ETAPS 2019
Sat 6 - Thu 11 April 2019 Prague, Czech Republic

The workshop on Security Practices for Internet of Things addresses the security issues of IoT devices from the formal and practical viewpoint. IoT devices are creeping into everyday life by promising wondrous features. However, a malicious attacker can easily exploit these devices to build botnets, lock them with ransomware, or use them as a bridgehead into less accessible networks. The objective of the SPIoT workshop is to bring together security practitioners, security-aware IoT users and formal analysis experts with the aim of sharing practices and finding guarantees about the trustworthiness of IoT devices and their use. Relevant case studies come from settings where a security flaw implies serious damage, such as in industry, safety-critical systems and healthcare.

Accepted Papers

Title
ADTLang: A Programming Language Approach to Attack Defense Trees
SPIoT
Graph-based Technique for Survivability Estimation and Optimization of IoT Applications
SPIoT
Static Analysis for the OWASP IoT Top 10 2018.
SPIoT

Call for Papers

The main aim of the workshop is to stimulate collaboration among the participants from the security and formal methods communities. For this reason, the submissions are in the form of abstracts, and may include both published and ongoing work. We accept submissions up to two pages in the LLNCS format, which are handled via EasyChair (see Submission Link). No formal publication nor post-proceedings will be produced, however a pre-proceeding printed version of the abstracts will be made available to the workshop participants.

After the workshop, we will open a call for full papers. Selected contributions will be published in a Special Section of the LNCS “Transactions on Foundations for Mastering Change (FoMaC)” series.

You're viewing the program in a time zone which is different from your device's time zone change time zone

Sun 7 Apr

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

11:00 - 12:30
11:00
30m
Invited Talk: Expected Cost Analysis of Attack-Defence Trees
SPIoT
Jan Kretinsky Technical University of Munich
11:30
30m
Talk
Static Analysis for the OWASP IoT Top 10 2018.
SPIoT
Pietro Ferrara JuliaSoft SRL, Italy, Amit Kr Mandal Università Ca' Foscari, Venezia, Italy, Agostino Cortesi Università Ca' Foscari Venezia, Fausto Spoto U. Verona
12:00
30m
Talk
The Refinement-Risk Loop - A Process for Security Engineering in Isabelle
SPIoT
Florian Kammüller Middlesex University, UK
14:00 - 15:30
IISPIoT at S510
14:00
30m
Talk
ADTLang: A Programming Language Approach to Attack Defense Trees
SPIoT
René Rydhof Hansen Aalborg University, Denmark, Peter Gjøl Jensen Aalborg University, Denmark, Kim Larsen Aalborg University, Axel Legay INRIA Rennes, Danny Bøgsted Poulsen University of Kiel, Germany
14:30
30m
Talk
Learning from attacks and failures: generating reliability models from data
SPIoT
Marielle Stoelinga University of Twente and Radboud University, Nijmegen
15:00
30m
Talk
Graph-based Technique for Survivability Estimation and Optimization of IoT Applications
SPIoT
Vladimir Shakhov University of Ulsan, South Korea, Insoo Koo University of Ulsan, South Korea