Technical Tracks

Track 7: Security, Privacy and Trust
Track Co-Chairs:
Ning Zhang, Washington University in St. Louis, USA, zhang.ning@wustl.edu
Isabel Wagner, University of Basel, Switzerland, isabel.wagner@unibas.ch

Description:
The universal network connectivity and the rapid growth of Internet applications (such as broadband mobile networks, Cloud/Edge computing, and Internet of Things) have made our society more and more depending on connected networks and applications. However, how to enforce security, privacy and trust in these systems has become one of the most critical issues we are facing. Although we already have many solutions, new methods and new algorithms are needed for enforcing security and trust, preserving user and system privacy, and encouraging better and stronger practices with strong incentives. The Security, Privacy and Trust track welcomes submissions of original research papers from academic and practitioners which show novel contributions on algorithms, system designs, implementations, and evaluations. We welcome papers in the following areas and other related areas.

Track Topics:
  • Anonymous Communication and Applications
  • Blockchain and Decentralized Trust Management
  • Confidential Computing and Next Frontiers in Security
  • Cloud/Edge Security and Privacy
  • Computer Network Security and Privacy
  • Computer and Network Forensics
  • Cyber Threat Intelligence
  • Cyber-physical System Security
  • Data Security and Multiparty Access Control
  • Intelligent Forensics Tools, Techniques and Procedures
  • Optimization of Utility-Privacy Tradeoffs
  • Security Driven Configuration Management
  • Security, Privacy, and Trust for Artificial Intelligence
  • Security, Privacy, and Trust for Big Data
  • Security, Privacy, and Trust for Cyber-Physical Systems
  • Security, Privacy, and Trust for Networked Control Systems
  • Security, Privacy, and Trust for Resource-Constrained Devices
  • Security, Privacy, and Trust for Software Defined Networking
  • Security, Privacy, and Trust for Wireless Networks
  • Smart Cards and Secure Hardware
  • Penetration Testing and Network Security
  • Private Information Retrieval
  • Privacy-Preserving Data Aggregation
  • Privacy-Preserving Trust Management
  • Trust and Reputation Models
  • Usable Security and Privacy
  • Vulnerability, Exploitation Tools, and Virus/Worm Analysis
TPC List:
  • Mamoun Alazab, Charles Darwin University, Australia
  • Giovanni Apruzzese, University of Liechtenstein, Liechtenstein
  • Long Cheng, Clemson University, USA
  • Jose del Alamo, Universidad Politécnica de Madrid, Madrid, Spain
  • Le Guan, University of Georgia, USA
  • Xiaonan Guo, George Mason University, USA
  • Kai Li, San Diego State University, USA
  • Ming Li, University of Arizona, USA
  • Xinghua Li, Xidian University, China
  • Jerry Chun-Wei Lin, Western Norway University of Applied Sciences, Norway
  • Jian Liu, University of Tennessee Knoxville, USA
  • Shantanu Pal, Deakin University, Australia
  • Frank Pallas, TU Berlin, Germany
  • Jianli Pan, George Mason University, USA
  • Fatemeh Rezaeibagha, Murdoch University, Australia
  • Amin Sakzad, Monash University, Australia
  • Savio Sciancalepore, Eindhoven University of Technology (TU/e), Netherlands
  • Gautam Srivastava, Brandon University, Canada
  • Yuzhe Tang, Syracuse University, USA
  • Sadegh Torabi, Concordia University, USA
  • Guan-Hua Tu, Michigan State University, USA
  • Emmanouil Vasilomanolakis, Aalborg University, Denmark
  • An Wang, Case Western Reserve University, USA
  • Yang Xiao, University of Kentucky, USA
  • Ziming Zhao, University at Buffalo, USA
  • Yuchen Zhao, University of York, United Kingdom