy-enhancing technologies
- Security and privacy for mobile and wireless networks
- Security for cloud computing and networking
- Security for mobile and wireless networks
- Security for next-generation networks
- Security in virtual machine environments
- Security tools for communication and information systems
- Trustworthy computing
- Wired systems and optical network security

For more information, please see http://icc2016.ieee-icc.org/sites/icc2016.ieee-icc.org/files/u44/ICC16_CISS_CFP.pdf.

ICIMP 2016 11th International Conference on Internet Monitoring and Protection, Valencia, Spain, May 22-26, 2016. [posted here 12/7/15]
The International Conference on Internet Monitoring and Protection (ICIMP 2016) continues a series of special events targeting security, performance, vulnerabilities in Internet, as well as disaster prevention and recovery. Dedicated events focus on measurement, monitoring and lessons learnt in protecting the user. The design, implementation and deployment of large distributed systems are subject to conflicting or missing requirements leading to visible and/or hidden vulnerabilities. Vulnerability specification patterns and vulnerability assessment tools are used for discovering, predicting and/or bypassing known vulnerabilities. Vulnerability self-assessment software tools have been developed to capture and report critical vulnerabilities. Some of vulnerabilities are fixed via patches, other are simply reported, while others are self-fixed by the system itself. Despite the advances in the last years, protocol vulnerabilities, domain-specific vulnerabilities and detection of critical vulnerabilities rely on the art and experience of the operators; sometimes this is fruit of hazard discovery and difficult to be reproduced and repaired. System diagnosis represent a series of pre-deployment or post-deployment activities to identify feature interactions, service interactions, behavior that is not captured by the specifications, or abnormal behavior with respect to system specification. As systems grow in complexity, the need for reliable testing and diagnosis grows accordingly. The design of complex systems has been facilitated by CAD/CAE tools. Unfortunately, test engineering tools have not kept pace with design tools, and test engineers are having difficulty developing reliable procedures to satisfy the test requirements of modern systems. Therefore, rather than maintaining a single candidate system diagnosis, or a small set of possible diagnoses, anticipative and proactive mechanisms have been developed and experimented. In dealing with system diagnosis data overload is a generic and tremendously difficult problem that has only grown. Cognitive system diagnosis methods have been proposed to cope with volume and complexity.

For more information, please see http://www.iaria.org/conferences2016/ICIMP16.html.

SP 2016 37th IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 23-25, 2016. [posted here 08/03/15]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include:
- Access control and authorization
- Accountability
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Censorship resistance
- Cloud security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Forensics
- Hardware security
- Intrusion detection
- Malware and unwanted software
- Mobile and Web security and privacy
- Language-based security
- Network and systems security
- Privacy technologies and mechanisms
- Protocol security
- Secure information flow
- Security and privacy for the Internet of Things
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- System security
- Usable security and privacy

For more information, please see http://www.ieee-security.org/TC/SP2016/.

HST 2016 15th IEEE International Symposium on Technologies for Homeland Security, Waltham, MA, USA, May 10-12, 2016. [posted here 10/5/15]
The 15th annual IEEE Symposium on Technologies for Homeland Security brings together innovators from leading academic, industry, business, Homeland Security Centers of Excellence, and government programs to provide a forum to discuss ideas, concepts, and experimental results. Produced by IEEE with technical support from DHS S&T, IEEE, IEEE Boston Section, and IEEE-USA and organizational support from MIT Lincoln Laboratory, Raytheon, Battelle, and MITRE, this year's event will once again showcase selected technical paper and posters highlighting emerging technologies in the areas of:
- Cyber Security
- Land and Maritime Border Security
- Biometrics & Forensics
- Attack and Disaster Preparation, Recovery and Response

For more information, please see http://ieee-hst.org.

