The 23rd International Conference on Reliable Software Technologies – Ada-Europe 2018 will take place in Lisbon, Portugal. As per its traditional style, the conference will span a full week, including, from Tuesday to Thursday, three days of parallel scientific, technical and industrial programs, along with tutorials and workshops on Monday and Friday.
The conference will provide an international forum for researchers, developers and users of reliable software technologies all over the world. Presentations and discussions cover applied and theoretical work currently conducted to support, the development and maintenance of reliable software systems.
The 1st International Conference on Science of Cyber Security (SciSec 2018) will be held August 12-14, 2018 in Beijing, China. The conference is organized by the Institute of Information Engineering, Chinese Academy of Sciences. This new forum aims to catalyze the research collaborations between the relevant communities and disciplines that can work together to deepen our understanding of, and build a firm foundation for, the emerging Science of Cyber Security. Publications in this venue would distinguish themselves from others by taking or thinking from a holistic perspective about cyber security, rather than the building-block perspective. Each submission will be reviewed (double blind) by at least 3 reviewers. The program committee plans to select and award a Best Paper and a Best Student Paper. The post-conference proceedings will be published in Springer’s Lecture Notes in Computer Science (LNCS) series.
The first ever HITB Security Conference in Beijing, featuring 3-days of hands on technical training sessions, a 2-day triple track conference and a 2-day Capture the Flag competition, technology exhibition with hackerspaces, Artificial Intelligence and hardware related exhibits plus a free-to-attend track of 30 and 60 minute talks! The first round of speakers will be announced in January. For the latest event updates and news, please follow @HITBSecConf on Twitter.
The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of challenges related to the security of the operation of such systems, as well as of the information stored in them.
Malicious adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviours, or can exploit side channel information leakage to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or countered. The prevalence of multi/many core systems opens additional issues such as NoC security. Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems.
The workshop is a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems.
Cybersecurity and cybersecurity policy means different things to different disciplines. It can involve the exploration of algorithms and technologies to secure systems, the study of how users interact with computers in order to provide stronger methods of privacy protection, the examination of digital approaches to development, how to control—through laws and technology—the growing surveillance society, analyzing the impact of the “borderless” world of the Internet has on sovereignty, studying how changing communications technologies impact law (and how law impacts changing communications technologies), analyzing the impact of artificial intelligence and machine learning on the economy – and more.
Zer0Con is POC’s NEW ‘CLOSED’ international security conference. It focuses on finding, analyzing, and exploiting vulnerabilities. Zer0Con aims to have high-level technical presentations.
? It is a high-level and closed conference.
? It only focuses on finding, analyzing, exploiting vulnerabilities.
? Only speakers, attendees, and sponsors will share vulnerabilities information.
? Zer0Con attendees can share various information and establish unique community.
? Training courses also focus on finding, analyzing, exploiting vulnerabilities.
? If you have certain level of ability to find bugs and make exploit code, you will improve yourself through Zer0Con.
The SEC conferences are a series of well-established international conferences on Security and Privacy. SEC is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 (TC-11).
The IFIP SEC conferences aim to bring together primarily researchers, but also practitioners from academia, industry and governmental institutions to elaborate and discuss IT Security and Privacy Challenges that we are facing today and will be facing in the future.