posted by organizer: sectest2015 || 5461 views || tracked by 3 users: [display]

SECTEST 2015 : The 6th international Workshop on Security Testing

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/sectestworkshop15/home
 
When Apr 13, 2015 - Apr 13, 2015
Where Graz, Austria
Abstract Registration Due Jan 16, 2015
Submission Deadline Jan 23, 2015
Notification Due Feb 20, 2015
Final Version Due Mar 20, 2015
Categories    testing   security   software engineering   vulnerability modelling
 

Call For Papers

********************************************************************************************************
Update: Deadline extended to February 6.
*********************************************************************************************************
The Sixth International Workshop on Security Testing (SECTEST 2015)
https://sites.google.com/site/sectestworkshop15/
Graz, Austria, April 13 2015

Co-located with ICST 2015

To improve software security, several techniques, including vulnerability modelling and security testing, have been developed but the problem remains unsolved. SECTEST workshop tries to answer how vulnerability modelling can help users understand the occurrence of vulnerabilities so to avoid them, and what the advantages and drawbacks of the existing models are to represent vulnerabilities. At the same time, the workshop tries to understand how to solve the challenging security testing problem, how security testing is different from and related to classical functional testing, and how to assess the quality of security testing. This is in particular interesting since testing the mere functionality of a system alone is already a fundamentally critical task. The objective of SECTEST workshop is to share ideas, methods, techniques, and tools about vulnerability modelling and security testing to improve the state of the art. In particular, the workshop aims at providing a forum for practitioners and researchers to exchange ideas, perspectives on problems, and solutions. Both papers proposing novel models, methods, and algorithms and reporting experiences applying existing methods on case studies and industrial examples are welcome. The topics of interest include, but are not restricted to:

• network security testing
• application security testing
• security requirements definition and modelling
• security and vulnerability modelling
• secure interoperability
• runtime monitoring of security‐relevant applications
• security testing of legacy systems
• cost effectiveness issues
• comparisons between security‐by‐design and formal analyses
• formal techniques for security testing and validation
• security test generation and oracle derivation
• specifying testable security constraints
• test automation
• penetration testing
• regression testing for security
• robustness and fault tolerance to attacks
• test‐driven diagnosis of security weaknesses
• process and models for designing and testing secure system
• when to perform security analysis and testing
• "white box" security testing techniques
• compile time fault detection and program verification
• tools and case studies
• industrial experience reports



:: Submission

We solicit both full papers (8 pages) and short papers (2 pages) in IEEE two‐column format. We also solicit demonstrations of security testing tools (4 pages). All submissions will be peer‐reviewed. Authors of accepted papers must guarantee that their paper will be presented at the workshop. Authors are invited to submit their papers electronically, as portable document format (pdf); please, do not send files formatted for work processing packages (e.g., Microsoft Word or Wordperfect files). The mechanism for paper submissions is via EasyChair.



:: Publication

The proceedings will be published in the IEEE digital library.


:: Workshop Chairs

Martín Ochoa (Technical University of Munich, Germany)
Giancarlo Pellegrino (Technical University of Darmstadt, Germany)


:: Important Dates

Papers due: February 6, 2015
Notification: March 2, 2015
Camera‐ready due: March 20, 2015

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IJME 2024   International Journal of Microelectronics Engineering
ISSTA 2024   The ACM SIGSOFT International Symposium on Software Testing and Analysis (Round 1)
CSW 2024   2024 3rd International Conference on Cyber Security
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
IJAIT 2024   International Journal of Advanced Information Technology
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data