HOST 2016 IEEE International Symposium on Hardware Oriented Security and Trust, Washington DC, USA, May 5-7, 2016. [posted here 09/14/15]
Rapid proliferation of computing and communication systems with increasing computational power and connectivity into every sphere of modern life has brought security to the forefront of system design, test, and validation processes. The emergence of new application spaces for these systems in the internet-of-things (IoT) regime is creating new attack surfaces as well as new requirements for secure and trusted system operation. Additionally, the design, manufacturing and the distribution of microchip, PCB, as well as other electronic components are becoming more sophisticated and globally distributed with a number of potential security vulnerabilities. Therefore, hardware plays an increasingly important and integral role in system security with many emerging system and application vulnerabilities and defense mechanisms relating to hardware. IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aims to facilitate the rapid growth of hardware-based security research and development. HOST highlights new results in the area of hardware and system security. Relevant research topics include techniques, tools, design/test methods, architectures, circuits, and applications of secure hardware. HOST 2016 invites original contributions related to, but not limited by, the following topics:
- Hardware Trojan attacks and detection techniques
- Hardware-based security primitives (PUFs, RNGs)
- Side-channel attacks and protection
- Security, privacy, and trust protocols
- Metrics, policies, and standards related to hardware security
- Security of biomedical systems, e-health, and medicine
- Secure system-on-chip (SoC) architecture
- Hardware IP trust (watermarking, metering, trust verification)
- Trusted manufacturing including split manufacturing and 3D ICs
- Security analysis and protection of Internet of Things (IoT)
- Secure and efficient implementation of crypto algorithms
- Reverse engineering and hardware obfuscation
- Supply chain risks mitigation including counterfeit detection & avoidance
- Hardware tampering attacks and protection
- Hardware techniques that ensure software and/or system security

For more information, please see http://www.hostsymposium.org.

Cybersecurity 2016 Cybersecurity Symposium, Coeur d'Alene, Idaho, U.S.A, April 19-20, 2016. [posted here 11/2/15]
The 2016 Cybersecurity Symposium is an opportunity for academic researchers from all disciplines, and stakeholders from industry and government to meet and discuss state-of-the-art techniques and processes, with the purpose of improving the cybersecurity of today's critical systems. This symposium seeks submissions from academia, industry, and government describing innovative research, case studies, and best practices on all practical and theoretical aspects of cybersecurity. We are interested in extended abstracts on topics including, but not limited to:
- Network Security
- Secure Coding Practices
- Software Analysis
- Security Policies
- Economic Impacts of Security
- Privacy
- Socialogical and Behavioral Aspects of Security and Privacy
- Critical Infrastructure Security
- Transportation System Security
- Power grid/Smart Grid Security
- System Security Case Studies

For more information, please see http://www.cybersecuritysymposium.com.

ESSoS 2016 International Symposium on Engineering Secure Software and Systems, University of London, London, UK, April 6 - 8, 2016. [posted here 07/13/15]
Trustworthy, secure software is a core ingredient of the modern world. So is the Internet. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. High-quality security building blocks (e.g., cryptographic components) are necessary but insufficient to address these concerns. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software's security properties. The goal of this symposium, which will be the eighth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program including two keynote presentations. In addition to academic papers, the symposium encourages submission of high-quality, informative industrial experience papers about successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight. The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to):
- Cloud security, virtualization for security
- Mobile devices security
- Automated techniques for vulnerability discovery and analysis
- Model checking for security
- Binary code analysis, reverse-engineering
- Programming paradigms, models, and domain-specific languages for security
- Operating system security
- Verification techniques for security properties
- Malware: detection, analysis, mitigation
- Security in critical infrastructures
- Security by design
- Static and dynamic code analysis for security
- Web applications security
- Program rewriting techniques for security
- Security measurements
- Empirical secure software engineering
- Security-oriented software reconfiguration and evolution
- Computer forensics
- Processes for the development of secure software and systems
- Security testing
- Embedded software security

For more information, please see https://distrinet.cs.kuleuven.be/events/essos/2016/calls-papers.html.

IMPS 2016 Workshop on Innovations in Mobile Privacy and Security, Held in conjunction with ESSoS 2016, London, UK, April 6, 2016. [posted here 12/14/15]
IMPS aims to bring together researchers working on challenges in security and privacy for mobile platforms, broadly considered. We are interested in investigations into existing security platforms, their users, applications and app store ecosystems, and research into novel security or privacy mechanisms, tools and analysis. Areas of interest include but are not restricted to:
- Secure application development tools and practices
- Privacy enhancing techniques for devices and connected services
- Secure or trusted computing mechanisms
- Static and dynamic analysis for security
- Formal methods for mobile security
- Vulnerability detection and prevention
- Mobile operating system security features
- Security and privacy for IoT and other constrained devices
- Usable security and privacy on small or mobile devices

For more information, please see http://groups.inf.ed.ac.uk/security/IMPS/.

INTRICATE-SEC 2016 4th International Workshop on Security Intricacies in Cyber-Physical Systems and Services, Held in conjunction with the 30th International Conference on Advanced Information Networking and Applications (AINA-2016), Crans-Montana, Switzerland, March 23-25, 2016. [posted here 07/06/15]
For INTRICATE-SEC 2016 we are expanding our scope from a focus on security intricacies in designing/modelling service oriented architectures to the broader field of secure cyber physical systems (CPS) and services. Of particular interest are ideas and solutions on provisioning secure CPS and services over resource constrained and low power lossy networks. In addition to invited talks, we welcome papers with novel theoretical and application-centered contributions focused on (but not restricted to) the following topics:
- Security and Privacy for CPS, including: Anonymity and Pseudonymity, Authentication and Authorization, Trust & Identity Management, Privacy, and Malware.
- Secure Service Platforms for CPS, including: Smart Grids, Demand Management, Scheduling, Energy Management Models, and Mobile Web Services and Middleware.
- Secure Architectures for CPS, including: Data Modeling, Home Energy Management, Scalability, Reliability, and Safety, Resource Constrained and Low Power Lossy Networks, and Unconventional/Biologically Inspired Models

For more information, please see http://infosec.cs.uct.ac.za/INTRICATE-SEC/.

EuroSP 2016 1st IEEE European Symposium on Security and Privacy, Congress Center Saar, Saarbrücken, Germany, March 21-24, 2016. [posted here 07/13/15]
The IEEE European Symposium on Security and Privacy (EuroS&P) has been founded as the European sister conference of the established IEEE S&P symposium, and thus as a premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include:
- Access control
- Accountability
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Censorship and censorship-resistance
- Cloud security
- Distributed systems security
- Embedded systems security
- Forensics
- Formal methods for security
- Hardware security
- Intrusion detection
- Malware
- Metrics
- Mobile security and privacy
- Language-based security
- Network security
- Privacy-preserving systems
- Protocol security
- Secure information flow
- Security and privacy policies
- Security architectures
- System security
- Usable security and privacy
- Web security and privacy

For more information, please see http://www.ieee-security.org/TC/EuroSP2016/.

