[Message Prev][Message Next][Thread Prev][Thread Next][Message Index][Thread Index]

[CFP]: 2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021)



---------------------------------------------------------------------------=
------------------------------------=20
C a l l     F o r     P a p e r s=20

2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021)=20

Seoul, South Korea, November 15 (Monday), 2021=20

URL: https://cpsiotsec.github.io=20

co-located with the ACM Conference on Computer and Communications Security =
(ACM CCS 2021)=20

---------------------------------------------------------------------------=
------------------------------------=20

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20
CONFERENCE OUTLINE:=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20

The Joint Workshop on CPS&IoT Security and Privacy invites academia, indust=
ry, and governmental entities to submit:=20

 - Original research papers on the security and privacy of CPS&IoT=20
 - Systematization of Knowledge (SoK) papers on the security and privacy of=
 CPS&IoT=20
 - Demos (hands-on or videos) of testbeds/experiences of CPS&IoT security a=
nd privacy research=20

We seek submissions from multiple interdisciplinary backgrounds tackling se=
curity and privacy issues in CPS&IoT,=20
including but not limited to:=20

- Mathematical foundations for secure CPS/IoT=20
- Control-theoretic approaches=20
- High assurance security architectures=20
- Security and resilience metrics=20
- Metrics and risk assessment approaches=20
- Identity and access management=20
- Privacy and trust=20
- Network security=20
- Game theory applied to CPS/IoT security=20
- Human factors, humans in the loop, and usable security=20
- Understanding dependencies among security, reliability and safety in CPS/=
IoT=20
- Economics of security and privacy=20
- Intrusion and anomaly detection=20
- Model-based security systems engineering=20
- Sensor and actuator attacks=20
- CPS/IoT malware analysis=20
- CPS/IoT firmware analysis=20
- Hardware-assisted CPS/IoT security=20

Also of interest will be papers that can point the research community to ne=
w research directions, and those that=20
can set research agendas and priorities in CPS/IoT security and privacy. Th=
ere will be a best paper award.=20

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20
PAPER SUBMISSION:=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20

Submissions include long papers (12 pages), short papers (6 pages), and abs=
tracts (1 page):=20

- Long papers include a) Original research on a CPS/IoT security and privac=
y topic, b) Systematization of Knowledge of CPS/IoT security and privacy;=
=20
- Short papers include original work-in-progress research on a CPS/IoT secu=
rity and privacy topic; and=20
- 1-page abstracts include demos/interesting findings/insights on CPS/IoT s=
ecurity and privacy, which will be accompanied by a hands-on demo during th=
e workshop.=20

Submitted papers must include appendices and references (except for SoK pap=
ers where references are excluded).=20

Submissions must use the ACM SIG Proceedings Templates (see https://www.acm=
.org/publications/proceedings-template,=20
with a simpler version here: https://github.com/acmccs/format). Only PDF fi=
les will be accepted.=20

Accepted papers will be published by the ACM Press and/or the ACM Digital L=
ibrary. Submissions must not substantially overlap=20
with papers that have been published or that are simultaneously submitted t=
o a journal or a conference with proceedings. Each=20
accepted paper must be presented by a registered author. Submissions not me=
eting these guidelines risk immediate rejection.=20
For questions about these policies, please contact the chairs.=20

NEW FOR 2021: The workshop will feature a second paper submission deadline =
for papers that have been submitted but not accepted to the main conference=
.=20
The deadline will be 10 days after the paper notification is out. Authors a=
re not required to upload CCS reviews; verification of CCS submission statu=
s will be done=20
by informing the program chairs of the paper ID of the CCS submission.=20

Paper submission site: https://easychair.org/conferences/?conf=3Dcpsiotsec2=
021=20

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20
IMPORTANT DATES:=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20

