Conference and Workshop Announcements
Commentary and Opinion
Sven Dietrich's review of Protocols for Authentication and Key Establishment by Colin Boyd, Anish Mathuria, and Douglas Stebila
News from The Media: Announcements and correspondence (please contribute!)
Listing of academic positions available by
Cipher calendar announcements are on Twitter; follow "ciphernews"
Requests for inclusion in the list should sent per instructions.
New calls or announcements added since Cipher E151 (the calls-for-papers and the calendar announcements may differ slightly in content or time of update):
SP 2020 41st IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 18-20, 2020. (Submissions due first day of each month)
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include:
DAC 2020 Design Automation Conference, Moscone Center West, San Francisco, CA, USA, July 19 - 23, 2020. (Submissions due 27 November 2019)
For 57 years, the Design Automation Conference (DAC) has been recognized as the leading-edge conference on research and practice in tools and methodologies for the design and design automation of electronic circuits and systems. DAC offers outstanding training, education, exhibits and networking opportunities for a worldwide community of designers, researchers, tool developers and vendors. Submissions are invited for Special Sessions, Designer Track, IP and Embedded Systems Track papers and presentations, poster sessions, panels, workshops, tutorials and co-located conferences. Criteria, topics and deadlines for the major tracks are outlined briefly below. Security and Privacy sessions at DAC address an urgent need to create, analyze, evaluate, and improve the hardware, embedded systems and software base of contemporary security solutions. Secure and trustworthy software and hardware components, platforms and supply chains are vital to all domains including financial, healthcare, transportation, and energy. A revolution is underway in many industries that are "connecting the unconnected." Such cyber-physical systems -- e.g., automobiles, smart grid, medical devices, etc. -- are taking advantage of integration of physical systems with information systems. Notwithstanding the numerous benefits, these systems are appealing targets of attacks. The scope and variety of attacks on these systems present design challenges that span embedded hardware, software, networking, and system design.
Springer Human-centric Computing and Information Sciences, Thematic Issue on Security, trust and privacy for Human-centric Internet of Things, (Submissions due 30 November 2019)
Guest Editors: Kim-Kwang Raymond Choo (University of Texas at San Antonio, USA),
Uttam Ghosh (Vanderbilt University, USA),
Deepak Tosh (University of Texas El Paso, USA),
Reza M. Parizi (Kennesaw State University, USA),
and Ali Dehghantanha (University of Guelph, Canada).
Cyber-physical system (CPS) integrates both cyber world and man-made physical world using sensors, actuators and other Internet of Things (IoT) devices, to achieve stability, security, reliability, robustness, and efficiency in a tightly coupled environment. Prevalence of such cyber-physical ecosystem (inherently of distributed nature) imposes exacting demands on architect models and necessitates the design of distributed solutions and other novel approaches. This is essential in order to suitably address the security and privacy concerns since CPS ecosystem involves humans as a part of its core. Blockchain technology offers a distributed and scalable solution to maintain a tamper-resistant ledger, which does not require a central authority. Thus, it can best fit the need of distributed solution to above mentioned security issues in CPS. However, the challenge in integrating Blockchain with CPS is yet to be addressed, which requires various cyber-physical nodes to work effectively and collaboratively in an asynchronous environment. The goal of this special issue is to bring together researchers from different sectors to focus on understanding security challenges and attack surfaces of modern cyber-physical systems, and architect innovative solutions with the help of cutting-edge blockchain related technologies. Potential topics include but are not limited to following:
PETS 2020 20th Privacy Enhancing Technologies Symposium, Montreal, Canada, July 14-18, 2020. (Submissions due 31 May 2019, 31 August 2019, 30 November 2019, and 29 February 2020)
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy
experts from around the world to present and discuss recent advances and new
perspectives on research in privacy technologies. The 20th PETS event will be
organised by Concordia University and the Universite du Quebec a Montreal and
held in Montreal, Canada, on a date in 2020 yet to be determined. Papers undergo
a journal-style reviewing process, and accepted papers are published in the
journal Proceedings on Privacy Enhancing Technologies (PoPETs).
PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality reviewing and publication while also supporting the successful PETS community event. PoPETs is published by Sciendo, part of De Gruyter, which has over 260 years of publishing history. PoPETs does not have article processing charges (APCs) or article submission charges.
Authors can submit papers to PoPETs four times a year, every three months, and are notified of the decisions about two months after submission. In addition to accept and reject decisions, papers may receive resubmit with major revisions decisions, in which case authors are invited to revise and resubmit their article to one of the following two issues. We endeavor to assign the same reviewers to revised submissions. Each paper accepted in the PoPETs 2020 volume must be presented in person at the PETS 2020 symposium.
IEEE Transactions on Emerging Topics in Computing (TETC) and Transactions on Dependable and Secure Computing (TDSC), Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems, (Submissions due 10 December 2019)
Guest Editors: Yuan Hong (Illinois Institute of Tech, USA), Valerie Issarny (Inria, France),
Surya Nepal (CSIRO, Australia), and Mudhakar Srivatsa (IBM Research, USA).
The Internet coupled with recent advances in computing and information technologies such as IoT, mobile Edge/Cloud computing, cyber-physical-social systems, Artificial Intelligence/Machine Learning /Deep Learning, etc., have paved the way for creating next generation smart and intelligent systems and applications that can have transformative impact in our society while accelerating rapid scientific discoveries and innovations. Unprecedented cyber-social, and cyber-physical infrastructures and systems that span geographic boundaries are possible because of the Internet and the growing number of collaboration enabling technologies. With newer technologies and paradigms getting increasingly embedded in the computing platforms and networked information systems/infrastructures that form the digital foundation for our personal, organizational and social processes and activities, it is increasingly becoming critical that the trust, privacy and security issues in such digital environments are holistically addressed to ensure the safety and well-being of individuals as well as our society. IEEE TETC and TDSC seek original manuscripts for a Special Issue/Section on Collaborative Computing and Intelligent Systems, covering the entire spectrum of relevant research activities from infrastructures, models, and systems to applications, and all of the security, privacy and trust aspects therein. Specific topics of interest include, but are not limited to:
IEEE Transaction on Computers, Special Issue on Hardware Security, (Submissions due 15 January 2020)
Guest Editors: Amro Awad (University of Central Florida, USA)
and Rujia Wang (Illinois Institute of Technology, USA).
Recently, the hardware of computing systems has been a major target for cyber attacks. Unlike software vulnerabilities, hardware attacks and vulnerabilities can be difficult to detect, isolate or prevent. Such hardware attacks include adversarial bus snoopers, hardware trojans, and physical access to the system. Additionally, side-channel attacks and covert-channel attacks typically exploit unanticipated information leakage due to hardware implementation or resource sharing. The recent Meltdown and Spectre attacks are prominent examples of vulnerabilities resulting mainly from specific hardware implementations. Moreover, emerging memory technologies, such as non-volatile memories (NVMs), further facilitate hardware attacks due to data remanence. Finally, in cloud systems where limited control of the surrounding environment is an acceptable trade-off, the presence of hardware attacks and vulnerabilities becomes even more plausible. In this special issue on Hardware Security for IEEE Transactions on Computers (TC), we invite original articles that address issues related to the security of hardware components of computing systems. Topics of interest to this special issue include, but not limited to:
EdgeBlock 2020 IEEE International Symposium on Edge Computing Security and Blockchain, Co-located with IEEE INFOCOM 2020, Beijing, China, April 27, 2020. (Submissions due 15 January 2020)
EdgeBlock 2020 is an international forum for researchers to present their latest researches and perspectives on the intersection of blockchain and edge computing (including Internet of Things - IoT). This is an interdisciplinary area that is of increasingly importance. For example, in our new networked society where there are a broad range of IoT devices and cyber physical systems around us, and data from these devices and systems generated at the edge of the network are been sent to some edge devices or the cloud servers for processing and storage. The utility of blockchain in a number of applications, including to secure data-in-transit and data-at-rest in IoT and cyber physical systems, has also been explored in the research community. This is not surprising due to the inherent features of blockchain, such as decentralization and immutability. Therefore, in this workshop we are interested in determining how can we leverage blockchain characteristics to establish trusted environments for IoT, social networking, cyber security and other commercial applications.
CNS 2020 8th IEEE Conference on Communications and Network Security, Avignon, France, June 29 - July 1, 2020. (Submissions due 18 January 2020)
The IEEE Conference on Communications and Network Security (CNS) is a premier forum for cybersecurity researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experiences related to all practical and theoretical aspects of communications and network security. The conference seeks submissions from academia, government, and industry presenting novel research results in communications and network security. Particular topics of interest include, but are not limited to:
SADFE 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering, New York, NY, USA, May 14-15, 2020. (Submissions due 31 January 2020)
The 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) is calling for paper, panel, poster, and tutorial submissions in the broad field of Digital Forensics from both practitioner and researcher's perspectives. With the dynamic change and rapid expansion of the types of electronic devices, networked applications, and investigation challenges, systematic approaches for automating the process of gathering, analyzing and presenting digital evidence are in unprecedented demands. The SADFE conference aims at promoting solutions for related problems. Past speakers and attendees of SADFE have included computer scientists, social scientists, forensic practitioners, lawyers and judges. The synthesis of hard technology and science with social science and practice forms the foundation of this conference. Papers focusing on any of the system, legal, or practical aspects of digital forensics are solicited.
