|
|
Commentary and Opinion and News
Sven Dietrich's review of The Internet of Risky Things - Trusting the devices That Surround Us by Sean Smith
NewsBits: Announcements and correspondence from readers (please contribute!)
Listing of academic positions available by
Cynthia Irvine
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
Requests for inclusion in the list should sent per instructions.
new calls or announcements added since Cipher E139
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
IFIP119-DF 2018 14th Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 3-5, 2018. (Submissions Due 18 September 2017)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately a hundred participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume - the fourteenth volume in the well-known Advances in Digital Forensics book series (Springer, Heidelberg, Germany) during the summer of 2018. Technical papers and posters are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
ICSS 2017 Industrial Control System Security Workshop, Held in conjunction with the 33rd Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 5, 2017. (Submissions Due 24 September 2017)
Supervisory control and data acquisition (SCADA) and industrial control systems monitor and control a wide range of industrial and infrastructure processes such as water treatment, power generation and transmission, oil and gas refining and steel manufacturing. Such systems are usually built using a variety of commodity computer and networking components and are becoming increasingly interconnected with corporate and other Internet-visible networks. As a result, they face significant threats from internal and external actors. For example, in 2010 the Stuxnet malware was specifically written to attack SCADA systems and caused millions of dollars in damages. The critical requirement for high availability in SCADA and industrial control systems, along with the use of resource constrained computing devices, legacy operating systems, and proprietary software applications limit the applicability of traditional information security solutions. The goal of this workshop is to explore new security techniques that are applicable in the control systems context. Papers of interest including (but not limited to) the following subject categories are solicited:
HOST 2018 IEEE International Symposium on Hardware-Oriented Security and Trust, Washington DC, USA, May 2018. (Submissions Due 25 September 2017)
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2018 aims to facilitate the rapid growth of hardware-based security research and development. HOST highlights new results in the area of hardware security. Relevant research topics include architectures, design methods, circuits, and applications of secure hardware. HOST 2018 invites original contributions related to (but not limited to) the following:
Elsevier Online Social Networks and Media Journal, Special Issue on Information and Opinion Diffusion in Online Social Networks and Media, (Submissions Due 1 October 2017)
Guest Editors: Marco Conti (IIT-CNR, Italy) and Andrea Passarella (IIT-CNR, Italy).
Online Social Networks are a massively successful phenomenon, used by billions of
users to interact. Nowadays, information diffusion in Online Social Networks and
Media (OSNEM) has a major role, among many others, for recommendation systems,
advertising, and political campaigns. Moverover, the way information circulates in
OSNEM impacts on the formation of opinions and on the social roles of users and
their influence on others. OSNEM are extensively used for spreading information,
opinions and ideas, but also to propagate fake news and rumors. Therefore,
prevention of spam, bots and fake accounts, information leakage, trustworthiness
of information and trust between users are relevant research issues associated with
information diffusion. This special issue seeks contributions pushing the state of the
art in all facets of information and opinion diffusion in online social networks and
media. We solicit manuscripts where quantitative and/or data-driven approach is
used to investigate information and opinion diffusion in OSNEM. Topics include,
but are not limited to:
SP 2018 39th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 21-23, 2018. (Submissions Due first day of each month)
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include:
PKC 2018 21st IACR International Conference on Practice and Theory in Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-28, 2018. (Submissions Due 6 October 2017)
PKC 2018 is the 21st edition of the International Conference on Practice and Theory of Public Key Cryptography, the main annual conference with an explicit focus on public-key cryptography. Original research papers on all aspects of public-key cryptography, covering theory, implementations and applications, are solicited for submission to PKC 2018.
