Software vulnerabilities can cause tremendous operational and financial damage to individuals and organisations in the event of cyber attacks. For example, the recent Log4J vulnerability can make millions of systems worldwide open to cyber attacks and potentially cause billions of dollars of damage. Software Vulnerability Management (SVM) is a critical process during software development to ensure software security and prevent these dangerous cyber attacks. SVM typically contains various phases such as detection, assessment, prioritisation, fixing/patching and reporting/disclosure. In the last 10 years, there has been an unprecedented rise in the size and complexity of software systems. For instance, the codebase of Google services contains more than two billion lines of code. This in turn requires new technologies, tools, and practices for SVM to ensure the security of such systems.
The First International Workshop on Software Vulnerability Management (SVM 2023) is a venue that aims to bring together academics, industry and government practitioners to present and discuss the state-of-the-art and state-of-the-practice of SVM to support both current and emerging software technologies and infrastructures.
The official website of the SVM workshop is: https://www.svmconf.org/.
The Twitter site of the workshop: https://twitter.com/svmconf.
The Linkedin site of the workshop: https://www.linkedin.com/company/svm-workshop.
Tweets by svmconfSat 20 MayDisplayed time zone: Hobart change
09:00 - 10:30 | Opening and KeynoteSVM at Meeting Room 104 Chair(s): Muhammad Ali Babar University of Adelaide, Triet Le The University of Adelaide | ||
09:00 15mDay opening | Opening SVM | ||
09:15 60mKeynote | Keynote: Applying psychological theories to improve software vulnerability management SVM Monica Whitty Monash University | ||
10:15 15mFull-paper | VrT: Vulnerabilities Reports Tagger Machine Learning Driven Cybersecurity Tool for Vulnerability Classification SVM | ||
10:30 30mCoffee break | Morning tea SVM |
11:00 - 12:30 | |||
11:00 15mFull-paper | A Static Analysis Platform for Investigating Security Trends in Repositories SVM Tim Sonnekalb German Aerospace Center (DLR), Christopher-Tobias Knaust , Thomas S. Heinze Aarhus University, Denmark, Clemens-Alexander Brust German Aerospace Center (DLR), Bernd Gruner DLR Institute of Data Science, Lynn von Kurnatowski German Aerospace Center, Andreas Schreiber German Aerospace Center (DLR), Patrick Mäder Technische Universität Ilmenau | ||
11:15 15mFull-paper | An Empirical Study on Workflows and Security Policies in Popular GitHub Repositories SVM | ||
11:40 50mTalk | Group forming and discussion - SVM gaps between academia and practice SVM |
13:45 - 15:15 | |||
13:45 15mTalk | Invited talk - (Dr. Hyun Sangwon) SVM Sangwon Hyun University of Adelaide | ||
14:00 15mTalk | Invited talk - Incident Prevention Through Reliable Changes Development: Progress and Future Plans SVM Eileen Kapel Delft University of Technology | ||
14:15 15mTalk | Invited talk - Software vulnerabilities causing timing attacks: An empirical study SVM M. Mehdi Kholoosi University of Adelaide | ||
14:30 15mFull-paper | Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure SVM Rikuho Miyata , Hironori Washizaki Waseda University, Kensuke Sumoto , Nobukazu Yoshioka Waseda University, Japan, Yoshiaki Fukazawa Waseda University, Takao Okubo Institute of Information Security | ||
14:45 30mPanel | Panel discussion - Reflections and Visions for SVM SVM | ||
15:15 10mDay closing | Closing SVM |
Accepted Papers
Call for Papers
The International Workshop on Software Vulnerability Management (SVM) invites academia, industry, and governmental entities to submit original research papers and demos (hands-on or videos) concerning the advances and practices of software vulnerability management from both technical and socio-technical perspectives.
The suggested topics include but not limited to:
- Requirements engineering for SVM
- Techniques and practices of threat modeling (including mixed-methods)
- Methodology and processes for SVM
- Static/dynamic analysis tools for SVM
- AI-driven techniques for SVM (AI4SVM)
- SVM for AI-based systems (SVM4AI)
- Socio-technical aspects of SVM
- Human-AI collaboration for SVM
- Empirical study of SVM tools and/or practices (including mixed-methods)
- SVM in software development lifecycle
- SVM in software supply chain security
- Mining software repositories for SVM
- Datasets for SVM
- Data quality for SVM analytics
- Software infrastructures for SVM
- SVM for infrastructure-as-code and/or virtualised infrastructures
- SVM for DevOps
- SVM for emerging software systems (e.g., blockchain, virtual, augmented, mixed reality, and quantum systems)
Please note that the contributions can target any task/phase within an SVM process.
Submission Types
The SVM workshop welcomes two types of submissions:
- Full Papers: up to eight pages, including references. These full papers are expected to describe original contributions to research and/or practice for SVM. We also welcome experience or industrial reports. Although these papers can include work-in-progress work, the authors must outline a clear plan moving forward. The accepted papers will be allocated 10 to 15 minutes for presentation.
- Short Papers: up to four pages, including references. These short papers are expected to present emerging ideas papers or visions for the SVM field, or new datasets and tools for SVM that can be accompanied by either hands-on or recorded demos. The papers that are overly focused on the advertisement of a product or service, rather than discussing interesting findings and insights gained from the use of a product or operation of a service, are heavily discouraged. The accepted short papers will be allocated 4 to 7 minutes for presentation.
How to Submit
We adopt the guidelines of ICSE 2023 paper submission for the SVM workshop. Specifically, submissions must conform to the IEEE conference proceedings template, specified in the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran}
without including the compsoc or compsocconf options).
When submitting to the workshop, authors acknowledge that they conform to the authorship policy of the ACM, and the authorship policy of the IEEE.
Authors are strongly encouraged to share the artifacts (e.g., data, code, and models) in the submissions, whenever possible, as per the Open Science Policy of ICSE 2023. The submissions need to be made to HotCRP at https://svmconf2023.hotcrp.com/.
Double-Anonymous Review Process
As per the ICSE 2023 guidelines, papers and abstracts submitted for review must be anonymous: (1) Authors’ names and affiliations must be omitted; (2) All of the references to the authors’ previous work need to be done in the third person, as though it were written by someone else; (3) When referring to or including a website (e.g., GitHub) that contains source code, tools, or other supplemental materials, the link in the submission and the website itself must not contain the authors’ names and/or affiliations; (4) Avoid using the submission title when sharing/discussing the submission publicly during the review process; (5) Avoid mentioning the paper/preprint uploaded to a public repository (e.g., Arxiv) is under submission to the workshop. Each paper will then be anonymously reviewed by at least three experts that do not have a conflict of interest with the author(s). Papers or abstracts that are not properly anonymized may be desk rejected without review.
Conflicts of Interest
We seriously consider Conflicts of Interest during the paper review. Both authors and program committee members are encouraged to cooperate to prevent submissions from being evaluated by reviewers having a conflict of interest with any of the authors. The authors and reviewers can refer to the ACM Conflict of Interest Policy for identifying a conflict of interest.
Ethics Policies
If the research involves human participants/subjects, the authors must adhere to the ACM Publications Policy on Research Involving Human Participants and Subjects. Upon submitting, authors will declare their compliance to such a policy.
If the submission describes, or otherwise takes advantage of, newly discovered software vulnerabilities or cyber attacks, the authors should disclose these vulnerabilities to the vendors/maintainers of affected systems prior to the submission deadline. When disclosure is necessary, authors are expected to include a statement within their submission and/or final paper about steps taken to fulfill the goal of responsible disclosure.