Track 2: Security, Privacy, and Trust

Track Chair:

  • Marco Viviani (University of Milan-Bicocca)
  • Rasheed Husain (Bristol Digital Futures Institute, UK)

Scope                                                                                                                                                                                              The Security, Privacy and Trust track aims at providing a forum for researchers and engineers in academia and industry to foster an exchange of research results, experiences, and products that involve the cybersecurity aspects in our daily activities. The focus of the track is on advances in

Cybersecurity technologies that involves new attacks and hacker exploits in several domains such as automotive, cyber-physical systems, networking infrastructure, quantum computing, artificial intelligence, deep learning for information security, digital crime and forensics, intrusion detection/prevention and incident response, malware and attack analysis, privacy and data breaches, and governance and information security management. The track aims at presenting the advancement on the state of art in these fields and spreading their adoption in several scenarios involving main stockholders of the Security, Privacy and Trust domain. We solicit submissions of original unpublished scholarly work that is not under consideration by another journal or conference.

Topics

  • Security threats and vulnerabilities
  • Privacy and Security in Cloud and Edge Computing
  • Privacy and Security in Data Center Networks
  • Automated Vehicular Technologies
  • Vehicular Communications and Networks
  • In-Vehicle communication protocols
  • Offensive and Defensive Cybersecurity
  • Identity Management and Key Management Systems
  • Security and Privacy in Quantum Computing
    Exploit design and implementation
  • Network privacy and security
  • Application security
  • Cyber-security solutions for connected and autonomous vehicles
  • Attacks and Countermeasures
  • Authentication
  • Safety and Security Trade-off and Convergences
  • Distributed systems security
  • Embedded systems security
  • Forensics
  • Intrusion detection and Response
  • Malware and virus detection
  • Mobile security and privacy
  • Network security
  • Privacy-preserving systems
  • IoT privacy and security
  • Security and privacy policies
  • Security architectures
  • System security
  • Usable security and privacy
  • Web security and privacy
  • Privacy of vehicular data
  • Standardization and Interoperability
  • National information Security
  • Mobile trusted computing
  • Security policy and management of trusted computing
  • Access control for trusted platforms
  • Privacy aspects of trusted computing
  • Verification of trusted computing architectures
  • End-user interactions with trusted platforms
  • Limitations of trusted computing.

This topic list is not meant to be exhaustive. Security and privacy is interested in all aspects of computer security and privacy.

Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Program Committee:

IberiaMedeirosLaSIGE, Faculdade de Ciências da Universidade de Lisboa, Portugal
ManuelMunierUPPA, France
Raul PardoIT University of Copenhagen, Denmark
StelvioCimato Universita degli studi di Milano, Italy
MarcLacosteOrange Labs 
Marco De VincenziIIT-CNR, Italy
FrancescoSantiniDipartimento di Matematica e Informatica, Università di Perugia, Italy
MiranTahaUniversity of Sulaimani, Iraq
Romain LabordeUniversity Paul Sabatier Toulouse III, France
BattouAmalNew University Campus Agadir, Morocco
AbderrahimMaizateRITM Laboratory, CED Engineering Sciences Ecole Superieure de Technologie Hassan II University of Casablanca, Morocco
Stefano SebastioCollins Aerospace, Irland
NaercioMagaiaUniversity of Sussex, United Kingdom
Chinmaya KumarDehuryUniversity of Tartu