MCS 2015 - International workshop on Mobile Computing Security (MCS 2015)
Topics/Call fo Papers
International workshop on Mobile Computing Security
(MCS 2015)
In conjunction with the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks
(EUSPN 2015)
Berlin, Germany on September 27-30, 2015
Workshop Website: https://sites.google.com/site/mcs2015msc
***
Important Dates
===
Submission Deadline: May 26, 2015
Author Notification: June 26, 2015
Final Manuscript: July 26, 2015
SCOPE
===
Technological advances in recent years have provided significant increases in the computing power and networking capabilities of mobile devices. For example, many smartphones and personal digital assistants (PDAs) currently employ powerful processors and have Internet broadband connectivity that rival that of desktop computers and laptops. For these reasons, mobile devices are being used for many applications including social networking, and business applications like: online banking. Because these devices are ubiquitous, they are high-value targets for cyber criminals that seek financial gains.
Mobile devices are still suffering from many security challenges. The security policy offered by the mobile platforms is loose because it allows developers and users to install any application. As a result, we witnessed an increasing number of attacks and malware targeting mobile platforms like Android and iOS, and which caused serious issues for the user. For example, the malware can integrate compromised mobile devices into a botnet, it can also send SMS messages to premium numbers without the user’s knowledge, and hence the user’s bill is charged. In addition, the users are increasingly using their devices to handle their private information. However, the devices provide insufficient data security and data protection.
This workshop aims at gathering researchers and practitioners working on mobile computing security to share ideas and new research innovations in the field.
The topics of interest include (but are not limited to):
? Smartphone security.
? Vulnerability analysis for smartphones.
? Data protection and privacy.
? Security and privacy of operating systems, middleware, and applications.
? Evaluation of mobile security solutions.
? Mobile malware collection, statistics, and analysis;
? Mobile malware detection.
? Bots on mobile devices.
? Mobile botnet detection.
? Mobile botnet design and countermeasures.
? Reverse engineering and automated analysis of mobile malware.
? Traffic monitoring and detection algorithms for mobile platforms.
? Cloud security and privacy solutions for mobile devices.
? Mobile device forensics.
? Mobile services and social networking security.
? Security for smart payment applications.
? Test beds and case studies for secure mobile platforms.
? Formal models and architecture design for secure mobile platforms.
? Virtualization solutions for mobile security.
? Web browser security on mobile devices.
Publication
===
All MCS-2015 accepted papers will be published by Elsevier Science in the open-access Procedia Computer Science series on-line. Procedia Computer Sciences is hosted on www.Elsevier.com and on Elsevier content platform ScienceDirect (www.sciencedirect.com), and will be freely available worldwide. All papers in Procedia will be indexed by Scopus (www.scopus.com) and by Thomson Reuters’ Conference Proceeding Citation Index http://thomsonreuters.com/conference-proceedings-c.... The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP (http://dblp.uni-trier.de/).
Submission
===
Authors are requested to submit their papers electronically in PDF format. Blind submissions should be made through the Easychair system: https://easychair.org/conferences/?conf=mcs20150
More information about paper formatting instructions, submission and registration can be found at: https://sites.google.com/site/mcs2015msc
Workshop Chairs
===
Abdelouahid Derhab, King Saud University, Saudi Arabia
Mohamed Guerroumi, USTHB University, Algeria
Kashif Saleem, CoEIA, King Saud University, Saudi Arabia
Technical Program Committee
===
Abdullah Bin Gani, University of Malaya, Malaysia.
Adam Bates, University of Florida, USA.
Ali Feizollah, University of Malaya, Malaysia.
Damien Octeau, Pennsylvania State University, USA.
Gang Tan, Lehigh University, USA.
Garth V. Crosby, Southern Illinois University Carbondale, USA.
Hsiang-Cheh Huang, National University of Kaohsiung, Taiwan.
Hussain Almohri, Kuwait University, Kuwait.
Jalal Al-Muhtadi, King Saud University, Saudi Arabia.
John C.S. Lui, Chinese University of Hong Kong, China.
Juan Pedro Muñoz-Gea, Universidad Politécnica de Cartagena, Spain.
Karim Elish, Virginia Tech, USA.
Kouichi Sakurai, Kyushu University, Japan.
Lanier A. Watkins, The Johns Hopkins University Applied Physics Laboratory, USA.
Lotfi ben Othmane, Technische Universität Darmstadt, Germany.
Mauro Conti, University of Padua, Italy.
Mohamad Badra, Zayed University, The United Arab Emirates.
Muath Al-Khalaf, King Saud University, Saudi Arabia.
Reaz Ahmed, University of Waterloo, Canada.
Pedro Peris-Lopez, Universidad Carlos III de Madrid, Spain.
Qiang Tang, University of Luxembourg, Luxembourg.
Shouhuai Xu, University of Texas at San Antonio, USA.
Wissam Mallouli, Montimage, France.
Yajin Zhou, North Carolina State University, USA.
Yao Guo, Peking University, China.
Youssef Iraqi, Khalifa University of Science, Technology, and Research, United Arab Emirates.
