{"id":1882,"date":"2015-09-10T08:31:21","date_gmt":"2015-09-10T06:31:21","guid":{"rendered":"http:\/\/sseblog.ec-spride.de\/?p=1882"},"modified":"2015-09-10T08:31:21","modified_gmt":"2015-09-10T06:31:21","slug":"essos-final-call-for-papers","status":"publish","type":"post","link":"https:\/\/blogs.uni-paderborn.de\/sse\/2015\/09\/10\/essos-final-call-for-papers\/","title":{"rendered":"ESSOS final call for papers"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_1882 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_1882')){$('.twoclick_social_bookmarks_post_1882').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blogs.uni-paderborn.de\\\/sse\\\/2015\\\/09\\\/10\\\/essos-final-call-for-papers\\\/\",\"post_id\":1882,\"post_title_referrer_track\":\"ESSOS+final+call+for+papers\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p>ESSOS is accepting submissions of abstracts until\u00a0the 25th and of\u00a0research papers until\u00a0October 2nd. We are happy to announce that\u00a0both David Basin and Karsten Nohl will be presenting as invited speakers! Also, for the first time in the security community, ESSOS this year will offer a voluntary artifact evaluation! Read more in the full CFP below.<\/p>\n<h1><\/h1>\n<p><!--more--><\/p>\n<h1><span style=\"font-weight: 400\">International Symposium on Engineering Secure Software and Systems (ESSoS)<\/span><\/h1>\n<h1><span style=\"font-weight: 400\">April 6 &#8211; 8, 2016, Royal Holloway, London, UK<\/span><\/h1>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">In cooperation with (pending): ACM SIGSAC and SIGSOFT<\/span><\/p>\n<h2><b>Context and motivation<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Trustworthy, secure software is a core ingredient of the modern world. So is the Internet. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. High-quality security building blocks (e.g., cryptographic components) are necessary but insufficient to address these concerns. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software&#8217;s security properties.<\/span><\/p>\n<h2><b>Goal and setup<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The goal of this symposium, which will be the eighth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program including two keynote presentations. In addition to academic papers, the symposium encourages submission of high-quality, informative industrial experience papers about successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Topics<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to):<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">&#8211; Cloud security, virtualization for security<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Mobile devices security<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Automated techniques for vulnerability discovery and analysis<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Model checking for security<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Binary code analysis, reverse-engineering<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Programming paradigms, models, and domain-specific languages for security<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Operating system security<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Verification techniques for security properties<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Malware: detection, analysis, mitigation<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Security in critical infrastructures<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Security by design<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Static and dynamic code analysis for security<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Web applications security<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Program rewriting techniques for security<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Security measurements<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Empirical secure software engineering<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Security-oriented software reconfiguration and evolution<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Computer forensics<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Processes for the development of secure software and systems<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Security testing<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8211; Embedded software security<\/span><\/p>\n<h2><b>Important dates<\/b><\/h2>\n<h3><b>Abstract submission: September 25, 2015 (anywhere on earth)<\/b><\/h3>\n<h3><b>Paper submission: October 2, 2015 (anywhere on earth)<\/b><\/h3>\n<h3><b>Paper notification: December 7, 2015<\/b><\/h3>\n<h3><b>Artifact evaluation submission: December, 16, 2015<\/b><\/h3>\n<h3><b>Artifact evaluation notification: January, 6, 2016<\/b><\/h3>\n<h3><b>Paper camera-ready: January 8, 2016<\/b><\/h3>\n<h2><b>Submission and format<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The proceedings of the symposium are published by Springer-Verlag in the Lecture Notes in Computer Science Series (http:\/\/www.springer.com\/lncs). Submissions should follow the formatting instructions of Springer LNCS. Submitted papers must present original, unpublished work of high quality.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Two types of papers will be accepted:<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Full papers (max 14 pages without bibliography\/appendices)<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Such papers may describe original technical research with a solid foundation, such as formal analysis or experimental results, with acceptance determined mostly based on novelty and validation. Or they may describe case studies applying existing techniques or analysis methods in industrial settings, with acceptance determined mostly by the general applicability of techniques and the completeness of the technical presentation details.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Idea papers (max 8 pages with bibliography)<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Such papers may crisply describe a novel idea that is both feasible and interesting, where the idea may range from a variant of an existing technique all the way to a vision for the future of security technology. Idea papers allow authors to introduce ideas to the field and get feedback, while allowing for later publication of complete, fully-developed results. Submissions will be judged primarily on novelty, excitement, and exposition, but feasibility is required, and acceptance will be unlikely without some basic, principled validation (e.g., extrapolation from limited experiments or simple formal analysis). In the proceedings, idea papers will clearly identified by means of the &#8220;Idea&#8221; tag in the title.<\/span><\/p>\n<h2><b>Artifact evaluation<\/b><\/h2>\n<p><span style=\"font-weight: 400\">For possibly the first time at a security conference, ESSOS\u201916 will offer a voluntary artifact evaluation. Artifact evaluation is meant to encourage the submission and publication of proven, reusable research artifacts. Authors of <\/span><b>accepted<\/b> <b>papers<\/b><span style=\"font-weight: 400\"> will be able to apply their artifacts (software, datasets, etc.) to be examined by the Artifact Evaluation Committee (AEC). Artifacts will be submitted after paper notification. If all artifacts perform to the satisfaction of the committee, in particular if they allow for the paper\u2019s results to be reproduced, then the paper will be recognized with the Artifact Evaluation Award and the authors will enjoy the following benefits:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Authors will be able to mention the award on the paper\u2019s front page, in the form of a virtual award plaque.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Awarded artifacts will be recognized on the conference web page.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Authors can use one additional page in the proceedings, which can be used to describe their artifacts.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Authors will be able to briefly present their awarded artifacts in a dedicated artifact session (in addition to their usual paper presentation).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Artifact evaluation submissions will be mainly evaluated based on two criteria: (1) Artifact packaging and reproducibility. (2) Artifact implementation and usability.<\/span><\/p>\n<p><span style=\"font-weight: 400\">More information is available on the ESSOS web page. More information about previous artifact evaluations can be found at: <\/span><a href=\"http:\/\/www.artifact-eval.org\/\"><span style=\"font-weight: 400\">http:\/\/www.artifact-eval.org\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Important dates:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Artifact evaluation submission: December 16, 2015<\/span><\/p>\n<p><span style=\"font-weight: 400\">Artifact evaluation notification: January 6, 2016<\/span><\/p>\n<h2><b>Confirmed invited speakers<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Apart from technical presentations, the following invited speakers have confirmed their participation in ESSOS:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">David Basin, ETH Z\u00fcrich<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Karsten Nohl, Security Research Labs<\/span><span style=\"font-weight: 400\">\n<p><\/span><\/li>\n<\/ul>\n<h2><b>Steering committee<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Jorge Cuellar (Siemens AG)<\/span><\/p>\n<p><span style=\"font-weight: 400\">Wouter Joosen (Katholieke Universiteit Leuven) &#8211; chair<\/span><\/p>\n<p><span style=\"font-weight: 400\">Fabio Massacci (Universit\u00e0 di Trento)<\/span><\/p>\n<p><span style=\"font-weight: 400\">Gary McGraw (Cigital)<\/span><\/p>\n<p><span style=\"font-weight: 400\">Bashar Nuseibeh (The Open University)<\/span><\/p>\n<p><span style=\"font-weight: 400\">Daniel Wallach (Rice University)<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Organizing committee<\/b><\/h2>\n<p><span style=\"font-weight: 400\">General chair: Lorenzo Cavallaro (Royal Holloway University of London)<\/span><\/p>\n<p><span style=\"font-weight: 400\">Program co-chairs: Eric Bodden (Fraunhofer SIT &amp; TU Darmstadt), Juan Caballero (IMDEA Software Institute)<\/span><\/p>\n<p><span style=\"font-weight: 400\">Artifact evaluation co-chairs: Alessandra Gorla (IMDEA Madrid), Jacques Klein (SnT Luxembourg)<\/span><\/p>\n<p><span style=\"font-weight: 400\">Publication chair: Elias Athanasopoulos (FORTH)<\/span><\/p>\n<p><span style=\"font-weight: 400\">Publicity chair: Raoul Strackx (KU Leuven)<\/span><\/p>\n<p><span style=\"font-weight: 400\">Web chair: Ghita Saevels (Katholieke Universiteit Leuven)<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Program committee<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Javier Alonso, Universidad de Leon &amp; Duke University<\/span><\/p>\n<p><span style=\"font-weight: 400\">Michele Bugliesi, Universit\u00e0 Ca&#8217; Foscari Venezia<\/span><\/p>\n<p><span style=\"font-weight: 400\">Werner Dietl, University of Waterloo<\/span><\/p>\n<p><span style=\"font-weight: 400\">Michael Franz, University of California, Irvine<\/span><\/p>\n<p><span style=\"font-weight: 400\">Flavio Garcia, University of Birmingham<\/span><\/p>\n<p><span style=\"font-weight: 400\">Christian Hammer, CISPA, Saarland University<\/span><\/p>\n<p><span style=\"font-weight: 400\">Marieke Huisman, University of Twente<\/span><\/p>\n<p><span style=\"font-weight: 400\">Martin Johns, SAP Research<\/span><\/p>\n<p><span style=\"font-weight: 400\">Stefan Katzenbeisser, Technische Universit\u00e4t Darmstadt<\/span><\/p>\n<p><span style=\"font-weight: 400\">Johannes Kinder, Royal Holloway University of London<\/span><\/p>\n<p><span style=\"font-weight: 400\">Andy King, University of Kent<\/span><\/p>\n<p><span style=\"font-weight: 400\">Jacques Klein, University of Luxembourg<\/span><\/p>\n<p><span style=\"font-weight: 400\">Andrea Lanzi, University of Milan<\/span><\/p>\n<p><span style=\"font-weight: 400\">Wenke Lee, Georgia Institute of Technology<\/span><\/p>\n<p><span style=\"font-weight: 400\">Zhenkai Liang, National University of Singapore<\/span><\/p>\n<p><span style=\"font-weight: 400\">Ben Livshits, Microsoft Research<\/span><\/p>\n<p><span style=\"font-weight: 400\">Heiko Mantel, Technische Universit\u00e4t Darmstadt<\/span><\/p>\n<p><span style=\"font-weight: 400\">Nick Nikiforakis, Stony Brook University<\/span><\/p>\n<p><span style=\"font-weight: 400\">Martin Ochoa, Singapore University of Technology and Design<\/span><\/p>\n<p><span style=\"font-weight: 400\">Mathias Payer, Purdue University<\/span><\/p>\n<p><span style=\"font-weight: 400\">Frank Piessens, KU Leuven<\/span><\/p>\n<p><span style=\"font-weight: 400\">Alexander Pretschner, Technische Universit\u00e4t M\u00fcnchen<\/span><\/p>\n<p><span style=\"font-weight: 400\">Awais Rashid, Lancaster University<\/span><\/p>\n<p><span style=\"font-weight: 400\">Mark Ryan, University of Birmingham<\/span><\/p>\n<p><span style=\"font-weight: 400\">Gianluca Stringhini, University College London<\/span><\/p>\n<p><span style=\"font-weight: 400\">Pierre-Yves Strub, IMDEA Software Institute<\/span><\/p>\n<p><span style=\"font-weight: 400\">Helmut Veith, Vienna University of Technology<\/span><\/p>\n<p><span style=\"font-weight: 400\">Santiago Zanella, Microsoft Research &#8211; INRIA<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ESSOS is accepting submissions of abstracts until\u00a0the 25th and of\u00a0research papers until\u00a0October 2nd. We are happy to announce that\u00a0both David Basin and Karsten Nohl will be presenting as invited speakers! Also, for the first time in the security community, ESSOS &hellip; <a href=\"https:\/\/blogs.uni-paderborn.de\/sse\/2015\/09\/10\/essos-final-call-for-papers\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6542,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1882","post","type-post","status-publish","format-standard","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts\/1882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/users\/6542"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/comments?post=1882"}],"version-history":[{"count":0,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts\/1882\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/media?parent=1882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/categories?post=1882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/tags?post=1882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}