Workshop on Security practices for Internet of ThingsSPIoT 2019
The workshop on Security Practices for Internet of Things addresses the security issues of IoT devices from the formal and practical viewpoint. IoT devices are creeping into everyday life by promising wondrous features. However, a malicious attacker can easily exploit these devices to build botnets, lock them with ransomware, or use them as a bridgehead into less accessible networks. The objective of the SPIoT workshop is to bring together security practitioners, security-aware IoT users and formal analysis experts with the aim of sharing practices and finding guarantees about the trustworthiness of IoT devices and their use. Relevant case studies come from settings where a security flaw implies serious damage, such as in industry, safety-critical systems and healthcare.
Accepted Papers
Call for Papers
The main aim of the workshop is to stimulate collaboration among the participants from the security and formal methods communities. For this reason, the submissions are in the form of abstracts, and may include both published and ongoing work. We accept submissions up to two pages in the LLNCS format, which are handled via EasyChair (see Submission Link). No formal publication nor post-proceedings will be produced, however a pre-proceeding printed version of the abstracts will be made available to the workshop participants.
After the workshop, we will open a call for full papers. Selected contributions will be published in a Special Section of the LNCS “Transactions on Foundations for Mastering Change (FoMaC)” series.
Sun 7 Apr Times are displayed in time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
11:00 - 11:30 | Invited Talk: Expected Cost Analysis of Attack-Defence Trees SPIoT Jan KretinskyTechnical University of Munich | ||
11:30 - 12:00 Talk | Static Analysis for the OWASP IoT Top 10 2018. SPIoT Pietro FerraraJuliaSoft SRL, Italy, Amit Kr MandalUniversità Ca' Foscari, Venezia, Italy, Agostino CortesiUniversità Ca' Foscari Venezia, Fausto SpotoU. Verona | ||
12:00 - 12:30 Talk | The Refinement-Risk Loop - A Process for Security Engineering in Isabelle SPIoT Florian KammüllerMiddlesex University, UK |
14:00 - 14:30 Talk | ADTLang: A Programming Language Approach to Attack Defense Trees SPIoT René Rydhof HansenAalborg University, Denmark, Peter Gjøl JensenAalborg University, Denmark, Kim LarsenAalborg University, Axel LegayINRIA Rennes, Danny Bøgsted PoulsenUniversity of Kiel, Germany | ||
14:30 - 15:00 Talk | Learning from attacks and failures: generating reliability models from data SPIoT Marielle StoelingaUniversity of Twente and Radboud University, Nijmegen | ||
15:00 - 15:30 Talk | Graph-based Technique for Survivability Estimation and Optimization of IoT Applications SPIoT |