| |||||||||||||||
IoT-SECFOR 2020 : The 4th International Workshop on Security and Forensics of IoT | |||||||||||||||
Link: https://www.ares-conference.eu/workshops/iot-secfor-2020/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Workshop Description
==================== Internet-of-Things (IoT) are becoming increasingly prevalent in our society, as the backbone of interconnected smart homes, smart hospitals, smart cities, smart wearables and other smart environments. IoT leverage embedded technologies equipped with sensors and communication capabilities; they are able to broadcast their presence to other objects and interact with them using different protocols. Gartner predicts that, by 2020, 21 billion IoT endpoints will be in use. Along with usability, efficiency, and cost savings benefits, increasingly, the use of IoT pose security risks and raise challenges to digital forensics. The massive DDoS caused by the Mirai botnet which exploited IoT devices is a recent example. This workshop aims to bring together researchers and practitioners from both communities – security and forensics – to discuss problems and solutions regarding IoT. Topics of interest include, but are not limited to: Adaptive security in IoT Challenges related to IoT forensics and security Coexistence of different security protocols in IoT Covert communication in IoT Cryptography protocols and algorithms for IoT Cybercrimes exploiting IoT Data analysis of IoT for forensic investigation Data ownership and attack simulation methods for IoT networks and devices Identification/preservation of evidence for digital forensic investigations involving IoT Intrusion and malware detection/prevention technologies for IoT Legal and human aspects of security and forensics of IoT Models for risk identification and assessment in IoT networks Privacy and trust in IoT Security and forensic aspects in cyber physical IoT systems Security applications and management of IoT Security architectures and protection mechanisms for IoT Security in Wireless Sensor Networks applied to IoT Threat models and attack strategies for IoT Workshop Chairs =============== Virginia N. L. Franqueira University of Kent, UK Pedro Inácio Universidade da Beira Interior, PT Aleksandra Mileva University of Goce Delcev, MK Ville Leppänen University of Turku, FI Asma Adnane Loughborough University, UK Mauro Conti University of Padua, IT Raul H. C. Lopes Brunel University, JISC & CMS/CERN, UK Xiaojun Zhai University of Essex, UK Publicity Co-chairs =================== Chhagan Lal University of Padua, IT chhagan.iiita[at]gmail.com Chia-Mu Yu National Chung Hsing University, TW chiamuyu[at]gmail.com Program Committee ================= Budi Arief, University of Kent, UK Simona Bernardi, University of Zaragoza, ES Alberto Compagno, Cisco Systems, FR Patrik Ekdahl, Ericsson AB, SE Diogo Fernandes, Booking.com, NL Sheikh Mahbub Habib, Continental AG, DE James Hardy, University of Derby, UK Richard Hill, University of Huddersfield, UK Siv Hilde Houmb, Statnett SF, NO Muhammad Taimoor Khan, University of Greenwich, UK Fatih Kurugollu, Univerity of Derby, UK Elsa Prieto, Atos, ES Simona Samardziska, Radboud University, NL Savio Sciancalepore, Hamad bin Khalifa University, QA Tomasz Szydlo, AGH University of Science and Technology, PL Submission Guidelines ===================== The submission guidelines can be found at https://www.ares-conference.eu/conference/submission/ (6-8 pages, a maximum of 10 pages is tolerated). Double blind review: All papers submitted to EasyChair should be anonymized (no names or affiliations of authors should be visible in the paper) with no obvious self-references. Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the workshop. Proceedings will be published by ACM. |
|