posted by organizer: paolopalmieri || 150 views || tracked by 1 users: [display]

MAL-IoT 2025 : 10th International Workshop on Malicious Software and Hardware in the Internet of Things

FacebookTwitterLinkedInGoogle

Link: https://security.ucc.ie/mal-iot2025/
 
When May 28, 2025 - May 28, 2025
Where Cagliari, Italy
Submission Deadline Feb 28, 2025
Notification Due Mar 24, 2025
Final Version Due Apr 7, 2025
Categories    security   cryptography   internet of things   embedded systems
 

Call For Papers

Co-located with ACM International Conference on Computing Frontiers 2025

Cyber-physical and smart embedded systems, already highly networked, are increasingly connected to form the Internet of Things, handling large amounts of private and safety critical data. The pervasive diffusion of these devices will create several threats to privacy and could open new possibilities for attackers, since the security of even large portions of the Internet of Things could be harmed by compromising a reduced number of components. The possibility of securely updating devices should be guaranteed and it should be possible to verify and assert the root of trust of components. With respect to this context, we invite contributions in different areas of security and privacy in the Internet of Things. Topics of interest for the workshop include but are not limited to:

- Malicious firmware design and detection
- Malware in Internet of Things applications
- Hardware root of trust
- Privacy issues of IoT and pervasive systems
- Supply chain security and hardware trojans
- Hardware authentication and IP protection
- Secure communication and key-management
- Implementation attacks and countermeasures
- Emerging threats and attack vectors in the Internet of Things
- Secure data sharing in federated IoT environments
- Secure Artificial intelligence for IoT devices
- GDPR-compliant hardware and software design

Prospective authors are invited to submit novel contributions, works in progress, and positional papers (4 to 8 pages for regular papers, 2 to 4 pages for extended abstracts, double-column ACM conference format). Submissions must be anonymous with no author names, affiliations, acknowledgments, or obvious references.

Computing Frontiers 2025 has obtained the technical sponsorship of the ACM Association for Computing Machinery. All the papers will be published on the ACM Digital Library. At least one author of an accepted paper is required to register for the whole Computing Frontiers 2025 conference and indexed in SCOPUS.

Related Resources

CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
Integrating Embodied Intelligence and Io 2025   Intelligent Computing: Special Issue: Advanced Intelligent Computation for Integrating Embodied Intelligence and IoT Systems
AIVTS 2025   The First International Conference on AI-enabled Unmanned Autonomous Vehicles and Internet of Things for Critical Services
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
IN4PL 2025   6th IFAC/INSTICC International Conference on Innovative Intelligent Industrial Production and Logistics
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
SYNERGY 2025   The 3rd International Workshop on Engineering Intelligent, Trustworthy, and Secure Internet of Things (IoT) Systems
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography