[PET] Call for participation - 1st IEEE Workshop on Security and Privacy in Cybermatics (SPiCy 2015)

Ruggero Donida Labati ruggero.donida at unimi.it
Fri Sep 18 14:35:20 BST 2015


CALL FOR PARTICIPATION

**********************************************************************
1st IEEE Workshop on Security and Privacy in Cybermatics (SPiCy 2015)
Florence, Italy - September 30, 2015
http://spicy2015.di.unimi.it
**********************************************************************


** Special discount for combined registration (conference+workshop) **


ABOUT THE WORKSHOP

In the modern age Cybermatics is differentiating itself by designing the
physical and social places into the cyber space to accomplish the union
of three spaces: (i) Physical Cyberworld, (ii) Social Cyberworld, and
(iii) Thinking Cyberworld. In the cyber space, everywhere cyber-nodes
are significantly independent from the space-time limitations that
exist in the physical space. Along with the development of intelligent
systems, Cybermatics has brought a wide area of open issues during the
cyber interaction, physical perception, social correlation, and
cognitive thinking. Currently, Cybermatics is still in its initial stage,
and it is expected that Cybermatics will lead industrialization and IT
applications to a new level and will significantly change the way of
producing, living, and even thinking of the mankind. Cybermatics will
transform how we interact with and control the physical world around us,
just in the same way as the Internet transformed how we interact and
communicate with one another and revolutionized how and where we access
information.

Cyber-physical systems are subject to threats stemming from increasing
dependence on computer and communication technologies. Cyber security
threats exploit the increased complexity and connectivity of critical
infrastructure systems, placing the Nation's security, economy, public
safety, and health at risk. This workshop aims to represent an
opportunity for cyber security researchers, practitioners, policy makers,
and users to exchange ideas, research findings, techniques and tools,
raise awareness, and share experiences related to all practical and
theoretical aspects of Cybermatics security issues.

IEEE SPiCy 2015 will be held in Florence, Italy, on September 30, 2015
in conjunction with the IEEE Conference on Communications and
Network Security (CNS 2015).

The workshop will be a 1-day event, featuring one keynote talk
(Wenjing Lou, Virginia Tech, USA) and SPiCy technical program (9 papers).


REGISTRATION
Registration information is available at:
http://cns2015.ieee-cns.org/registration


Special discount for combined registration (conference + workshop).


HOTEL AND VENUE
Information on the workshop venue is available at:
http://cns2015.ieee-cns.org/travel


PROGRAM

08:45 - 08:55: Opening Remarks

08:55 - 09:55: KEYNOTE TALK
- Cognitive Security: A New Approach to Securing Wireless Networks and 
Mobile
   Applications
   (Wenjing Lou)

09:55 - 10:45: SESSION 1
                (chair: Mauro Conti)

- Internet-facing PLCs as a Network Backdoor
   (Johannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow,
    Volker Roth)

- A Random Access Procedure Based on Tunable Puzzles)
   (Mats Naslund, Elena Dubrova, Göran Selander, Fredrik Lindqvist)

10:45 - 11:15: Coffee Break

11:15 - 12:55: SESSION 2
                (chair: Gaetano Giunta)

- Study on Impact of Adding Security in a 6LoWPAN Based Network
   (Matthias Carlier, Ruben Smeets, Kris Steenhaut, An Braeken,
    Nele Mentens, Kris Aerts)

- Some Dangers from 2G Networks Legacy Support and a Possible Mitigation
   (Yoan Miche, Silke Holtmanns, Dare Abodunrin)

- Security Enhancements for Building Saturation-free, Low-Power
   NoC-based MPSoCs
   (Kyprianos Papadimitriou, Polydoros Petrakis, Miltos Grammatikakis,
    Marcello Coppola)

- CaT: Evaluating Cloud-aided TLS for Smartphone Energy Efficiency
   (Kanishka Ariyapala, Mauro Conti, Cristina M. Pinotti)

12:55 - 14:00: Lunch

14:00 - 16:00: SESSION 3

- A Novel Method for Securing Critical Infrastructures by Detecting
   Hidden Flows of Data
   (Francesco Benedetto, Gaetano Giunta, Angelo Liguori, Arno Wacker)

- Verifiable and Privacy-preserving Fine-Grained Data-Collection for
   Smart Metering
   (Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti,
    Radha Poovendran)

- A Dynamic Algorithm for Palmprint Recognition
   (David Palma, Pier Luca Montessoro, Giulia Giordano, Franco Blanchini)

- Brain-Computer Interface Applications: Security and Privacy Challenges
   (QianQian Li, Ding Ding, Mauro Conti)

- Analysis and Monitoring of Hidden TCP Traffic Based on an Open-source
   Covert Timing Channel
   (Angelo Liguori, Francesco Benedetto, Gaetano Giunta, Arno Wacker,
    Nils Kopal)

16:00 - 16:30: Coffee Break


MORE INFORMATION
Additional information about the workshop can be found at:
http://spicy2015.di.unimi.it


---
Questa e-mail è stata controllata per individuare virus con Avast antivirus.
https://www.avast.com/antivirus


****************
Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi il codice fiscale 80012650158.

http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille



More information about the PET mailing list