Welcome to

The seventh International Workshop on Autonomous
and Spontaneous Security

11th September 2014, Wroclaw, Poland

The workshop is co-located with ESORICS 2014

This seventh edition of the SETOP workshop will be held in Wroclaw (Poland), the 11th of September of 2014, in conjunction with the 19th annual European research event in Computer Security (ESORICS 2014) symposium.
We invite researchers and practitioners from all countries working in autonomous security, privacy, trustworthy data systems and related areas to participate in the event.

Overview

Autonomous and Spontaneous security focuses on the dynamics of system behaviour in response to threats, their detection, characterisation, diagnosis and mitigation in particular through architectural and behavioural reconfiguration. Such approaches are needed in Embedded Systems, Pervasive Computing, and Cloud environments, which bridge the physical, social, and computing worlds and challenge traditional security provisions from different perspectives. Systems must be agile and continue to operate in the presence of compromise, introspective and self-protecting rather than just hardened, resilient to more complex threats yet more vulnerable as they are physically accessible, widely heterogeneous and need to integrate long-term legacy components.

Ensuring their resilience and protecting such systems at scale requires novel solutions across a broad spectrum of computational and resource environments, that integrate techniques from different areas including security, network management, machine learning, knowledge representation, control theory, stochastic analysis and software engineering amongst others.

Topic

SETOP invites submissions of novel research results and practical experiences relevant to autonomous and spontaneous security approaches including but not limited to the list below. We are looking for contributions to both technologies application areas.

Examples for Relevant Application areas:

  • Cloud Environments
  • Critical Infrastructures
  • Vehicular Networks
  • Mobile Computing
  • Mobile Ad-Hoc Networks
  • Wireless Sensor Networks
  • Personal Area Networks
  • Internet of Things

Examples of Relevant Technologies / Methodologies:

  • Intrusion and Compromise detection and characterisation
  • Anomaly detection and diagnosis
  • Continuous Authentication
  • Dynamic re-perimeterisation
  • Autonomous Key-Management
  • Context-aware security adaptation
  • Risk assessment at run-time
  • Trust and Reputation
  • System resilience and Survivability
  • Measures and Metrics of system health and resilience
  • Proactive vs. Reactive Security Strategies
  • Synthesis and Evaluation of response strategies
  • Data centric self-protection
  • Bio-inspired models for security
  • Self-Organisation

Quick information

Workshop date/place:
11th September 2014, Wroclaw, Poland

Submission deadline:
June 23rd, 2014,

Acceptance Notification:
July 31st, 2014

Camera ready:
August 7th, 2014

Sponsors