| |||||||||||||||
ADIoT 2023 : The 6th International Workshop on Attacks and Defenses for Internet-of-Things | |||||||||||||||
Link: https://adiot.compute.dtu.dk/2023/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
WELCOME TO ADIoT 2023
https://adiot.compute.dtu.dk/2023/ The 6th International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2023) In Conjunction with ESORICS 2023, The Netherlands, on September 25-29, 2023 Call For Papers: Partner Conference: EISA 2023 http://eisa.compute.dtu.dk/2023/ The Internet of Things (IoT) technology is widely adopted by the vast majority of businesses and is impacting every aspect of the world. However, the natures of the Internet, communication, embedded OS and backend recourses make IoT objects vulnerable to cyber attacks. In addition, most standard security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and it is urgent to analyze IoT-specific cyber attacks to design novel and efficient security mechanisms. This workshop will focus on IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. Topics of interest include, but are not limited to the ones listed below. - Malware and unwanted software for IoT - Vulnerability analysis and reverse engineering for IoT - IoT security and privacy - IoT forensic techniques - Usable security and privacy for IoT - Intrusion detection and prevention for IoT - Cyber intelligence techniques for IoT - IoT infrastructures and mitigation techniques - IoT Hardware security - Cyber physical systems security - Adversarial learning for IoT - IoT Cyber crime - Denial-of-Service attacks for IoT - Security measurement for IoT - IoT security visualization techniques - Edge/Fog computing attack and defense Important Dates: - Workshop paper submission deadline: 15 July 2023 (23:59 AOE) - Workshop paper notification: 20 August 2023 - Camera-ready version deadline: 1 September 2023 - Workshop date: 28-29 September, 2023 Submission Guidelines: Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 20 pages (full paper including the bibliography and well-marked appendices) or 10 pages (short paper including the bibliography and well-marked appendices) in the LNCS format. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. - Full Paper: showcasing novel and mature research results. Papers should be written in LNCS with 20 pages including the bibliography and well-marked appendices. - Short Paper: showcasing original / novel idea and ongoing work that hat has not yet reached the maturity level of a full paper. Short papers are limited to 10 pages in LNCS format, including bibliography and appendices. Authors of accepted papers must guarantee that their papers will be registered and presented at the workshop (We are closely monitoring current COVID-19 situation, and online presentation is under consideration). The qualified papers will be invited to submit an extended version to following special issues. 1. Journal of Information Security and Applications, IF=4.96 2. International Journal of Applied Cryptography The accepted papers will have post-proceedings published in LNCS by Springer. To make a submission via Easychair System. If there is any question, please contact us at: adiot2023@easychair.org. |
|