DSC 2017: 2017 IEEE Conference on Dependable and Secure Computing Taipei, Taiwan, August 7-10, 2017 |
Conference website | http://dsc17.cs.nctu.edu.tw/ |
Submission link | https://easychair.org/conferences/?conf=dsc20170 |
Abstract registration deadline | March 25, 2017 |
Submission deadline | March 31, 2017 |
Acceptance Notification | May 10, 2017 |
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems. The scope of DSC includes, but is not limited to, the following topics.
Conference website: http://dsc17.cs.nctu.edu.tw/
Submission Guidelines
IEEE DSC 2017 uses EasyChair for the online paper submission. Please prepare your paper according to the instructions provided on the conference website (Manuscript Format section).
List of Topics
Track #1: Computer Systems, Networks, and Software
- Advanced Persistent Threat (APT)
- Big Data Analysis
- Botnet and Intrusion Detection
- Cryptographic Methods and Toolkits
- Cyber attacks
- Data/Information Reliability
- Database Security and Privacy
- Embedded Systems and IoT Devices
- Experimentation, Measurement, and Assessment
- Mobile and Cloud Computing
- SDN and NFV
Track #2: System Electronics, VLSI, and CAD
- CAD Algorithms and Tools
- Electronic Circuits and Systems
- Fault-Tolerant Architectures and Designs
- Industrial Design Experiences
- Noise-Aware Designs
- Power-Aware Designs
- Soft-Error Analysis and Models
- Stochastic Circuits and Systems
- Temperature-Aware Designs
- Variable-Latency Designs
- Security Circuits, Designs and Detection
Track #3: Experience and Practice
- Attacks on Information Systems and Digital Storage
- CSIRTs, Incident Analysis and Response
- Hacking Techniques and Countermeasures
- Honeypots/Honeynets
- Malware Analysis and Reversing
- Mobile Communications Security and Vulnerabilities
- Newly discovered vulnerabilities
- Offensive Information Technology
- Reverse Engineering, Forensics, and Anti-Forensics
- Spyware, Phishing and Distributed Attacks
- VLSI/CAD Design Knowhow
Committees
Program Committee
- Doug Tygar (University of California, Berkeley, USA)
- Chun-Ying Huang (National Chiao Tung University, Taiwan)
- Bevan Baas (University of California, Davis, USA)
- Terngyin Hsu (National Chiao Tung University, Taiwan)
- Tzi-Cker Chiueh (Industrial Technology Research Institute, Taiwan)
- Fu-Hau Hsu (National Central University, Taiwan)
Steering committee
- Shiuhpyng Winston Shieh (National Chiao Tung University, Taiwan)
- Doug Tygar (University of California, Berkeley, USA)
- David Basin (ETH Zurich, Switzerland)
- Robert Deng (SMU, Singapore)
- Jerry Shyh-Jye Jou (National Chiao Tung University, Taiwan)
- Chen-Yi Lee (National Chiao Tung University, Taiwan)
Contact
All questions about submissions should be emailed to the corresponding track co-chairs:
Chun-Ying Huang <chuang@cs.nctu.edu.tw>
Terngyin Hsu <tyhsu@cs.nctu.edu.tw>
Fu-Hau Hsu <hsufh@csie.ncu.edu.tw>