(MCS 2015)
In conjunction with the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks
(EUSPN 2015)
Berlin, Germany on September 27-30, 2015
Workshop Website: https://sites.google.com/site/mcs2015msc
***
Important Dates
===
Submission Deadline: May 26, 2015
Author Notification: June 26, 2015
Final Manuscript: July 26, 2015
SCOPE
===
Technological advances in recent years have provided significant increases in the computing power and networking capabilities of mobile devices. For example, many smartphones and personal digital assistants (PDAs) currently employ powerful processors and have Internet broadband connectivity that rival that of desktop computers and laptops. For these reasons, mobile devices are being used for many applications including social networking, and business applications like: online banking. Because these devices are ubiquitous, they are high-value targets for cyber criminals that seek financial gains.
Mobile devices are still suffering from many security challenges. The security policy offered by the mobile platforms is loose because it allows developers and users to install any application. As a result, we witnessed an increasing number of attacks and malware targeting mobile platforms like Android and iOS, and which caused serious issues for the user. For example, the malware can integrate compromised mobile devices into a botnet, it can also send SMS messages to premium numbers without the user’s knowledge, and hence the user’s bill is charged. In addition, the users are increasingly using their devices to handle their private information. However, the devices provide insufficient data security and data protection.
This workshop aims at gathering researchers and practitioners working on mobile computing security to share ideas and new research innovations in the field.
The topics of interest include (but are not limited to):
? Smartphone security.
? Vulnerability analysis for smartphones.
? Data protection and privacy.
? Security and privacy of operating systems, middleware, and applications.
? Evaluation of mobile security solutions.
? Mobile malware collection, statistics, and analysis;
? Mobile malware detection.
? Bots on mobile devices.
? Mobile botnet detection.
? Mobile botnet design and countermeasures.
? Reverse engineering and automated analysis of mobile malware.
? Traffic monitoring and detection algorithms for mobile platforms.
? Cloud security and privacy solutions for mobile devices.
? Mobile device forensics.
? Mobile services and social networking security.
? Security for smart payment applications.
? Test beds and case studies for secure mobile platforms.
? Formal models and architecture design for secure mobile platforms.
? Virtualization solutions for mobile security.
? Web browser security on mobile devices.
Publication
===
All MCS-2015 accepted papers will be published by Elsevier Science in the open-access Procedia Computer Science series on-line. Procedia Computer Sciences is hosted on www.Elsevier.com and on Elsevier content platform ScienceDirect (www.sciencedirect.com), and will be freely available worldwide. All papers in Procedia will be indexed by Scopus (www.scopus.com) and by Thomson Reuters’ Conference Proceeding Citation Index http://thomsonreuters.com/conference-proceedings-c.... The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP (http://dblp.uni-trier.de/).
Submission
===
Authors are requested to submit their papers electronically in PDF format. Blind submissions should be made through the Easychair system: https://easychair.org/conferences/?conf=mcs20150
More information about paper formatting instructions, submission and registration can be found at: https://sites.google.com/site/mcs2015msc
Workshop Chairs
===
Abdelouahid Derhab, King Saud University, Saudi Arabia
Mohamed Guerroumi, USTHB University, Algeria
Kashif Saleem, CoEIA, King Saud University, Saudi Arabia
Technical Program Committee
===
Abdullah Bin Gani, University of Malaya, Malaysia.
Adam Bates, University of Florida, USA.
Ali Feizollah, University of Malaya, Malaysia.
Damien Octeau, Pennsylvania State University, USA.
Gang Tan, Lehigh University, USA.
Garth V. Crosby, Southern Illinois University Carbondale, USA.
Hsiang-Cheh Huang, National University of Kaohsiung, Taiwan.
Hussain Almohri, Kuwait University, Kuwait.
Jalal Al-Muhtadi, King Saud University, Saudi Arabia.
John C.S. Lui, Chinese University of Hong Kong, China.
Juan Pedro Muñoz-Gea, Universidad Politécnica de Cartagena, Spain.
Karim Elish, Virginia Tech, USA.
Kouichi Sakurai, Kyushu University, Japan.
Lanier A. Watkins, The Johns Hopkins University Applied Physics Laboratory, USA.
Lotfi ben Othmane, Technische Universität Darmstadt, Germany.
Mauro Conti, University of Padua, Italy.
Mohamad Badra, Zayed University, The United Arab Emirates.
Muath Al-Khalaf, King Saud University, Saudi Arabia.
Reaz Ahmed, University of Waterloo, Canada.
Pedro Peris-Lopez, Universidad Carlos III de Madrid, Spain.
Qiang Tang, University of Luxembourg, Luxembourg.
Shouhuai Xu, University of Texas at San Antonio, USA.
Wissam Mallouli, Montimage, France.
Yajin Zhou, North Carolina State University, USA.
Yao Guo, Peking University, China.
Youssef Iraqi, Khalifa University of Science, Technology, and Research, United Arab Emirates.
Other CFPs
- International Research Conference on Advances in Engineering Sciences
- International Conference on E-mobility and Emerging Vehicular Technology
- International Symposium on Nonlinear Theory and its Applications (NOLTA2015)
- Workshop in INTELLIGENT PERSONALIZATION (IP'2015)
- 2nd International Conference on Cognitive Internet of Things Technologies
Last modified: 2015-04-29 16:47:01