-------- Weitergeleitete Nachricht -------- Betreff: [CALL FOR PAPERS] SPICES 2024 Datum: Sun, 2 Jun 2024 08:17:12 -0400 Von: Martin Andreoni martin@ssrc.tii.ae An: Tci-Announce tci-announce@computer.org
SPICES 2024: Call for Papers and for Reproducibility Studies
------------------------------------------------------------------------------
The 3rd Workshop on Security and Privacy in Connected Embedded Systems (SPICES 2024) -- https://www.tii.ae/workshop/spices https://ssrc-tii-dot-yamm-track.appspot.com/2obTpLV-4uKGPk65S7Ms6m21RrwTbCC70DIR2EZDL_-if2uHYjwGpr41LjwDPDIJAz_O6XMtyYMUCwRyg3i1y51mZKO_bWluXdsdJPLZnbxdMgnH4zUzrktvXotsI3Uzf9fwS9cLM9v0fiTx8OKOO_aicqM8nSF6_wXC6q8GDHHhf-x-2-zPfqCeA6Rc
Co-located with EWSN 2024 -- December 10, 2024
------------------------------------------------------------------------------
Embedded systems have become pervasive in modern society, from managing the power grids that allow you to boil the kettle in the morning to monitoring your sleep patterns at night. They play a crucial role in facilitating communication, enabling access to information, and powering the unseen minutiae of everyday life. Securing these networks and devices is of utmost importance to ensure the safety and privacy of individuals, businesses, and governments.
However, despite significant recent progress recognizing the need for security in such systems, it is often still an afterthought. Furthermore, emerging communication technologies such as 6G, cloud computing, and the inexorable rise of Artificial Intelligence and Machine Learning present new security threats and privacy issues that require innovative solutions. Moreover, unconventional threats and vulnerabilities can circumvent established security and privacy dogmas, exposing key weaknesses in critical systems.
The Workshop on Security and Privacy in Connected Embedded Systems (SPICES) aims to address these challenges and foster interdisciplinary collaboration to explore innovative solutions for securing wireless and embedded systems. The workshop provides a platform for researchers, practitioners, and industry experts to discuss the latest topics and challenges in wireless and embedded systems security and privacy – not only on how existing systems shouldbe secured but also exploring important security aspects (or lack of) in current research trends.We welcome submissions with unusual takes on existing techniques, proposals for novel security and privacy solutions, exposure of atypical weaknesses, and the application of unconventional approaches to solving next-generation wireless security challenges.
We invite researchers and practitioners from academia and industry to submit papers (up to 6 pages, double-column) focusing on topics such as:
- Wireless security for cyber-physical systems (e.g., factory automation).
- AI / Machine Learning assisted security and privacy at the physical, MAC, or networking layers.
- Generative Adversarial Networks for wireless and embedded security.
- Security protocols for wireless communications and networking.
- RF Jamming attacks and defenses for wireless networks.
- Localization and positioning privacy (GPS, UWB, BLE 5.2, etc.).
- Measurement of embedded computing privacy leakage.
- Privacy-enhancing and anonymization techniques in embedded computing.
- Security and privacy techniques in embedded computing.
- Privacy-enhanced data analytics and storage in embedded computing.
- Privacy-preservation methods on context (e.g., location, energy) changes in embedded computing.
- Offensive security and side-channel attacks on IoT devices.
- Security and possible weaknesses in 6G cellular networks (3GPP, ETSI, IEEE, etc.).
- Testbed and experimental platforms for wireless security.
- Vehicular network security (e.g., drones, automotive, avionics, autonomous driving).
- Security for UAV swarms (i.e., distributed, highly mobile systems).
- Communications security in satellite systems.
- Cryptography primitives and lightweight protocols for embedded IoT devices.
- Reconfigurable Intelligent Surfaces (RIS).
- Physical Unclonable Functions (PUFs).
- Internet of the Things (IoT) security and privacy.
- Smart Contracts and Blockchain for wireless communication.
- Multi-factor authentication methods for embedded IoT devices.
- Zero-knowledge and zero-trust techniques in embedded computing.
We especially encourage submissions that aim to broaden the discussion outside of traditional security and privacy challenges and approaches. Examples could include, but are not limited to:
- Bio-inspired security solutions.
- Visual/movement-based security solutions.
- Environment-adaptive security.
- Underwater communications security.
- Visual Light Communication (VLC)-based security.
- Quantum-based security.
Well-reasoned arguments or preliminary evaluations are sufficient for this workshop.
* *
**** Submission Instructions ****
Submitted papers must contain at most six pages (US letter, 9pt font size, double-column format, following the ACM master article template), including all figures, tables, and references. All submissions must be written in English and contain the authors' names, affiliations, and contact information. Submissions may be uploaded through the SPICES workshop track under the EWSN 2024 EasyChair submission site (https://easychair.org/conferences/?conf=ewsn2024 https://ssrc-tii-dot-yamm-track.appspot.com/28ocB7F-UI5ccplRn0Qyw9I9IVPwZQpl2EUqL-Yltw5Si2uHYjwE0JDeJX7_Y7jqS8ln_kElPDdhFU_OqzQwfMSr4xR_7HpXUcrNV9aJVHToTCTkvX5JgAq48dFnPaXwfjlLroEzd-sMq24Wgy5SPX0Nk5NIwF6ZnDGcrOfsndAipelqQbCPt6MHu-nfwqABUC4q8Y8VwoQ).
Accepted papers will be published in ACM as part of the EWSN 2024 proceedings. Authors of accepted papers are expected to present their work in a plenary session as part of the main workshop program.
* *
**** Important Dates ****
Paper submission deadline: June 30, 2024
Notification of acceptance: September 10, 2024
Camera-ready: October 10, 2024
Workshop day: December 10, 2024
* *
**** Workshop Organizers ****
- Martin Andreoni (Technology Innovation Institute, UAE)
- Pericle Perazzo (University of Pisa, Italy)
- Fikret Basic (TU Graz)
beacon ---------------------------------------------------------------------------