The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. Papers without a clear application to security, however, will be considered out of scope and may be rejected without full review. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection.
SSCC’23 Main track |
- Adversarial Learning
- AI-Driven Cyber Security Analytics
- Anti-Forensics Techniques
- Application Security
- Authentication and Access Control Systems
- Critical Infrastructure Protection
- Cyber Vulnerability Prioritization and Remediation
- Cyber Warfare Trends and Approaches
- Denial-of-Service Attacks and Countermeasures
- Differential Privacy
- Digital Forensics
- Digital Rights Management
- Distributed and Pervasive Systems Security
- Embedded Systems Security
- Enterprise Systems Security
- Executable Content and Content Filtering
- File and Files System Security
- Fraud Management
- Game Theoretical Cybersecurity Models
- Hardware Security
- Human-Computer Interaction and Security
- Identity Management
- Intellectual Property Protection
- Interpretable and Robust Autonomous Cyber-Systems
- Key Distribution and Management
- Mobile System Security
- Multimedia and Document Security
- Network Infrastructure Security
- Operating Systems and Database Security
- Peer-to-Peer Security
- Red Team Evaluation of Cyber Défense Systems
- Secure Communications and Information Flow
- Secure Sensor Networks
- Security in e-services
- Security of Web-Based Applications
- Surveillance Systems
|
- Accountability
- Analysis of Network and Security Protocols
- Anonymity
- Authorship Analysis
- Biometrics Standards and Standardization
- Border Security
- Business Continuity & Disaster Recovery Planning
- Crowd Management
- Deep Learning/Deep RL for Cybersecurity
- Economics of Security
- Emergency Response and Management
- Encryption and Cryptography
- Forecasting Terrorism
- Incident Handling and Penetration Testing
- Information Hiding
- Intrusion and Anomaly Detection and Prevention
- Investigation of Insider Attacks
- Language-Based Security
- Laws and Regulations/Legal Issues
- Malware Forensics and Anti-Malware Techniques
- New Threats and Non-Traditional Approaches
- Protocol Security
- Representation Learning for Cybersecurity
- Robust Statistics
- Secure Software Development
- Security Architectures
- Security Education and Training
- Security Metrics
- Security of Deep Learning Systems
- Security Policies and Trust Management
- Self-Protecting and Self-Healing Systems
- Social Engineering
- Social Network Analysis
- Template Protection and Liveliness Detection
- Theories, Methods, and Tools in Managing Security
- Threats, Vulnerabilities, and Risk Management
|
Special Session 1: Cloud Security |
- 5G/6G Network Security
- Access Control in Clouds
- Binary Analysis of Software for Remote Attestation and Cloud Protection
- Business and Security Risk Models and Clouds
- Cloud Forensics
- Cloud Security Auditing
- Cloud-Aware Web Service Security Paradigms and Mechanisms
- Container Security
- Cryptographic Protocols for Cloud Security
- Data Protection in Clouds
- Foundations of Cloud-Centric Threat Models
- Machine Learning for Cloud Protection
- Network Security Mechanisms for Cloud Contexts
- Privacy-Enhanced Technologies for Clouds
- Remote Attestation Mechanisms in Clouds
- Risk Analysis for Clouds
|
- Sandboxing and VM-Based Enforcements
- Scalability of Security in Global-Size Clouds
- SDN/NFV Security
- Secure Cloud Resource Virtualization Mechanisms
- Secure Computation Outsourcing
- Secure Data Management Outsourcing (E.G., Database as A Service)
- Secure Identity Management Mechanisms
- Security and Privacy of Big Data
- Security and Privacy of Federated Clouds and Edge Computing
- Security and Privacy of Fog Computing
- Security of Microservices
- Side-Channel Attacks
- Trust and Policy Management in Clouds
- Virtual Network Security
- Cloud-Centric Regulatory Compliance Issues and Mechanisms
- Security for Emerging Cloud Programming Models
|
Special Session 2: Internet of Things Security and Privacy |
- Adaptive Security in IoT
- Attack Strategies for IoT
- Authentication and Access Control in IoT
- Cyber Attacks Detection and Prevention
- Cyber-Physical Systems Security
- Data Analysis and Visualization for IoT
- Ethics and Legal Considerations in IoT
- Identification and Biometrics in IoT
- Identity Management in IoT
- Intrusion and Malware Detection
- Liability and Policy Enforcement in IoT
- Methods for IoT Security Analysis and Audit
- Privacy and Anonymization Techniques in IoT
|
- Reliable Interactions with Network Services
- Scalability and Robustness for Internet of Things
- Secure Cloud of Things
- Secure Mobile Applications
- Secure Mobility Management
- Secure Operating Systems
- Security Architectures
- Security in Wireless Sensor Networks
- Security of Big Data in IoT
- Security, Privacy, and Trust in IoT
- System and Data Integrity
- Threat Models in IoT
- Trust Management Architectures
- Trustworthiness in IoT
|
Special Session 3: Big Data Security and Privacy |
- Access Control of Big Data
- Anonymous Communication in Big Data
- Application Level Security and Privacy in Big Data
- Attacks and Counter Measures in Big Data
- Big Data Forensics
- Big Data Privacy Policies and Standards
- Biometric Security and Forensics in Big Data
- Cryptography and Big Data
- Data Protection, Integrity Standards, and Policies
- Encrypted Information Retrieval in Big Data
- Identity Management and Key Management in Big Data
|
- Managing User Access for Big Data
- Network Security, Privacy in Big Data
- Physical Layer Security in Big Data
- Reliability and Availability in Big Data
- Scalability and Auditing For Big Data
- Secure Cross-Layer Design in Big Data
- Secure Quantum Communications
- Security and Legislative Impacts on Big Data
- Storage and System Security for Big Data
- Threat and Vulnerability Analysis in Big Data
- Trust in Big Data
- Visualizing Large Scale Security Data
|
Special Session 4 Blockchain Security and Privacy |
- Anonymity, Deanonymization, and Privacy in Blockchain Systems
- Compact Ring Signatures
- Cyber-Infrastructures for Blockchain Systems
- Defenses and Countermeasures
- Digital Preservation of Blockchain Records
- Economic, Monetary, Legal, Ethical, and Societal Aspects
- Formal Verification of Smart Contracts
- Fraud Detection and Financial Crime Prevention
|
- Compact Range Proofs
- Blockchain Cryptographic Primitives
- Incentive Mechanisms for Blockchains
- New Threat Models and Attacks
- Platforms for Decentralized Consensus
- Privacy-Preserving Signature Aggregation
- Provenance and Trust in Blockchain Systems
- Regulation and Law Enforcement
- Scalability Issues and Solutions
- Trust Models and Trust Management in Blockchain Systems
|