posted by user: Mallouli || 2202 views || tracked by 4 users: [display]

SECTEST 2012 : The Third International Workshop on Security Testing

FacebookTwitterLinkedInGoogle

Link: http://www.spacios.eu/sectest2012/
 
When Apr 21, 2012 - Apr 21, 2012
Where Montreal, Quebec, Canada
Submission Deadline Jan 30, 2012
Notification Due Feb 25, 2012
Final Version Due Mar 15, 2012
 

Call For Papers

Important dates
Papers due: January 30, 2012
Notification: February 25, 2012
Camera-ready due: March 15, 2012

Background, aim and scope

To improve software security, several techniques, including vulnerability modelling and security testing, have been developed but the problem remains unsolved. On one hand, the workshop tries to answer how vulnerability modelling can help users understand the occurrence of vulnerabilities so to avoid them, and what the advantages and drawbacks of the existing models are to represent vulnerabilities. At the same time, the workshop tries to understand how to solve the challenging security testing problem given that testing the mere functionality of a system alone is already a fundamentally critical task, how security testing is different from and related to classical functional testing, and how to assess the quality of security testing. The objective of this workshop is to share ideas, methods, techniques, and tools about vulnerability modelling and security testing to improve the state of the art.

In particular, the workshop aims at providing a forum for practitioners and researchers to exchange ideas, perspectives on problems, and solutions. Both papers proposing novel models, methods, and algorithms and reporting experiences applying existing methods on case studies and industrial examples are welcomed. The topics of interest include, but are not restricted to:

network security testing
application security testing
security requirements definition and modelling
security and vulnerability modelling
runtime monitoring of security-relevant applications
security testing of legacy systems
cost effectiveness issues
comparisons between security-by-design and formal analyses
formal techniques for security testing and validation
security test generation and oracle derivation
specifying testable security constraints
test automation
penetration testing
regression testing for security
robustness and fault tolerance to attacks
test-driven diagnosis of security weaknesses
process and models for designing and testing secure system
when to perform security analysis and testing
"white box" security testing techniques
compile time fault detection and program verification
tools and case studies
industrial experience reports

This workshop is a follow-up and combination of the First International Workshop on Security Testing (SECTEST 2008) and the First International Workshop on Modelling and Detection of Vulnerabilities (MDV 2010), as well as the Second International Workshop on Security Testing (SECTEST 2011).

Submission
We solicit both full papers (8 pages) and short papers (2 pages) in IEEE two-column format. We also solicit demonstrations of security testing tools (2 pages).
All submissions will be peer-reviewed. Authors of accepted papers must guarantee that their paper will be presented at the workshop.

Authors are invited to submit their papers electronically, as portable document format (pdf) or postscript (ps); please, do not send files formatted for work processing packages (e.g., Microsoft Word or Wordperfect files). The only mechanism for paper submissions is via the electronic submission web-site powered by EasyChair (https://www.easychair.org/account/signin.cgi?timeout=1;conf=sectest2012).

Publication
The proceedings will be published in the IEEE digital library.
Invited Talks

Audience
Participation to the workshop will be open to anybody willing to register.

Program Committee

Keqin Li (SAP Research, France; co-chair)
Wissam Mallouli (Montimage, France; co-chair)
Luca Viganò (Università di Verona, Italy; co-chair)
more tba

Steering Committee

Alessandro Armando (University of Genova, Italy)
Ana Cavalli (Telecom SudParis, France)
Jorge Cuellar (Siemens, Germany)
Alexander Pretschner (KIT, Germany)
Yves Le Traon (University of Luxembourg, Luxembourg)

Additional Information

The workshop is supported by the projects Diamonds and SPaCIoS.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ISSTA 2024   The ACM SIGSOFT International Symposium on Software Testing and Analysis (Round 1)
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
S&P 2025   The 45th IEEE Symposium on Security and Privacy
ISSTA 2024   The ACM SIGSOFT International Symposium on Software Testing and Analysis (Round 2)
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)