![]() |
| |||||||||||||||
ASOD 2025 : 2nd International workshop on Advances in Secure Software Deployments | |||||||||||||||
Link: https://2025.ares-conference.eu/program/asod/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers Advances in Secure Software Deployments (ASOD 2025) to be held in conjunction with the 20th International Conference on Availability, Reliability and Security (ARES 2025 – http://2025.ares-conference.eu) August 11 – August 14, 2025 in Ghent, Belgium Submission Guidelines The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at https://2025.ares-conference.eu/call-for-papers/ Workshop Description: Securely deploying software applications and systems onto diverse production environments is a constantly evolving landscape. New security requirements are continuously proposed along with routine review and revisions of existing ones. Target production environments benefit from cutting edge technology resulting in the inclusion of new hosting platforms and its associated challenges to successful deployments. The ability to build and sustain deployment environments that can address automation, security, rapid deliveries, continuous build and deploy routines, is constantly evolving requiring both novel and improved upon approaches. The Advances in Secure Software Deployments workshop (ASOD) is focused on presenting and discussing the latest in novel and applied research and practice, along with experiential findings covering all areas of secure deployments of software and systems to diverse production environments. The workshop aims to converge a community of researchers and practitioners from academia and industry who are interested in advancing the state of the art. Submissions from academia and industry covering cutting edge approaches, novel findings, and practitioner insights are welcomed. Topics of interest include, but are not limited to: • Deployment approaches to diverse environments such as IoT, cloud, edge devices, embedded devices, enterprise installations, industrial control systems and similar • Automating security requirements validation and evidence gathering • Design of secure deployable artifacts such as containers, virtual machines and similar • Post-deployment sustainment and monitoring • Continuous secure deployments • Deployments in insecure, air gapped, and highly regulated environments • Secure CI/CD design and maintenance • AI driven deployment practices • Secure deployments under resource constraints • Using DevSecOps in secure deployments • Deployment rollbacks, updates, and security patching • Integration of and updates to security requirements • Secure deployment strategies, planning, methodologies, and workflows Important Dates Submission Deadline not later than May 12, 2025 Author Notification not later than May 30, 2025 Proceedings Version June 18, 2025 (this deadline cannot be changed!!) Conference August 11-14, 2025 Program Chair/ Workshop Chair Dr. Jose Andre Morales, Carnegie Mellon University, josemora@andrew.cmu.edu (PoC and Co-chair) Hasan Yasar, Carnegie Mellon University, hyasar@cmu.edu (PoC and Co-chair) Program Committee Dr. Jose Andre Morales, Carnegie Mellon University Hasan Yasar, Carnegie Mellon University Ehab Al-Shaer, Carnegie Mellon University Juha Röning, University of Oulu, Finland Martin Gilje Jaatun, SINTEF, Norway Lotfi ben Othmane, University of North Texas, USA Nazim Agulmine, University of Paris-Saclay, France Tuba Yavuz, University of Florida, USA Mohammad Zulkernine, Queen’s University, Canada Simone Curzi, Microsoft, Italy Altaz Valani, Info-Tech, Canada Arun Prabhakar, Boston Consulting, USA |
|