WISA 2017



The 18th World Conference on Information Security Applications
August 24-26, 2017, Lotte City Hotel, Jeju Island, Korea


General Chair: Donghoon Lee (Korea University, Korea)
Orgaizing Committee Chair : JungTaek Seo (Soonchunhyang University, Korea)
Prgram Committee Co-Chairs: Brent ByungHoon Kang (KAIST, Korea),
                            Taesoo Kim (Georgia Tech, USA)


- Paper Submission deadline: June 2, 2017
- Acceptance notification: June 31, 2017
- Pre-proceedings version deadline: July 17, 2017
- WISA 2015 Conference: August 24-26, 2017
- LNCS Proceedings version deadline: September 19, 2017

**** OVERVIEW ****
WISA is one of the main security research venues that has been held
annually on the beautiful Jeju Island and hosted by the Korea
Institute of Information Security and Cryptology (KIISC) and sponsored
by the Ministry of Science, ICT and Future Planning (MSIP), and
co-sponsored by the Electronics & Telecommunications Research
Institute (ETRI), the Korea Internet & Security Agency (KISA), and the
National Security Research Institute (NSRI). This year, WISA will also
be sponsored by ONRG (Office of Naval Research Global) and ITC-PAC, USA.

The primary focus of WISA 2017 will be on systems and network security
including all other technical and practical aspects of security
applications. The areas of interest include, but are not limited to
the following:

**** The areas of interest include, but are not limited to: ****
- Analysis of network and security protocols
- Anonymity and censorship-resistant technologies
- Applications of cryptographic techniques
- Authentication and authorization
- Automated tools for source code/binary analysis
- Botnet defense
- Critical infrastructure security
- Denial-of-service attacks and countermeasures
- Digital forensics
- Embedded systems security
- Exploit techniques and automation
- Hardware and physical security
- HCI security and privacy
- Intrusion detection and prevention
- Malware analysis
- Mobile/wireless/cellular system security
- Network-based attacks
- Network infrastructure security
- Operating system security
- Practical cryptanalysis (hardware, DRM, etc.)
- Security policy
- Side channel attacks and countermeasures
- Storage and file system security
- Techniques for developing secure systems
- Trustworthy computing
- Vulnerability research
- Web Security
- Trusted execution environments (Intel SGX, ARM Trustzone, etc.)

WISA will be looking for original research that has not been published
before. Authors are invited to submit original papers, and must not
substantially duplicate work that any of the authors have published
elsewhere or have submitted in parallel to journals or any other
conferences that have proceedings.  (A few selected papers will be
recommended to SCIE journals).

In addition, WISA will be accepting papers that report about
experiences and recent enhancements of the prior works that had been
published at a top security conference venue. In the latter case, the
paper is expected to contain new materials more than 30% beyond the
prior works.

The submission must be anonymous with no author names, affiliations,
acknowledgements, nor obvious references included in the paper.

The paper should be prepared according to the "Authors Instruction for
LNCS" (http://www.springer.de/comp/lncs/authors.html) and limited to
at most 12 pages in total.  The paper submission is accepted only as
PDF or Word formats.


Expanded versions of selected papers will be recommended to the
international journals indexed in SCIE.

SUBMISSION SITE: https://wisa17.hotcrp.com


Brent ByungHoon Kang KAIST, Korea
Taesoo Kim Georgia Tech, USA

E-mail : brentkang@kaist.ac.kr, taesoo@gatech.edu

Amir Houmansadr, University of Massachusetts Amherst
Bogdan Warinschi, University of Bristol
Byoungyoung Lee, Purdue University
Cristina Nita-Rotaru, Northeastern University
David Lie, University of Toronto
Dooho Choi, ETRI
Eul Gyu Im, Hanyang University
Gang Tan, Pennsylvania State University
Harry Wechsler, George Mason University
Howon Kim, Pusan National University
Huy Kang Kim, Korea University
Jason Hong, Carnegie Mellon University
Ji Sun Shin, Sejong University
John Junghwan Rhee, NEC Laboratories America
Jong Kim, POSTECH (Pohang University of Science and Technology)
Kevin Butler, University of Florida
Long Lu, Stony Brook University
Marcus Peinado, Microsoft Research
Min Suk Kang, National University of Singapore
Sang Kil Cha, KAIST
Seong-je Cho, Dankook University
Seungwon Shin, KAIST
Sooel Son, Google
SooHyung Kim, ETRI
Ulrich Rührmair, University of Bochum
Virgil D. Gligor, Carnegie Mellon University
Yinqian Zhang, The Ohio State University