TrustAICyberSec 2024
International Workshop on
Trusted Computing and Artificial Intelligence applied to Cybersecurity
Call for papers
Different applications running on various platforms and interconnected systems (including identity management, time distribution networks, or supply chains) must face increasingly complex cyberattacks and security incidents that are hard to detect, as they exploit both technical and non-technical aspects. For instance, most of the network traffic nowadays is encrypted, and thus difficult to analyze with content-based tools. At the same time, many attacks target (first) the end nodes, especially less-protected client devices, or systems with limited resources, like embedded systems, or Internet of Things (IoT) and subsequently move (based on the permissions acquired) to more critical systems. Moreover, since the networks offer some protections through widely used security protocols, such as the Transport Layer Security (TLS) protocol, dedicated attacks often address weaknesses in the implementation or installation of these protocols (on the server side), or exploit data after it has been received and cryptographically processed, i.e., while in use on the device. Last but not least, the human factor is fundamental in conducting or defending from many types of cyberattacks. Errors (accidental or intentional) could occur in the set-up, installation, configuration, deployment, and management of applications. The trusted computing and remote attestation techniques can be employed to create a solid ground for trusted execution environments for critical applications in different types of devices. On the other hand, Artificial Intelligence (AI) models may be applied for detecting network-based security attacks or malware based on measured parameters.
The TrustAICyberSec 2024 workshop strives to gather contributions from researchers in network security including cloud and IoT security, security for embedded systems, trusted and confidential computing, and artificial intelligence areas, both academia and industry, working both on research and practical solutions for software and hardware security, or applications of trusted computing. Moreover, it aims to provide a forum for discussing the latest research trends regarding trusted computing, trusted environments for IoT devices, incident management, remote attestation, security for SDN (software-defined networking) & NFV (network functions virtualization), and cybersecurity attack detection. The objective is to acquire knowledge on the recent applications of trusted computing and machine learning for cybersecurity, provide recommendations for risk assessment, and ideas to develop innovative solutions for efficient defenses that are highly required by incident management and response teams or companies' security operation centers.
We invite innovative and high-quality submissions focusing on, but not restricted to, any combination of the following areas:
Trusted computing, confidential computing
Remote attestation techniques
Trusted execution environments
Internet of Things (IoT) security
Machine learning applied to intrusion detection
Intrusion detection and prevention systems
Tools for analysis of security protocols
Machine learning for malware classification and detection
Software and hardware security
Cybersecurity incident management and response
Standards, guidelines, and certification
Methods and countermeasures for advanced cybersecurity attacks
Security vulnerability processing and risk assessment methodologies
Behaviour-based security
Social engineering attacks
Submission Guidelines
Workshop manuscripts should describe original work and should be no more than 6 pages in the IEEE double-column proceedings format, including tables, figures, and references. To download manuscript templates for IEEE conference proceedings use the following link: https://www.ieee.org/conferences/publishing/templates.html.
Papers can be submitted directly to EDAS: https://edas.info/newPaper.php?c=32315
Note that accepted papers up to 6 pages will be published with no additional charge. Exceeding pages will be charged an additional fee. Papers longer than 8 pages will not be accepted. At least one author of each accepted paper is required to register to the conference and present the paper. Only registered and presented papers will be published in the conference proceedings. Accepted papers will be included in the ISCC 2024 proceedings and will be submitted for inclusion to IEEE Xplore. The ISCC proceedings have been indexed in the past by ISI, DBLP and Scopus. This makes the ISCC conference one of the publication venues with very high visibility and impact in both Computer and Communications areas. Other information about submission instructions for IEEE ISCC 2024 can be found here.
Committees
General Chair(s)
Diana Gratiela Berbecaru, Politecnico di Torino, Italy
Silvia Sisinni, Politecnico di Torino, Italy
Technical Program Committee
Mishaal Ahmed, Scuola Universitaria Superiore Sant'Anna di Pisa, Italy
Cataldo Basile, Politecnico di Torino, Italy
Alessandro Brighente, University of Padova, Italy
Samira Briongos, NEC Laboratories Europe, Germany
Alejandro Cabrera Aldaya, Tampere University, Finland
Alberto Carelli, LINKS Foundation, Italy
Maxime Compastié, Fondació i2CAT, Spain
Alessandra De Benedictis, Universitá Federico II di Napoli, Italy
Fabio De Gasperi, Universitá di Roma SAPIENZA, Italy
Edlira Dushku, Aalborg University, Denmark
Alessandra Rizzardi, University of Insubria, Italy
Annachiara Ruospo, Politecnico di Torino, Italy
Juan Pablo Saenz Moreno, Politecnico di Torino, Italy
Alessio Sacco, Politecnico di Torino, Italy
Simone Soderi, IMT School for Advanced Studies Lucca, Italy
Contact
Diana Gratiela Berbecaru
diana.berbecaru@polito.it
Silvia Sisinni
silvia.sisinni@polito.it