[Message Prev][Message Next][Thread Prev][Thread Next][Message Index][Thread Index]

[5 DAYS - SECOND SUBMISSION]: 2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021) - for papers rejected from ACM CCS 2021 [FIRM DEADLINE: JULY 30th, 2021]



---------------------------------------------------------------------------=
------------------------------------
C a l l     F o r     P a p e r s

2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021)

**** SECOND SUBMISSION DEADLINE APPLICABLE ONLY TO PAPERS REJECTED FROM ACM=
 CCS 2021 *****
****                           FIRM DEADLINE: JULY 30th, 2021              =
          *****

Seoul, South Korea, November 15 (Monday), 2021

URL: https://cpsiotsec.github.io

co-located with the ACM Conference on Computer and Communications Security =
(ACM CCS 2021)

---------------------------------------------------------------------------=
------------------------------------

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
CONFERENCE OUTLINE:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

The Joint Workshop on CPS&IoT Security and Privacy invites academia, indust=
ry, and governmental entities to submit:

 - Original research papers on the security and privacy of CPS&IoT
 - Systematization of Knowledge (SoK) papers on the security and privacy of=
 CPS&IoT
 - Demos (hands-on or videos) of testbeds/experiences of CPS&IoT security a=
nd privacy research

We seek submissions from multiple interdisciplinary backgrounds tackling se=
curity and privacy issues in CPS&IoT,
including but not limited to:

- Mathematical foundations for secure CPS/IoT
- Control-theoretic approaches
- High assurance security architectures
- Security and resilience metrics
- Metrics and risk assessment approaches
- Identity and access management
- Privacy and trust
- Network security
- Game theory applied to CPS/IoT security
- Human factors, humans in the loop, and usable security
- Understanding dependencies among security, reliability and safety in CPS/=
IoT
- Economics of security and privacy
- Intrusion and anomaly detection
- Model-based security systems engineering
- Sensor and actuator attacks
- CPS/IoT malware analysis
- CPS/IoT firmware analysis
- Hardware-assisted CPS/IoT security

Also of interest will be papers that can point the research community to ne=
w research directions, and those that
can set research agendas and priorities in CPS/IoT security and privacy. Th=
ere will be a best paper award.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
PAPER SUBMISSION:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Submissions include long papers (12 pages), short papers (6 pages), and abs=
tracts (1 page):

- Long papers include a) Original research on a CPS/IoT security and privac=
y topic, b) Systematization of Knowledge of CPS/IoT security and privacy;
- Short papers include original work-in-progress research on a CPS/IoT secu=
rity and privacy topic; and
- 1-page abstracts include demos/interesting findings/insights on CPS/IoT s=
ecurity and privacy, which will be accompanied by a hands-on demo during th=
e workshop.

Submitted papers must include appendices and references (except for SoK pap=
ers where references are excluded).

Submissions must use the ACM SIG Proceedings Templates (see https://www.acm=
.org/publications/proceedings-template,
with a simpler version here: https://github.com/acmccs/format). Only PDF fi=
les will be accepted.

Accepted papers will be published by the ACM Press and/or the ACM Digital L=
ibrary. Submissions must not substantially overlap
with papers that have been published or that are simultaneously submitted t=
o a journal or a conference with proceedings. Each
accepted paper must be presented by a registered author. Submissions not me=
eting these guidelines risk immediate rejection.
For questions about these policies, please contact the chairs.

NEW FOR 2021: The workshop will feature a second paper submission deadline =
for papers that have been submitted but not accepted to the main conference=
.
The deadline will be 10 days after the paper notification is out. Authors a=
re not required to upload CCS reviews; verification of CCS submission statu=
s will be done
by informing the program chairs of the paper ID of the CCS submission.

Paper submission site: https://easychair.org/conferences/?conf=3Dcpsiotsec2=
021

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
IMPORTANT DATES:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

- **FIRM** Submission deadline: ***July 13, 2021*** (23:59 Anywhere on Eart=
h).
- **FIRM** Submission deadline applicable only to papers rejected from ACM =
CCS 2021: ***July 30, 2021*** (23:59 Anywhere on Earth).
- Notification of acceptance/rejection (tentative): August 13, 2021.
- Deadline for submission of camera-ready papers (hard deadline): September=
 6, 2021

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Program Committee Chairs:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

- Cristina Alcaraz, University of Malaga, Spain
=E2=80=93 Michail Maniatakos, New York University Abu Dhabi, UAE

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Program Committee:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

- Magnus Almgren, Chalmers University, Sweden
=E2=80=93 Rakesh Bobba, Oregon State University, USA
- Gedare Bloom, University of Colorado Colorado Springs, USA
=E2=80=93 Alvaro Cardenas, UC Santa Cruz, USA
=E2=80=93 Mauro Conti, University of Padua, Italy
=E2=80=93 Yongkai Fan, Communication University of China, China
=E2=80=93 Vasileios Gkioulos, Norwegian University of Science and Technolog=
y, Norway
=E2=80=93 Dawu Gu, Shanghai Jiao Tong University, China
=E2=80=93 Le Guan, University of Georgia, USA
=E2=80=93 Gerhard Hancke, City University of Hong Kong
=E2=80=93 Monowar Hasan, Wichita State University, USA
=E2=80=93 Sokratis Katsikas, Open University of Cyprus, Cyprus
=E2=80=93 Charalambos Konstantinou, Florida State University, USA
=E2=80=93 Marina Krotofil, Honeywell Industrial Cyber Security Lab, USA
=E2=80=93 Peng Liu, Pennsylvania State University, USA
=E2=80=93 Xiaofeng Lu, Beijing University of Posts and Telecommunications, =
China
=E2=80=93 Emil Lupu, Imperial College, UK
=E2=80=93 Weizhi Meng, Technical Universtiy of Denmark, Denmark
- Sibin Mohan, University of Illinois at Urbana-Champaign, USA
=E2=80=93 Awais Rashid, University of Bristol, UK
=E2=80=93 George Stergiopoulos, University of the Aegean, Greece
=E2=80=93 Habeeb Olufowobi, Howard University, USA
=E2=80=93 Gang Tan, Pennsylvania State University, USA
=E2=80=93 Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Secu=
rity, Germany
=E2=80=93 Nektarios Georgios Tsoutsos, University of Delaware, USA
=E2=80=93 Claire Vishik, Intel, USA
=E2=80=93 Avishai Wool, Tel Aviv University, Israel
=E2=80=93 Min Yang, Fudan Fudan University
=E2=80=93 Stefano Zanero, Politecnico di Milano, Italy China
=E2=80=93 Yuqing Zhang, University of CAS=E2=80=93Jianying Zhou, Singapore =
University of Technology and Design, Singapore
=E2=80=93 Saman Zonouz, Rutgers University, USA

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Steering Committee:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

- Rakesh Bobba, Oregon State University
=E2=80=93 Alvaro Cardenas, University of California, Santa Cruz
=E2=80=93 Peng Liu, Penn State University=E2=80=93Sibin Mohan, University o=
f Illinois at Urbana-Champaign
=E2=80=93 Awais Rashid, University of Bristol
=E2=80=93 Gang Tan, Penn State University
=E2=80=93 Nils Ole Tippenhauer, CISPA=E2=80=93Roshan Thomas, MITRE
=E2=80=93 Yuqing Zhang, University of CAS

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Publicity Chair:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

- Sergio Gonzalez, University of Malaga, Spain

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Web Chair:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

- Monowar Hasan, Wichita State University, USA



alt.security.alarms Main Index | alt.security.alarms Thread Index | alt.security.alarms Home | Archives Home