posted by user: Mallouli || 2401 views || tracked by 4 users: [display]

SECTEST 2012 : The Third International Workshop on Security Testing

FacebookTwitterLinkedInGoogle

Link: http://www.spacios.eu/sectest2012/
 
When Apr 21, 2012 - Apr 21, 2012
Where Montreal, Quebec, Canada
Submission Deadline Jan 30, 2012
Notification Due Feb 25, 2012
Final Version Due Mar 15, 2012
 

Call For Papers

Important dates
Papers due: January 30, 2012
Notification: February 25, 2012
Camera-ready due: March 15, 2012

Background, aim and scope

To improve software security, several techniques, including vulnerability modelling and security testing, have been developed but the problem remains unsolved. On one hand, the workshop tries to answer how vulnerability modelling can help users understand the occurrence of vulnerabilities so to avoid them, and what the advantages and drawbacks of the existing models are to represent vulnerabilities. At the same time, the workshop tries to understand how to solve the challenging security testing problem given that testing the mere functionality of a system alone is already a fundamentally critical task, how security testing is different from and related to classical functional testing, and how to assess the quality of security testing. The objective of this workshop is to share ideas, methods, techniques, and tools about vulnerability modelling and security testing to improve the state of the art.

In particular, the workshop aims at providing a forum for practitioners and researchers to exchange ideas, perspectives on problems, and solutions. Both papers proposing novel models, methods, and algorithms and reporting experiences applying existing methods on case studies and industrial examples are welcomed. The topics of interest include, but are not restricted to:

network security testing
application security testing
security requirements definition and modelling
security and vulnerability modelling
runtime monitoring of security-relevant applications
security testing of legacy systems
cost effectiveness issues
comparisons between security-by-design and formal analyses
formal techniques for security testing and validation
security test generation and oracle derivation
specifying testable security constraints
test automation
penetration testing
regression testing for security
robustness and fault tolerance to attacks
test-driven diagnosis of security weaknesses
process and models for designing and testing secure system
when to perform security analysis and testing
"white box" security testing techniques
compile time fault detection and program verification
tools and case studies
industrial experience reports

This workshop is a follow-up and combination of the First International Workshop on Security Testing (SECTEST 2008) and the First International Workshop on Modelling and Detection of Vulnerabilities (MDV 2010), as well as the Second International Workshop on Security Testing (SECTEST 2011).

Submission
We solicit both full papers (8 pages) and short papers (2 pages) in IEEE two-column format. We also solicit demonstrations of security testing tools (2 pages).
All submissions will be peer-reviewed. Authors of accepted papers must guarantee that their paper will be presented at the workshop.

Authors are invited to submit their papers electronically, as portable document format (pdf) or postscript (ps); please, do not send files formatted for work processing packages (e.g., Microsoft Word or Wordperfect files). The only mechanism for paper submissions is via the electronic submission web-site powered by EasyChair (https://www.easychair.org/account/signin.cgi?timeout=1;conf=sectest2012).

Publication
The proceedings will be published in the IEEE digital library.
Invited Talks

Audience
Participation to the workshop will be open to anybody willing to register.

Program Committee

Keqin Li (SAP Research, France; co-chair)
Wissam Mallouli (Montimage, France; co-chair)
Luca Viganò (Università di Verona, Italy; co-chair)
more tba

Steering Committee

Alessandro Armando (University of Genova, Italy)
Ana Cavalli (Telecom SudParis, France)
Jorge Cuellar (Siemens, Germany)
Alexander Pretschner (KIT, Germany)
Yves Le Traon (University of Luxembourg, Luxembourg)

Additional Information

The workshop is supported by the projects Diamonds and SPaCIoS.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
SECRYPT 2025   22nd International Conference on Security and Cryptography
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI