ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WICSPIT 2017 - Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations - WICSPIT

Date2017-04-24 - 2017-04-26


VenuePortorož, Portugal Portugal



Topics/Call fo Papers

Cyber-attackers are steadily getting more creative and ambitious in their exploits and causing real-world damage (e.g., the German steel mill hack in 2014, the Ukrainian Power Grid hack in 2015). Proprietary and personally identifiable information are vulnerable to leakage as well (e.g., the Sony hack in 2014, the US Office of Personnel Management in 2014). The Internet of Things (IoT), a platform which allows everything to process information, communicate data, and analyze context opens up new vulnerabilities for both security and privacy. Smart buildings and smart cities, for example, will collect and process data for millions of individuals. Industrial systems, which were never intended to be linked via common protocols, are recognized as suddenly being open to security threats that can limit service availability and possibly cause considerable damage. Autonomous systems allowed to operate with minimal oversight are ripe targets for cyber-attacks. Data stored and processed in confidence in the cloud may be subject to exfiltration, leading to public embarrassment or the exposure of proprietary information.
As cyber-events increase in number and severity, security engineers must incorporate innovative cybersecurity strategies and technologies to safeguard their systems and confidential information. A strategy to address a cybersecurity vulnerability, once identified, must understand the nature of the vulnerability and how to mitigate it. The “security tax” or “privacy tax” (system and service degradation) caused by the implementation of the mitigating security technologies may be so great that the end user bypasses the technologies and processes meant to ensure the system’s security and privacy. A practical reality of the adoption of IoT is that it will require integration of new technologies with existing systems and infrastructure, which will continue to expose new security and privacy vulnerabilities; re-engineering may be required. The human element of IoT, the user, must be considered, and how the user and the IoT system interact to optimize system security and user privacy must be defined. Cyber-attackers and cyber victims are often in different countries, the transnational nature of many cyber-events necessitate the consideration of public policy and legal concerns as well.
This workshop aims to showcase new and emerging strategies and technologies for forecasting, mitigating, countering, and attributing cyber-events that threaten security and privacy within the realm of IoT. The institutional benefits of IoT adoption are clear, however security and privacy concerns are constantly coming to light. As organizations?both public and private, large and small?adopt new IoT technologies, we hope that this workshop can serve as an opening conversation between government, industry, and academia for the purpose of addressing those concerns.
Topics of Interest
Topics of interest include (but are not limited to):
Cyber?security approaches
Honeypots, Honeynets and Honeypatches
Deception-based approaches
Encrypted Computing and Secure Computation
Active and Passive Cybersecurity
Firmware vetting
Privacy-Enhancing Technologies
Intelligence and Counter-Intelligence
Security and Privacy Engineering
Cyber-security Settings
Cyber-Security and Privacy in Cyber-Physical Systems
Industrial Internet of Things (IIoT)
Smart Cities
Cyber-Physical Power Systems
Data analytics for cyber-security
Predictive Cyber-Security
Event Analysis
Event Attribution and Cyber-Forensics
Cyber-security metrics
Security and Privacy Metrics and Analysis
Metrics of defense effectiveness
Quantifying the ‘security/privacy tax’
Human/Societal issues
Legal and Policy Topics related to Cyber-Security and Privacy
Human Factors in Cyber-Security and Privacy
Inter-Organizational Cyber-Threat Information Sharing
Other topics
Integration of New Technology into Existing Systems
Situational Awareness
System Situational Awareness
Emerging Threats
Event Recovery
Security as a Service (SaaS)
Private Data as a Service (PDaaS)

Last modified: 2016-08-13 12:06:27