posted by user: Mallouli || 5852 views || tracked by 9 users: [display]

SECTEST 2013 : The Fourth IEEE International Workshop on Security Testing

FacebookTwitterLinkedInGoogle

Link: http://www.spacios.eu/sectest2013/
 
When Mar 22, 2013 - Mar 22, 2013
Where Luxembourg
Submission Deadline Jan 7, 2013
Notification Due Feb 4, 2013
Final Version Due Feb 18, 2013
Categories    security   testing   formal   tools
 

Call For Papers

The Fourth IEEE International Workshop on Security Testing (SECTEST 2013)

Affiliated with ICST 2013, Luxembourg, March 22, 2013

http://www.spacios.eu/sectest2013/



** IMPORTANT DATES

Papers due: January 7, 2013

Notification: February 4, 2013

Camera-ready due: February 18, 2013



** BACKGROUND, AIM AND SCOPE



To improve software security, several techniques, including vulnerability modelling and security testing, have been developed but the problem remains unsolved. On one hand, the workshop tries to answer how vulnerability modelling can help users understand the occurrence of vulnerabilities so to avoid them, and what the advantages and drawbacks of the existing models are to represent vulnerabilities. At the same time, the workshop tries to understand how to solve the challenging security testing problem given that testing the mere functionality of a system alone is already a fundamentally critical task, how security testing is different from and related to classical functional testing, and how to assess the quality of security testing. The objective of this workshop is to share ideas, methods, techniques, and tools about vulnerability modelling and security testing to improve the state of the art.

In particular, the workshop aims at providing a forum for practitioners and researchers to exchange ideas, perspectives on problems, and solutions. Both papers proposing novel models, methods, and algorithms and reporting experiences applying existing methods on case studies and industrial examples are welcomed. The topics of interest include, but are not restricted to:

- network security testing

- application security testing

- security requirements definition and modelling

- security and vulnerability modelling

- runtime monitoring of security-relevant applications

- security testing of legacy systems

- cost effectiveness issues

- comparisons between security-by-design and formal analyses

- formal techniques for security testing and validation

- security test generation and oracle derivation

- specifying testable security constraints

- test automation

- penetration testing

- regression testing for security

- robustness and fault tolerance to attacks

- test-driven diagnosis of security weaknesses

- process and models for designing and testing secure system

- when to perform security analysis and testing

- "white box" security testing techniques

- compile time fault detection and program verification

- tools and case studies

- industrial experience reports



** SUBMISSION

We solicit both full papers (8 pages) and short papers (2 pages) in IEEE two-column format. We also solicit demonstrations of security testing tools (4 pages).

All submissions will be peer-reviewed. Authors of accepted papers must guarantee that their paper will be presented at the workshop.

Authors are invited to submit their papers electronically, as portable document format (pdf) or postscript (ps); please, do not send files formatted for work processing packages (e.g., Microsoft Word or Wordperfect files). The only mechanism for paper submissions is via the electronic submission web-site powered by EasyChair.

https://www.easychair.org/conferences/?conf=sectest2013


** PUBLICATION

The proceedings will be published in the IEEE digital library.



** PROGRAM COMMITTEE

Paul Ammann (George Mason University, USA)
Alessandra Bagnato (Softeam, France)
Ruth Breu (University of Innsbruck, Austria)
Achim Brucker (SAP Research, Germany)
Frédéric Cuppens (Telecom Bretagne, France)
Khaled El Fakih (American University of Sharjah, UAE)
Yliès Falcone (Grenoble University, France)
Daniel Faigin (The Aerospace Corporation, USA)
Roland Groz (Grenoble University, France)
Bruno Legeard (Smartesting, France)
Keqin Li (SAP Research, France; co-chair)
Lijun Liu (China Mobile Research Institute, China)
Wissam Mallouli (Montimage, France; co-chair)
Jun Pang (University of Luxembourg, Luxembourg)
Nahid Shahmehri (Linköpings University, Sweden)
Luca Vigano (University of Verona, Italy)
Bachar Wehbi (Montimage, France)
Nina Yevtushenko (Tomsk State University, Russia)


** STREERING COMMITTEE

Alessandro Armando (University of Genova, Italy)
Ana Cavalli (Telecom SudParis, France)
Jorge Cuellar (Siemens, Germany)
Alexander Pretschner (KIT, Germany)
Yves Le Traon (University of Luxembourg, Luxembourg)

Related Resources

CCNC 2021   IEEE Consumer Communications & Networking Conference
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ICST 2021   IEEE International Conference on Software Testing, Verification and Validation 2021
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
ISSTA 2021   International Symposium on Software Testing and Analysis
CYBI 2021   8th International Conference on Cybernetics & Informatics
USENIX Security 2021   30th USENIX Security Symposium (Winter Deadline)
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
ASE 2021   The 36th IEEE/ACM International Conference on Automated Software Engineering
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics