posted by organizer: PieterPhilippaerts || 12625 views || tracked by 21 users: [display]

ESSoS 2014 : International Symposium on Engineering Secure Software and Systems

FacebookTwitterLinkedInGoogle


Conference Series : Engineering Secure Software and Systems
 
Link: https://distrinet.cs.kuleuven.be/events/essos/2014/
 
When Feb 26, 2014 - Feb 28, 2014
Where Munich, Germany
Abstract Registration Due Sep 6, 2013
Submission Deadline Sep 13, 2013
Notification Due Nov 18, 2013
Final Version Due Dec 8, 2013
Categories    security   secure software engineering
 

Call For Papers

Call For Papers

International Symposium on Engineering Secure Software and Systems
(ESSoS)
http://distrinet.cs.kuleuven.be/events/essos/2014/
February 26 - 28, 2014, Munich, Germany

In cooperation with (pending): ACM SIGSAC and SIGSOFT and IEEE CS (TCSP)


CONTEXT AND MOTIVATION

Trustworthy, secure software is a core ingredient of the modern world.
So is the Internet. Hostile, networked environments, like the Internet,
can allow vulnerabilities in software to be exploited from anywhere. To
address this, high-quality security building blocks (e.g., cryptographic
components) are necessary, but insufficient. Indeed, the construction of
secure software is challenging because of the complexity of modern
applications, the growing sophistication of security requirements, the
multitude of available software technologies and the progress of attack
vectors. Clearly, a strong need exists for engineering techniques that
scale well and that demonstrably improve the software's security
properties.


GOAL AND SETUP

The goal of this symposium, which will be the sixth in the series, is to
bring together researchers and practitioners to advance the states of
the art and practice in secure software engineering. Being one of the
few conference-level events dedicated to this topic, it explicitly aims
to bridge the software engineering and security engineering communities,
and promote cross-fertilization. The symposium will feature two days of
technical program with keynote presentations by Ross Anderson and
Adrian Perrig. In addition to academic papers, the symposium encourages
submission of high-quality, informative industrial experience papers
about successes and failures in security software engineering and the
lessons learned. Furthermore, the symposium also accepts short idea
papers that crisply describe a promising direction, approach, or
insight.


TOPICS

The Symposium seeks submissions on subjects related to its goals. This
includes a diversity of topics including (but not limited to):

- scalable techniques for threat modeling and analysis of
vulnerabilities
- specification and management of security requirements and policies
- security architecture and design for software and systems
- model checking for security
- specification formalisms for security artifacts
- verification techniques for security properties
- systematic support for security best practices
- security testing
- security assurance cases
- programming paradigms, models and DSL's for security
- program rewriting techniques
- processes for the development of secure software and systems
- security-oriented software reconfiguration and evolution
- security measurement
- automated development
- trade-off between security and other non-functional requirements
(in particular economic considerations)
- support for assurance, certification and accreditation
- empirical secure software engineering
- security by design

IMPORTANT DATES

Abstract submission: September 6, 2013
Paper submission: September 13, 2013
Author notification: November 18, 2013
Camera-ready: December 8, 2013


SUBMISSION AND FORMAT

The proceedings of the symposium are published by Springer-Verlag in the
Lecture Notes in Computer Science Series (http://www.springer.com/lncs).
Submissions should follow the formatting instructions of Springer LNCS.
Submitted papers must present original, non-published work of high
quality.

For selected papers, there will be an invitation to submit extended
versions to a special issue in the International Journal of Information
Security.

Two types of papers will be accepted:

Full papers (max 14 pages without bibliography/appendices) - May
describe original technical research with a solid foundation, such as
formal analysis or experimental results, with acceptance determined
mostly based on novelty and validation. Or, may describe case studies
applying existing techniques or analysis methods in industrial settings,
with acceptance determined mostly by the general applicability of
techniques and the completeness of the technical presentation details.

Idea papers (max 8 pages with bibliography) - May crisply describe a
novel idea that is both feasible and interesting, where the idea may
range from a variant of an existing technique all the way to a vision
for the future of security technology. Idea papers allow authors to
introduce ideas to the field and get feedback, while allowing for later
publication of complete, fully-developed results. Submissions will be
judged primarily on novelty, excitement, and exposition, but feasibility
is required, and acceptance will be unlikely without some basic,
principled validation (e.g., extrapolation from limited experiments or
simple formal analysis). In the proceedings, idea papers will clearly
identified by means of the "Idea" tag in the title.

Two affiliated workshops also solicit contributions. Further guidelines
will appear on the website of the symposium.


STEERING COMMITTEE

Jorge Cuellar (Siemens AG)
Wouter Joosen (Katholieke Universiteit Leuven) - chair
Fabio Massacci (Università di Trento)
Gary McGraw (Cigital)
Bashar Nuseibeh (The Open University)
Daniel Wallach (Rice University University)


ORGANIZING COMMITTEE

General chair: Alexander Pretschner (Technische Universität München, DE)
Program co-chairs: Jan Jürjens (TU Dortmund and Fraunhofer ISST, DE), Frank Piessens (Katholieke Universiteit Leuven, BE)
eHealth workshop chair: Wouter Joosen (Katholieke Universiteit Leuven)
Smart Grid workshop chair: Jorge Cuellar (Siemens AG)
Publication chair: Nataliia Bielova (INRIA Rennes, FR)
Publicity chair: Pieter Philippaerts (Katholieke Universiteit Leuven, BE)
Local arrangements chair: Regina Jourdan (Technische Universität München, DE)
Web chair: Ghita Saevels (Katholieke Universiteit Leuven, BE)


PROGRAM COMMITTEE

Ruth Breu, University of Innsbruck, Austria
Lorenzo Cavallaro, Royal Holloway University of London, UK
Anupam Datta, Carnegie Mellon University, US
Werner Dietl, University of Washington, US
François Dupressoir, IMDEA, Spain
Eduardo Fernandez, Florida Atlantic University, US
Eduardo Fernandez-Medina Paton, Universidad de Castilla-La Mancha, Spain
Cormac Flanagan, U. C. Santa Cruz, US
Dieter Gollmann, TU Hamburg-Harburg, Germany
Arjun Guha, Cornell University, US
Christian Hammer, Saarland University, Germany
Hannes Hartenstein, Karlsruher Institut für Technologie, Germany
Maritta Heisel, U. Duisburg Essen, Germany
Peter Herrmann, NTNU, Trondheim, Norway
Valerie Issarny, INRIA, France
Limin Jia, Carnegie Mellon University, US
Martin Johns, SAP Research, Germany
Jay Ligatti, University of South Florida, US
Heiko Mantel, TU Darmstadt, Germany
Haris Mouratidis, University of East London, UK
Martín Ochoa, Siemens AG, Germany
Jae Park, University of Texas at San Antonio, US
Erik Poll, RU Nijmegen, The Netherlands
Wolfgang Reif, University of Augsburg, Germany
Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium
Ketil Stølen, SINTEF, Norway
Steve Zdancewic, University of Pennsylvania, US
Mohammad Zulkernine, Queens University, Canada

Related Resources

ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ICTSS 2025   37th International Conference on Testing Software and Systems
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
MODERN SYSTEMS 2025   International Conference of Modern Systems Engineering Solutions
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICSEA 2025   The Twentieth International Conference on Software Engineering Advances
IJCSITY 2024   International Journal of Computational Science and Information Technology