SPT-IOT 2016 1st IEEE PERCOM Workshop on Security, Privacy and Trust in the Internet of Things, Held in conjunction with IEEE PERCOM 2016, Sydney, Australia, March 14-18, 2016. [posted here 11/16/15]
The Internet of Things (IoT) is a novel design paradigm, envisioned as a network of billions or trillions of machines communicating with one another and rapidly gaining global attention from academia, industry, and government. Pervasive computing is at the heart of IoT and forms a fundamental building block necessary to realize the IoT. Equipped with pervasive technologies such as RFID and smart dust in addition to sensors, actuators and machine-to-machine (M2M) devices, IoT has the potential to offer innovative solutions to global challenges faced by ageing populations, climate change, growing cost of healthcare as well as how we manage our environment and natural resources.. The heterogeneous nature of the IoT as well as the computational constraints of many of the building blocks of the IoT make security, privacy and trust a challenging problem to solve on the one hand, while security, privacy and trust play a critical role for most if not all applications of IoT in domains such as surveillance, healthcare, security, transport, food safety, manufacturing, logistics and supply chain management. Without effective solutions for security, privacy and trust reliable data fusion and mining, qualified services with context-aware intelligence and enhanced user acceptance and experience cannot be achieved. The proposed IEEE Percom workshop on Security, Privacy and Trust for IoT aims to provide a forum that brings together researchers from academia as well as practitioners from industry, standardization bodies, and government to meet and exchange ideas on recent research and future directions for the IoT with a specific focus on IoT security, privacy and trust. The technical discussion will be focused on the communications and network security aspects of IoT and the key enabling technologies for IoT, especially M2M communications and networking, RFID technology and Near Field Communications (NFC), the challenges to security, privacy and trust presented and novel approaches to solving these challenges. The technical topics of interest to the workshop include, but are not limited to:
- IoT secure access network technologies and capillary networks
- secure channel and traffic models
- secure spectrum management for M2M/IoT radio communications
- security of RFID, sensors, actuator technologies
- IoT secure network infrastructure
- IoT security protocols
- privacy in applications of the IoT
- IoT networking and communication security
- circuit and system design for secure smart objects in the IoT
- security, trust, and privacy issues for devices and services
- naming, address management and end-to-end addressability
- methods for secure by design IoT
- methods for IoT security analysis and audit
- privacy and anonymization techniques in IoT
- secure cloud of things
- trust management architectures
- lightweight security solutions
- authentication and access control in IoT
- identification and biometrics in IoT
- liability and policy enforcement in IoT
- security of Big data in IoT
- cyber physical systems security
- cyber attacks detection and prevention
- embedded platforms for cryptography (implementations for performance-optimized, resource constrained, energy-efficient platforms)
- hardware security primitives
- secure pervasive/Ubiquitous Computing Software and Systems
- new Privacy and Security Techniques for Embedded Software and Systems
- ethics and legal considerations in IoT

For more information, please see https://sites.google.com/site/sptiot2016/home.

SDN-NFV Security 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, Co-located with ACM CODASPY 2016, New Orleans, LA, USA, March 11, 2016. [posted here 11/9/15]
Software-Defined Networking (SDN) and Network Function Virtualization (NFV) are two emerging networking paradigms, which introduce significant granularity, visibility, flexibility and elasticity to networking, but at the same time bring forth new security challenges. The ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security 2016) will take place in New Orleans, LA, USA, on March 11, 2016. The target audience will be university researchers, scientists, and industry professionals who need to become acquainted with new theories and technologies related to security challenges in SDN and NFV. We solicit unpublished research papers, both regular (6 pages max) and short (4 pages max) papers, that address the latest practices, experiences, and lessons learned on SDN and NFV security. Topics of interest include, but are not limited to:
- SDN/NFV-enabled security architecture
- SDN/NFV-based automated network security
- SDN/NFV-based mitigation for attacks
- Authentication/confidentiality in SDN/NFV-based networks
- Proofs of security in SDN/NFV-based networks
- Logic flaws in SDN/NFV implementations
- Attacks/defense to SDN controllers, protocols, and APIs
- SDN-oriented security policy enforcement
- Trust management of SDN applications and controllers
- Development and deployment of NFV-based security functions (virtual firewalls, virtual IDSs, virtual DDoS mitigation, etc.)
- Safe state migration in NFV
- Network Security as a Service

For more information, please see http://honeynet.asu.edu/sdnnfvsec2016/.

IWSPA 2016 International Workshop on Security And Privacy Analytics, Co-located with ACM CODASPY 2016, New Orleans, LA, USA, March 11, 2016. [posted here 10/19/15]
Increasingly, sophisticated techniques from machine learning, data mining, statistics and natural language processing are being applied to challenges in security and privacy fields. However, experts from these areas have no medium where they can meet and exchange ideas so that strong collaborations can emerge, and cross-fertilization of these areas can occur. Moreover, current courses and curricula in security do not sufficiently emphasize background in these areas and students in security and privacy are not emerging with deep knowledge of these topics. Hence, we propose a workshop that will address the research and development efforts in which analytical techniques from machine learning, data mining, natural language processing and statistics are applied to solve security and privacy challenges (“security analytics”). Submissions of papers related to methodology, design, techniques and new directions for security and privacy that make significant use of machine learning, data mining, statistics or natural language processing are welcome. Furthermore, submissions on educational topics and systems in the field of security analytics are also highly encouraged.

For more information, please see http://capex.cs.uh.edu/?q=content/international-workshop-security-and-privacy-analytics-2016.