HST 2018 18th annual IEEE Symposium on Technologies for Homeland Security, Washington D.C., USA, May 2-3, 2018. (Submissions Due 16 October 2017)
This symposium brings together innovators from leading academic, industry, businesses, Homeland Security Centers of Excellence, and government agencies to provide a forum to discuss ideas, concepts, and experimental results. Produced by IEEE with technical support from DHS S&T, IEEE, IEEE Boston Section, and IEEE-USA and organizational support from MIT Lincoln Laboratory, Raytheon, and MITRE, this year?s event will once again showcase selected technical papers and posters highlighting emerging technologies to:
Security and Communication Networks journal, Special Issue on Cybersecurity in the Internet of Things, (Submissions Due 27 October 2017)
Guest Editors: Félix Gómez-Mármol (University of Murcia, Murcia, Spain), Patricia Arias-Cabarcos (Universität Mannheim, Mannheim, Germany), and Vijay Varadharajan (University of Newcastle, Newcastle, Australia). With the settlement of smartphones and tablets in modern societies, as well as the proliferation of an astronomic amount of other electronic devices such as wearables, e-Health sensors, electrical appliances, or vehicles (amidst others), all provided with Internet connection, all potentially dealing with sensitive information, and most of them mobile in essence, we are witnessing today the real advent of the Internet of Things (IoT). This new paradigm brings along many indubitable advantages, but also a nonnegligible number of security threats that should not go underestimated. Besides increasing in number, those threats are becoming more sophisticated and harmful (as it is the case of advanced persistent threats, or APTs), making it unfeasible for a human administrator to manually protect each and every device within the constellation of gadgets, artefacts, and computer systems of the IoT. Moreover, an alarming amount of the new solutions envisaged for the IoT pay higher attention to usability aspects, recklessly ignoring substantial security protection mechanisms, making the IoT an ideal playground for malicious hacking activities. Hence, it is imperative to find solutions aiming at the integral protection of the plethora of vulnerable devices within the IoT. Working on those solutions will help the wider adoption of these new technologies and help users to entrust them. Thus, this Special Issue seeks high-quality original papers presenting innovative solutions dealing with cybersecurity in the field of IoT. In particular, novel techniques and mechanisms aimed at the security and privacy protection of these environments are welcome. Likewise, we encourage review articles describing and analyzing the current state of the art in this field. Papers with a strong cryptographic background will not be considered as part of this special issue. Papers will be evaluated based on their originality, presentation, relevance, and contribution to the field of cybersecurity in the IoT, as well as their suitability to the special issue, and for their overall quality. The submitted papers have to describe original research which has not been published nor currently under review by other journals or conferences. Guest editors will make an initial determination of the suitability and scope of all submissions. Papers that either lack originality and clarity in presentation or fall outside the scope of the special issue will not be sent for review and authors will be promptly informed in such cases. Potential topics include but are not limited to the following:
PETS 2018 18th Privacy Enhancing Technologies Symposium, Barcelona, Spain, July 24-27, 2018. (Submissions Due 30 November 2017, 28 February 2018)
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. Papers undergo a journal-style reviewing process and accepted papers are published in Proceedings on Privacy Enhancing Technologies (PoPETs), a scholarly, open access journal. Submitted papers should present novel practical and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. While PETS/PoPETs has traditionally been home to research on anonymity systems and privacy-oriented cryptography, we strongly encourage submissions on a number of both well-established and emerging privacy-related topics, for which examples are provided below. PoPETs also solicits submissions for Systematization of Knowledge (SoK) papers. These are papers that critically review, evaluate, and contextualize work in areas for which a body of prior literature exists, and whose contribution lies in systematizing the existing knowledge in that area. Authors are encouraged to view our FAQ about the submission process.
Information & Communications Technology Express, Special Issue on Critical Infrastructure (CI) & Smart Grid Cyber Security, (Submissions Due 1 December 2017)
Guest Editors: Leandros A. Maglaras (De Montfort University, UK),
Ki-Hyung Kim (Ajou University, Korea), Helge Janicke (De Montfort
University, UK), Mohamed Amine Ferrag, Guelma University, Algeria),
Artemios G. Voyiatzis (SBA Research, Austria), Pavlina Fragkou (T.E.I of Athens, Greece),
Athanasios Maglaras (T.E.I. of Thessaly, Greece),
and Tiago J. Cruz (University of Coimbra, Portugal).
Cyber-physical systems are becoming vital to modernizing the national critical
infrastructure (CI) systems. A smart grid is an energy transmission and
distribution network enhanced through digital control, monitoring, and
telecommunications capabilities. It provides a real-time, two-way flow of
energy and information to all stakeholders in the electricity chain, from the
generation plant to the commercial, industrial, and residential end user. Each
smart grid subsystem and its associated assets require specific security
functions and solutions. For example, the solution to secure a substation is
not the same as the solution to secure demand response and home energy management
systems. Usual cyber security technologies and best practices - such as antivirus,
firewalls, intrusion prevention systems, network security design, defense in
depth, and system hardening - are necessary to protect the smart grid. However,
history showed they are only part of the solution. Owing to the rapid increase
of sophisticated cyber threats with exponentially destructive effects advanced
cyber security technologies must be developed. The title of this special issue
of ICT Express is therefore coined concisely as "Special Issue on CI & Smart
Grid Cyber Security". This special issue focuses on innovative methods and
techniques in order to address unique security issues relating to CI and smart
grids. Original submissions reflecting latest research observation and achievement
in the following areas are invited:
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TCSP (or other TCs) | Open Access Proceedings | |
Cipher past issues archive | ||
IEEE Computer Society | Cipher Privacy Policy |