- Submission deadline: June 25, 2021 (23:59 Anywhere on Earth).=20
- Submission deadline applicable only to papers rejected from ACM CCS 2021:=
 July 30, 2021 (23:59 Anywhere on Earth).=20
- Notification of acceptance/rejection (tentative): August 13, 2021.=20
- Deadline for submission of camera-ready papers (hard deadline): September=
 6, 2021=20

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=20
Program Committee Chairs:=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=20

- Cristina Alcaraz, University of Malaga, Spain=20
=E2=80=93 Michail Maniatakos, New York University Abu Dhabi, UAE=20

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20
Program Committee:=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20

- Magnus Almgren, Chalmers University, Sweden=20
=E2=80=93 Rakesh Bobba, Oregon State University, USA=20
- Gedare Bloom, University of Colorado Colorado Springs, USA=20
=E2=80=93 Alvaro Cardenas, UC Santa Cruz, USA=20
=E2=80=93 Mauro Conti, University of Padua, Italy=20
=E2=80=93 Yongkai Fan, China University of Petroleum, China=20
=E2=80=93 Vasileios Gkioulos, Norwegian University of Science and Technolog=
y, Norway=20
=E2=80=93 Dawu Gu, Shanghai Jiao Tong University, China=20
=E2=80=93 Le Guan, University of Georgia, USA=20
=E2=80=93 Gerhard Hancke, City University of Hong Kong=20
=E2=80=93 Monowar Hasan, Wichita State University, USA=20
=E2=80=93 Sokratis Katsikas, Open University of Cyprus, Cyprus=20
=E2=80=93 Charalambos Konstantinou, Florida State University, USA=20
=E2=80=93 Marina Krotofil, Honeywell Industrial Cyber Security Lab, USA=20
=E2=80=93 Peng Liu, Pennsylvania State University, USA=20
=E2=80=93 Xiaofeng Lu, Beijing University of Posts and Telecommunications, =
China=20
=E2=80=93 Emil Lupu, Imperial College, UK=20
=E2=80=93 Weizhi Meng, Technical Universtiy of Denmark, Denmark=20
- Sibin Mohan, University of Illinois at Urbana-Champaign, USA=20
=E2=80=93 Awais Rashid, University of Bristol, UK=20
=E2=80=93 George Stergiopoulos, University of the Aegean, Greece=20
=E2=80=93 Habeeb Olufowobi, Howard University, USA=20
=E2=80=93 Gang Tan, Pennsylvania State University, USA=20
=E2=80=93 Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Secu=
rity, Germany=20
=E2=80=93 Nektarios Georgios Tsoutsos, University of Delaware, USA=20
=E2=80=93 Claire Vishik, Intel, USA=20
=E2=80=93 Avishai Wool, Tel Aviv University, Israel=20
=E2=80=93 Min Yang, Fudan Fudan University=20
=E2=80=93 Stefano Zanero, Politecnico di Milano, Italy China=20
=E2=80=93 Yuqing Zhang, University of CAS=E2=80=93Jianying Zhou, Singapore =
University of Technology and Design, Singapore=20
=E2=80=93 Saman Zonouz, Rutgers University, USA=20

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20
Steering Committee:=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20

- Rakesh Bobba, Oregon State University=20
=E2=80=93 Alvaro Cardenas, University of California, Santa Cruz=20
=E2=80=93 Peng Liu, Penn State University=E2=80=93Sibin Mohan, University o=
f Illinois at Urbana-Champaign=20
=E2=80=93 Awais Rashid, University of Bristol=20
=E2=80=93 Gang Tan, Penn State University=20
=E2=80=93 Nils Ole Tippenhauer, CISPA=E2=80=93Roshan Thomas, MITRE=20
=E2=80=93 Yuqing Zhang, University of CAS=20

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20
Publicity Chair:=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20

- Sergio Gonzalez, University of Malaga, Spain=20

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20
Web Chair:=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20

- Monowar Hasan, Wichita State University, USA


alt.security.alarms Main Index | alt.security.alarms Thread Index | alt.security.alarms Home | Archives Home