CODASPY 2016 6TH ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 9-11, 2016. [posted here 07/13/15]
Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computations
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Usage Control
- Web application security

For more information, please see http://www.codaspy.org.

PQCrypto 2016 7th International Conference on Post-Quantum Cryptography, Fukuoka, Japan, February 24-26, 2016. [posted here 03/23/15]
The aim of PQCrypto is to serve as a forum for researchers to present results and exchange ideas on the topic of cryptography in an era with large-scale quantum computers. The conference will be preceded by a winter school on February 22-23, 2016. Original research papers on all technical aspects of cryptographic research related to post-quantum cryptography are solicited. The topics include (but are not restricted to):
- Cryptosystems that have the potential to be safe against quantum computers such as: hash-based signature schemes, lattice-based cryptosystems, code-based cryptosystems, multivariate cryptosystems and quantum cryptographic schemes;
- Classical and quantum attacks including side-channel attacks on post-quantum cryptosystems;
- Security models for the post-quantum era.

For more information, please see https://pqcrypto2016.jp/.

FC 2016 20th International Conference on Financial Cryptography and Data Security, Accra Beach Hotel & Spa, Barbados, February 22–26, 2016. [posted here 10/5/15]
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on financial, economic and commercial transaction security. Original works focusing on securing commercial transactions and systems are solicited; fundamental as well as applied real-world deployments on all aspects surrounding commerce security are of interest. Submissions need not be exclusively concerned with cryptography. Systems security, economic or behavioral perspectives, and interdisciplinary efforts are particularly encouraged. Topics of interest include, but are not limited to:
- Access Control
- Anonymity and Privacy
- Applied Cryptography
- Auctions and Mechanisms
- Authentication and Identification
- Behavioral Aspects of Security and Privacy
- Biometrics
- Certification and Audits
- Cloud Computing and Data Outsourcing Security
- Commercial Cryptographic Applications
- Contactless Payment and Ticketing Systems
- Cryptographic Currencies
- Digital Cash and Payment Systems
- Digital Rights Management
- Economics of Security and Privacy
- Electronic Commerce Security
- Electronic Crime and Underground Markets
- Fraud Detection and Forensics
- Game Theory for Security and Privacy
- Identity Theft
- Insider Threats
- Legal and Regulatory Issues
- Microfinance and Micropayments
- Mobile Systems Security and Privacy
- Phishing and Social Engineering
- Reputation Systems
- Risk Assessment and Management
- Secure Banking and Financial Services
- Smart Contracts and Financial Instruments
- Smartcards, Secure Tokens and Secure Hardware
- Social Networks Security and Privacy
- Trust Management
- Usability and Security
- Virtual Goods and Virtual Economies
- Voting Systems
- Web Security

For more information, please see http://fc16.ifca.ai/.

UEOP 2016 1st Workshop on Understanding and Enhancing Online Privacy, Co-located with NDSS 2016, San Diego, CA, USA, February 21, 2016. [posted here 06/22/15]
The mainstream focus in privacy research has long been on designing software from the ground up, providing firm guarantees on the provided privacy properties. Such a "bottom-up" approach is undoubtedly crucial for achieving better online privacy in the long term. Nevertheless, there is also a clear need for "top-down" research, understanding online privacy in the present online digital user habitats and proposing solutions that are easily deployable in existing infrastructures. Understanding privacy in online user habitats necessarily has to cope with highly incomplete information. While top-down methods for understanding some privacy-relevant open-world phenomena in the Internet have been researched (most prominently, information spreading in the context of social networks, recommendation systems, and marketing), and many basic technologies relevant to such understanding are well-investigated (e.g., large-scale information retrieval, image analysis, software analysis, record linkage), their application to the understanding and enhancing of online privacy remains under-explored, and has partly not yet been considered at all. Pursuing such an approach poses major technical challenges, which only an collaboration across several sub-areas of computer science can solve. The goal of the workshop is to foster interdisciplinary research on the understanding of privacy issues in present online user habitats, and the development of practical solutions. The workshop is directed at researchers from privacy and adjacent research areas. Topics of interest include, but are not limited to:
- data and action linkability
- privacy metrics
- data dissemination and information spreading
- what-if-analysis and privacy threat prediction
- privacy in social networks and microblogging systems
- privacy in cloud and big data applications
- location privacy
- privacy in mobile and portable devices
- behavioral targeting
- data analytics
- user profiling and data mining
- economics of privacy and game-theoretical approaches to privacy
- human factors and usability
- privacy in electronic currencies

For more information, please see http://sps.cs.uni-saarland.de/ueop/index.html.