CPSS 2020 6th ACM Cyber-Physical System Security Workshop, Held in conjunction with ACM AsiaCCS 2020, Taipei, Taiwan, June 1, 2020. (Submissions due 10 February 2020)
Cyber-Physical Systems (CPS) of interest to this workshop consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There exist a multitude of CPS devices and applications deployed to serve critical functions in our lives thus making security an important non-functional attribute of such systems. This workshop will provide a platform for professionals from academia, government, and industry to discuss novel ways to address the ever-present security challenges facing CPS. We seek submissions describing theoretical and practical solutions to security challenges in CPS. Submissions pertinent to the security of embedded systems, IoT, SCADA, smart grid, and other critical infrastructure are welcome.
SACMAT 2020 25th ACM Symposium on Access Control Models and Technologies, Barcelona, Spain, June 10-12, 2020. (Submissions due 10 February 2020)
The organizing committee of the 25th ACM Symposium on Access Control Models and Technologies (SACMAT 2020) invites contributions on all aspects of access control. The symposium will provide participants the opportunity to present work at different levels of development, from early work on promising ideas to fully developed technical results as well as system demonstrations. The symposium will feature a Best Paper Award. The program will include keynote talks, research paper presentations, demos, a panel, and a poster session. Papers offering novel research contributions are solicited for submission. Accepted papers will be presented at the symposium and published by the ACM in the symposium proceedings. In addition to the regular research track, this year SACMAT will again host a special track: Blue Sky/Vision Track. Researchers are invited to submit papers describing promising new ideas and challenges of interest to the community as well as access control needs emerging from other fields. We are particularly looking for potentially disruptive and new ideas which can shape the research agenda for the next 10 years. We encourage submissions that present ideas that may have not been completely developed and experimentally evaluated.
USENIX-Security 2020 29th USENIX Security Symposium, Boston, MA, USA, August 12-14, 2020. (Submissions due 15 May 2019, 23 August 2019, 15 November 2019, and 15 February 2020)
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. The Symposium will span three days with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located events will precede the Symposium on August 10 and 11.
DASC 2020 18th IEEE International Conference on Dependable, Autonomic and Secure Computing, Calgary, Canada, June 22-26, 2020. (Submissions due 15 February 2020)
IEEE DASC 2020 aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems. Topics of particular interests include the following tracks, but are not limited to:
Guest Editors: Alireza Jolfaei (Macquarie University, Australia),
Neeraj Kumar (Thapar Institute of Engineering and Technology, India),
Min Chen (Huazhong University of Science and Technology, China),
and Krishna Kant (Temple University, USA).
Autonomous vehicular technology is approaching a level of maturity that gives confidence to the end users in many cities around the world for their usage so as to share the roads with manual vehicles. Autonomous and manual vehicles have different capabilities which may result in surprising safety, security and resilience impacts when mixed together as a part of Intelligent Transportation System (ITS). For example, autonomous vehicles are able to communicate electronically with one another, make fast decisions and associated actuation, and generally act deterministically. In contrast, manual vehicles cannot communicate electronically, are limited by the capabilities and slow reaction of human drivers, and may show some uncertainty and even irrationality in behaviour due to the involvement of human. At the same time, humans can react properly to more complex situations than autonomous vehicles. Unlike manual vehicles, the security of computing and communications of autonomous vehicles can be compromised thereby precluding them from achieving individual or group goals. Given the expected mixture of autonomous and manual vehicles that is expected to persist for many decades, safety and security issues for a mixture of autonomous and manual vehicles are crucial to investigate before autonomous vehicles enter our roadways in numbers. To improve the safety and security of the transportation system, the artificial intelligence (AI) based techniques and deep learning models have extensively been applied to data-driven ITS model. Despite the pioneering works on the integration of ITS data with deep learning techniques, such techniques still require more accurate perception since the false positives generated during the execution of the algorithms can perturb the utility real-time data analytics particularly for safety applications in ITS. More importantly, the recent breakthrough in generative adversarial networks in machine learning better demonstrates the criticality of the safety problems in ITS in the presence of advanced persistent threats as that adversarial models can be generated at an accelerating pace. Therefore, it is crucial to understand how both types of vehicles will fare in terms of safety (avoidance of dangerous situations), performance (acceptable delays and throughput), and resilience (fast recovery from dangerous situations) under a variety of uncertain situations without and with attacks on autonomous vehicle communications in in the presence of hidden advertises who exploit machine learning security loop holes. Despite the existing research on cyber-attacks on the functions of individual vehicles, the focus on the interplay of different types of vehicles under the influence of cyber-adversaries is missing. To address the above-mentioned challenges, there is a need for new algorithmic developments beyond traditional topics in big data, deep neural networks, and cyber security. The aim of this special issue is to provide a multi-aspect up-to-date reference for theoretical development of deep learning models and techniques for improving security and safety in ITS.
Staying in touch....
IEEE Computer Society's Technical Committee on Security and Privacy
|TC home page||TC Officers|
|How to join the TCSP (or other TCs)||Open Access Proceedings|
|Cipher past issues archive|