ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WISTP 2013 - Seventh Workshop in Information Security Theory and Practice

Date2013-05-28 - 2013-05-30

Deadline2013-01-31

VenueHeraklion, Greece Greece

Keywords

Websitehttps://www.wistp.org

Topics/Call fo Papers

Seventh Workshop in Information Security Theory and Practice (WISTP 2013)
"Security of Mobile and Cyber-physical Systems"
May 28-30, 2013, Heraklion, Greece --- www.wistp.org
WISTP 2013 Background and Goals
-------------------------------
Current developments in IT are characterized by an increasing use of personal
mobile devices and an increasing reliance on IT for supporting industrial
applications in the physical world. A new persepctive on socio-technical and
cyber-physical systems is required that sees in IT more than just an
infrastructure but focuses on the ever closer integration between social and
technical processes as well.
Application markets, such as Google Play and Apple App Store drive a mobile
ecosystem, offering new business models with high turnovers and new
opportunities, which however, also attract cybercriminals and raise new privacy
concerns.
In the area of cyber-physical systems, research has to go beyond securing the IT
infrastructure and to consider attacks launched by combining manipulations in
physical space and cyber space.
The workshop seeks submissions from academia and industry presenting novel
research on all aspects of security and privacy of mobile devices, such as
Android and iOS platforms, as well as studies on securing cyber-physical
systems. Topics of interest include, but are not limited to:
* Vulnerability detection
* Application security
* Usability
* Privacy
* Mobile malware
* Mobile OSes security analysis
* Cloud-enhanced mobile security
* BYOD contexts
* Securing systems controlling industrial processes
Important Dates
---------------
Submission deadline: Jan 31, 2013
Notification of authors: Mar 15, 2013
Camera ready copies due: Mar 25, 2013
Workshop dates: May, 28-30 2013
Submission Instructions
-----------------------
Submissions must describe original and previously unpublished research.
Submissions must not substantially overlap with papers that have been published
or that are simultaneously submitted to a journal or conference/workshop with
proceedings. Each submission should be at most 16 pages in total in the
Springer's LNCS format
(http://www.springer.com/computer/lncs?SGWID=0-164-...). All submissions
should be anonymous (i.e., no author names/affiliations and obvious citations).
Submissions are to be made to the submission web site
(http://www.wistp.org/submission-details/).
Only PDF files will be accepted. Submissions not meeting these guidelines risk
rejection without consideration of their merits. Accepted papers will be
published by Springer in the Lecture Notes in Computer Science series
(http://www.springeronline.com/lncs), and the proceedings will be available at
the workshop. The camera-ready version of the accepted papers must follow
Springer guidelines (a LaTeX source file will be required).
If a submitted paper is mainly the work of a student author, this paper is
eligible for the best student paper award. To participate in this selection
process, please add the word "STUDENT" in the affiliation field in the
submission form.
Authors of accepted papers must guarantee that their papers will be presented at
the workshop. At least one author of each accepted paper is required to register
with the workshop and present the paper. For authors presenting multiple papers,
one normal registration is valid for up to two papers.
Organizing Committees
--------------------
General Chairs
~~~~~~~~~~~~~~
* Ioannis G. Askoxylakis. FORTH-ICS, Greece
* Louis Marinos, ENISA, EU
Local Organizers
~~~~~~~~~~~~~~~~
* Nikolaos Petroulakis, FORTH-ICS, Greece
Workshop, Panel, Tutorial Chair
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
* Damien Sauveron, XLIM, University of Limoges, France
Publicity Chairs
~~~~~~~~~~~~~~~~
* Mauro Conti, University of Padua, Italy
Program co-Chair
~~~~~~~~~~~~~~~~
* Lorenzo Cavallaro, Royal Holloway University of London, UK
* Dieter Gollmann, Hamburg University of Technology, Germany
Program Committee
~~~~~~~~~~~~~~~~~
* Claudio Ardagna, Universita` degli Studi di Milano, Italy
* Ioannis G. Askoxylakis. FORTH-ICS, Greece
* Lejla Batina, Radboud University Nijmegen, The Netherlands
* Danilo Bruschi, University degli Studi di Milano, Italy
* Mauro Conti, University of Padua, Italy
* Marco Cova, University of Birmingham, UK
* Manuel Egele, Carnegie Mellon University, USA
* Jaap-Henk Hoepman, Radboud University Nijmegen, The Netherlands
* Andrea Lanzi, Insitut Eurecom, France
* Corrado Leita, Symantec Research Europe, EU
* Federico Maggi, Politecnico di Milano, Italy
* Evangelos Markatos, FORTH-ICS, Greece
* Lorenzo Martignoni, Google Inc., Switzerland
* Sjouke Mauw, University of Luxembourg, Luxembourg
* Igor Muttik, McAfee Labs, UK
* Flemming Nielson, Danish Technical University, Danmark
* Wolter Pieters, TU Delft, The Netherlands
* Christina Pöpper, ETH Zürich, Switzerland
* Joachim Posegga, Institute of IT-Security and Security Law, Germany
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* William Robertson, Northeastern University, USA
* Pierangela Samarati, Universita` degli Studi di Milano, Italy
* Asia Slowinska, Vrije Universiteit Amsterdam, The Netherlands
* Stefano Zanero, Politecnico di Milan, Italy
* Jianying Zhou, Institute for Infocomm Research, Singapore
TBC
Steering Committee
~~~~~~~~~~~~~~~~~~
* Ioannis G. Askoxylakis. FORTH-ICS, Greece
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Joachim Posegga, Institute of IT-Security and Security Law, Germany
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France

Last modified: 2012-12-31 23:23:09