NDSS 2016 Network and Distributed System Security Symposium, San Diego, California, USA, February 21-24, 2016. [posted here 06/22/15]
ISOC NDSS fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies. Technical papers and panel proposals are solicited. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2016. The Proceedings will be made freely accessible from the Internet Society webpages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent. Topics include:
- Anti-malware techniques: detection, analysis, and prevention
- Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
- Security for future Internet architectures and designs (e.g., Software-Defined Networking)
- High-availability wired and wireless networks
- Implementation, deployment and management of network security policies
- Integrating security in Internet protocols: routing, naming, network management
- Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
- Intrusion prevention, detection, and response
- Privacy and anonymity technologies
- Security and privacy for distributed cryptocurrencies
- Security and privacy in Social Networks
- Public key infrastructures, key management, certification, and revocation
- Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
- Security for collaborative applications: teleconferencing and video-conferencing
- Security for cloud computing
- Security for emerging technologies: sensor/wireless/mobile/personal networks and systems
- Security for future home networks, Internet of Things, body-area networks
- Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)
- Security for peer-to-peer and overlay network systems
- Security for Vehicular Ad-hoc Networks (VANETs)
- Security of Web-based applications and services
- Trustworthy Computing mechanisms to secure network protocols and distributed systems
- Usable security and privacy

For more information, please see http://www.internetsociety.org/events/ndss-symposium-2016.

ICISSP 2016 2nd International Conference on Information Systems Security and Privacy, Rome, Italy, February 19-21, 2016. [posted here 06/08/15]
The International Conference on Information Systems Security and Privacy aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, that concerns to organizations and individuals, thus creating new research opportunities. Topics include:
- Security Frameworks, Architectures and Protocols
- Cryptographic Algorithms
- Information Hiding and Anonymity
- Vulnerability Analysis and Countermeasures
- Database Security
- Content Protection and Digital Rights Management
- Software Security Assurance
- Security Architecture and Design Analysis
- Security Testing
- Risk and Reputation Management
- Phishing
- Security and Trust in Pervasive Information Systems
- Legal and Regulatory Issues
- Security Professionalism and Practice
- Trust in Social Networks
- Identity and Trust Management
- Intrusion Detection and Response
- Smartcard Technology
- Privacy-Enhancing Models and Technologies
- Privacy In Cloud and Pervasive Computing
- Authentication, Privacy and Security Models
- Social Media Privacy
- E-Voting and Privacy
- Privacy Metrics and Control
- Malware Detection
- Vehicular Systems and Networks
- Threat Awareness
- Identification and Access Control
- Mobile Systems Security
- Biometric Technologies and Applications
- Security Awareness and Education
- Data and Software Security
- Data Mining and Knowledge Discovery
- Web Applications and Services

For more information, please see http://www.icissp.org/.

CS2 2016 Workshop on Cryptography and Security in Computing Systems, Co-located with HiPEAC 2016 Conference, Prague, Czech Republic, January 20, 2016. [posted here 10/26/15]
The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of challenges related to the security of the operation of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviours, or can exploit side channel information leakage to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or countered. The prevalence of multi/many core systems opens additional issues such as NoC security. Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems. The CS2 workshop is a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems. Topics of interest include, but are not limited to:
- Compiler and Runtime Support for Security
- Cryptography in Embedded and Reconfigurable Systems
- Design Automation and Verification of Security
- Efficient Cryptography through Multi/Many core Systems
- Fault Attacks and Countermeasures, including interaction with Fault Tolerance
- Hardware Architecture and Extensions for Cryptography
- Hardware/Software Security Techniques
- Hardware Trojans and Reverse Engineering
- Physical Unclonable Functions
- Reliability and Privacy in Embedded Systems
- Security of Cyber-Physical Systems

- Security of Embedded and Cyberphysical Systems (Medical, Automotive, Smartgrid, Industrial Control)
- Side Channel Attacks and Countermeasures
- Trusted computing

For more information, please see http://www.cs2.deib.polimi.it/.

