3rd International Workshop on IoT Privacy, Trust, and Security (IoTPTS 2017)

April 2, Abu Dhabi, UAE

Held in conjunction with the 12th ACM Symposium on Information, Computer and Communications Security (ASIACCS'17



Call for Papers

The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and now is the time to ensure privacy, trust, and security are designed into these systems from the beginning.

We encourage submissions on all aspects of IoT privacy, trust, and security.

Topics of interest include (but are not limited) to the following areas:

  • Privacy and IoT data
  • Privacy attacks for IoT
  • Trust management and device discoverability for IoT
  • Usability of privacy and security systems in IoT
  • User risk perceptions and modeling for IoT
  • Policy Management and enforcement for IoT
  • Authentication and access control for users for IoT
  • Cryptography for IoT
  • Attack detection and remediation for IoT
  • Security architectures for IoT systems and applications

Important Dates


Submissions due:  Jan 20, 2017  (Extended  to Jan 27, 2017)
Author notification: 
Feb 15, 2017 
Camera-ready due: 
Feb 25, 2017
Workshop date: 
April 2, 2017

Submission

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Regular submissions must be written in English with at most 8 pages including the bibliography and appendices. Position papers or short papers describing preliminary work of at most 4 pages are also welcome. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of the paper must be registered at the appropriate conference rate. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM Digital Library.


Organizers


Program Chairs
Richard Chow, Intel
Gokay Saldamli, SJSU

Local and Publicity Chair
Christina Poepper (NYU Abu Dhabi)

PC Members
Onur Aciicmez, Yahoo!
Bogdan Carbunar, Florida International University
Alvaro Cardenas, UT Dallas
Sherman Chow, Chinese University of Hong Kong
Mihai Christodorescu, Qualcomm
Mauro Conti, University of Padua
José M. Del Álamo, Universidad Politécnica de Madrid
Markus Duermuth, Ruhr-University Bochum
Levent Ertaul, CSU East Bay
Jason Hong, Carnegie Mellon University
Yong Ho Hwang, Samsung Electronics
Markus Jakobsson, Agari
Bart Knijnenburg, Clemson University
Alfred Kobsa, UC Irvine
Kang Li, University of Georgia
Daisuke Mashima, Advanced Digital Sciences Center
Markus Miettinen, TU Darmstadt
Prashanth Mohan, Google Inc.
Christina Poepper, NYU Abu Dhabi
Pankaj Rohatgi, Cryptography Research
Ned Smith, Intel
Jessica Staddon, North Carolina State University
Selcuk Uluagac, Florida International University
Ihor Vasyltsov, Samsung
Cong Wang, City University of Hong Kong
Cong Zheng, Palo Alto Networks

Keynote


Blockchain Engineering for the Internet of Things: Systems Security Perspective

Davor Svetinovic (Masdar Institute of Science and Technology, Abu Dhabi) 


Accepted Papers


Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things,
 Vinay Sachidananda, Shachar Siboni, Asaf Shabtai, Jing Hui Toh and Yuval Elovici
 
Secure Data Provenance for the Internet of Things,      
Muhammad N. Aman, Kee Chaing Chua, and Biplab Sikdar
 
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-QuantumCryptography,   
Markku-Juhani Olavi Saarinen

IoTScanner: Detecting Privacy Threats in IoT Neighborhoods, 
Sandra Siby, Rajib Ranjan Maiti and Nils Ole Tippenhauer 

Intrusion Detection in the RPL-connected 6LoWPAN Networks, 
Dharmini Shreenivas, Shahid Raza and Thiemo Voigt

Contact


E-mail: iotpts2017@easychair.org