| |||||||||||||||
IoT-SECFOR 2023 : 7th International Workshop on Security and Forensics of IoT | |||||||||||||||
Link: https://www.ares-conference.eu/workshops/iot-secfor-2023/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers
=============== The 7th International Workshop on Security and Forensics of IoT (IoT-SECFOR 2023) https://www.ares-conference.eu/workshops/iot-secfor-2023/ to be held in conjunction with the 18th International Conference on Availability, Reliability and Security (ARES 2023 – http://www.ares-conference.eu) August 29 – September 01, 2023 (Benevento, Italy) Workshop Description ==================== Internet-of-Things (IoT) devices are becoming increasingly prevalent in our society, as the backbone of interconnected smart homes, smart hospitals, smart cities, smart wearables and other smart environments. IoT leverage embedded technologies equipped with sensors and communication capabilities; they are able to broadcast their presence to other objects and interact with them using a plethora of protocols and technologies. It was estimated by Gartner and Statista that a number of devices between 20.4 and 31 billion was in use in 2020, which may rise to 75 billion devices by 2025. Along with usability, efficiency, and cost savings benefits, increasingly, the use of IoT pose security risks and raise challenges to digital forensics. The constantly growing IoT botnets, such as Dark Nexus, emphasize the need to focus on these aspects. This workshop aims to bring together researchers and practitioners from both communities – security and forensics – to discuss problems and solutions regarding IoT. Topics of interest include, but are not limited to: Adaptive security in IoT Challenges related to IoT forensics and security Coexistence of different security protocols in IoT Covert communication in IoT Cryptographic protocols and algorithms for IoT Cybercrimes exploiting IoT Data analysis of IoT for forensic investigation Data ownership and attack simulation methods for IoT networks and devices Identification/preservation of evidence for digital forensic investigations involving IoT Intrusion and malware detection/prevention technologies for IoT Legal and human aspects of security and forensics of IoT Models for risk identification and assessment in IoT networks Privacy and trust in IoT Security and forensic aspects in cyber physical IoT systems Security applications and management of IoT Security architectures and protection mechanisms for IoT Security in Wireless Sensor Networks applied to IoT Threat models and attack strategies for IoT Applications of Artificial Intelligence in security and forensics in IoT Adversarial attacks for Artificial Intelligence in IoT Important Dates =============== Submission Deadline May 14, 2023 Author Notification June 12, 2023 Proceedings Version June 28, 2023 Local & Workshop Chairs ======================= Alessandro Brighente (local chair) University of Padua, IT Virginia N. L. Franqueira University of Kent, UK Aleksandra Mileva University of Goce Delcev, MK Ville Leppänen University of Turku, FI Asma Adnane Loughborough University, UK Pedro Inácio Universidade da Beira Interior, PT Mauro Conti University of Padua, IT Raul H. C. Lopes Brunel University, JISC & CMS/CERN, UK Xiaojun Zhai University of Essex, UK Program Committee ================= Simona Bernardi, Universidad de Zaragoza, ES Luca Caviglione, National Research Council, IT Tiago Cruz, University of Coimbra, PT Vesna Dimitrova, Ss. Cyril and Methodius University, MK James Hardy, University of Derby, UK José Luis Hernández-Ramos, Universidad de Murcia, ES Siv Hilde Houmb, Statnett SF, NO Chhagan Lal, University of Padova, IT Eleonora Losiouk, University of Padua, IT Simona Samardjiska, Radboud University, NL Henrique Santos, University of Minho, PT Krzysztof Szczypiorski, Warsaw University of Technology, PL Tomasz Szydlo, AGH University of Science and Technology, PL Katinka Wolter, Free University of Berlin, DE Chia-Mu Yu, National Chung Hsing University, TW Best Paper Award ================ The best paper award will be sponsored by the Institute of Cyber Security for Society (iCSS), University of Kent, UK. The decision criterion will consider both the paper quality and the oral presentation quality. Submission Guidelines ===================== The submission guidelines can be found at https://www.ares-conference.eu/conference/submission/ (6-8 pages, a maximum of 10 pages is tolerated). Double blind review: All papers submitted to EasyChair should be anonymized (no names or affiliations of authors should be visible in the paper) with no obvious self-references. Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the workshop. Proceedings will be published by ACM. |
|