SFCS 2016 4th International Workshop on Security and Forensics in Cyber Space, Held in conjunction with the 17th International Conference on Distributed Computing and Networking (ICDCN 2016), Singapore, January 4-6, 2016 . [posted here 10/5/15]
With the continuous growth of cyber connectivity and the ever increasing number of applications, remotely delivered services, and networked systems have required the need for digital security. Today, more and more government agencies, financial institutions, and business enterprises are experiencing security incidents and cyber-crimes, by which attackers could generate fraudulent financial transactions, commit crimes, perform an industrial espionage, and disrupt the business processes. The sophistication and the borderless nature of the intrusion techniques used during a cyber security incident, have triggered the need for designing new active cyber defense solutions, and developing efficient incident response plans. In this context, digital forensics has emerged as a disciplined science allowing to note and collect evidences left on the compromised system prior to the incident occurrence, and carry out an analysis to: (a) understand what occurred; (b) determine the set of exploited security weaknesses; (c) trace attackers to their source; (d) study the attackers trends and motives; and (e) propose a set of optimal countermeasures to stop and mitigate the effect of the attacks. The workshop promotes research and innovative ideas in the realm of cyber security and digital forensics. It provides a prominent venue for researchers, scientists, engineers and practitioners to share their thoughts, exchange ideas, and prospect future and potential axes of collaboration. Papers focusing on any aspect of the theory and practice of cyber security, defense, and digital forensics are solicited. A large spectrum of advanced topics are covered, ranging from anti-forensics detection and recovery, cyber security and forensic in wireless and mobile communication systems, multimedia security and forensic content processing, development of novel theories and techniques of cyber security and forensics analysis and validation, and forensics in cloud computing and social networks. The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:
- Formal and theoretical techniques of cyber security and forensics
- Legal and policy issues in cyber security and defense
- Availability, privacy, authentication, trust, access control, and key management
- Social networks security
- Incident response techniques in networked and distributed systems
- Security and privacy in wireless and mobile systems
- Cyber security engineering
- Risk analysis and management in cyber security
- Critical infrastructures security
- Storage systems protection and forensics
- Economic and management aspects of cyber security and privacy
- Automated reasoning techniques of incidents and evidence analysis
- Evidentiary aspects and forensics of digital crimes
- Cybercrime scenarios modeling, analysis, and investigation
- Hypothetical reasoning in forensics and incident response
- Collaborative and distributed techniques for cyber defense and cyber investigation
- Active, adaptive, and intelligent defense systems
- Embedded devices forensics
- Evidence preservation, management, storage and reassembly
- Anti-forensics and anti-anti forensics prevention, detection, and analysis
- Multimedia security and forensics
- Lightweight forensic techniques
- Large-scale investigations in large networks and Big Data
- Innovative forensic services
- Data visualization in forensic analysis
- Vulnerability analysis and assessment of cloud services
- Techniques for tracking and trace-back of attacks in networked and distributed systems
- Data hiding, extraction, and recovery technique
- Security and forensics in distributed, virtual, and cloud environments
- Cyber security and forensic architectures
- Defense in depth
- Cybersecurity of Industrial Control Systems
- Cyber physical systems security
- Bio-inspired security

For more information, please see https://sites.google.com/site/sfcs2016/.

IFIP119-DF 2016 12th IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 4-6, 2016. [posted here 07/20/15]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Twelfth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately 100 participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume - the twelfth volume in the well-known Advances in Digital Forensics book series (Springer, Heidelberg, Germany) during the summer of 2016. Technical papers and posters are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Network and cloud forensics
- Embedded device forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics

For more information, please see http://www.ifip119.org.