posted by organizer: joeri || 2204 views || tracked by 2 users: [display]

SPIDA 2018 : Workshop on Security Protocol Implementations: Development and Analysis

FacebookTwitterLinkedInGoogle

Link: https://spida.cs.ru.nl
 
When Apr 23, 2018 - Apr 23, 2018
Where London, United Kongdom
Abstract Registration Due Jan 8, 2018
Submission Deadline Jan 12, 2018
Notification Due Feb 5, 2018
Final Version Due Feb 23, 2018
Categories    security   security protocols
 

Call For Papers

Workshop on Security Protocol Implementations: Development and Analysis (SPIDA)
23 April 2018 - London, United Kingdom
https://spida.cs.ru.nl
co-located to IEEE EuroS&P 2018 - https://www.ieee-security.org/TC/EuroSP2018/

CALL FOR PAPERS

Security protocols (such as TLS for internet, WPA2 for WiFi, GSM for mobile telephony, to mention just some of the broadly used ones) play a crucial role in protecting the digital communications and interactions we rely on in our modern society. The security of such protocols can break because of fundamental, inherent flaws, but the bulk of the security flaws are due to implementation flaws. The complexity and unclarity of typical protocol specifications makes it more likely to introduce such flaws and makes it harder to spot them. SPIDA seeks novel contributions and case studies that address the challenges when implementing security protocols. How can implementations be analysed, statically or dynamically, in a systematic way? How can we make sure that the specifications are precise, but still easy to understand and implement correctly? And how to assure implementations faithfully follow such specifications?

The workshop seeks submissions from academia and industry presenting novel research results to tackle this issue. Relevant topics include, but are not limited to:
- Formal verification of code
- Software engineering approaches to go from specifications to implementations
- Protocol reverse engineering
- LangSec approaches to security protocols
- Fuzzing techniques, e.g. evolutionary or white-box fuzzing
- State machine inference
- Symbolic execution
- Model-based testing of protocol implementations
- Methods and languages to write rigorous protocol specifications

Papers should be submitted through the submission web site at https://easychair.org/conferences/?conf=spida18. Each accepted paper must be presented by an author, who will have to be registered by the early-bird registration deadline. The workshop will accept regular submissions (at most 10 pages in the IEEE double-column format, including bibliography), as well as short submissions of up to 4 pages for results that are preliminary and/or work in progress. Authors must submit an extended abstract prior to the paper submission.

Important dates:
- Abstract deadline: 8 January 2018
- Paper deadline: 12 January 2018
- Notification: 5 February 2018
- Camera-ready submission: 23 February 2018
- Workshop: 23 April 2018

Organising committee:
- Mathy Vanhoef, KU Leuven, Belgium
- Joeri de Ruiter, Radboud University, The Netherlands

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Intelligent Computing-Based Time Series 2025   Intelligent Computing: Special Issue: Intelligent Computing-Based Time Series Analysis for Cybersecurity
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IDA 2025   Intelligent Data Analysis
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IJCSITY 2024   International Journal of Computational Science and Information Technology
AASDS 2024   Special Issue on Applications and Analysis of Statistics and Data Science
SIGIR 2025   The 48th International ACM SIGIR Conference on Research and Development in Information Retrieval
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience