Workshop on Security practices for Internet of ThingsSPIoT 2019
The workshop on Security Practices for Internet of Things addresses the security issues of IoT devices from the formal and practical viewpoint. IoT devices are creeping into everyday life by promising wondrous features. However, a malicious attacker can easily exploit these devices to build botnets, lock them with ransomware, or use them as a bridgehead into less accessible networks. The objective of the SPIoT workshop is to bring together security practitioners, security-aware IoT users and formal analysis experts with the aim of sharing practices and finding guarantees about the trustworthiness of IoT devices and their use. Relevant case studies come from settings where a security flaw implies serious damage, such as in industry, safety-critical systems and healthcare.
Accepted Papers
Call for Papers
The main aim of the workshop is to stimulate collaboration among the participants from the security and formal methods communities. For this reason, the submissions are in the form of abstracts, and may include both published and ongoing work. We accept submissions up to two pages in the LLNCS format, which are handled via EasyChair (see Submission Link). No formal publication nor post-proceedings will be produced, however a pre-proceeding printed version of the abstracts will be made available to the workshop participants.
After the workshop, we will open a call for full papers. Selected contributions will be published in a Special Section of the LNCS “Transactions on Foundations for Mastering Change (FoMaC)” series.
Sun 7 AprDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
11:00 - 12:30 | |||
11:00 30m | Invited Talk: Expected Cost Analysis of Attack-Defence Trees SPIoT Jan Kretinsky Technical University of Munich | ||
11:30 30mTalk | Static Analysis for the OWASP IoT Top 10 2018. SPIoT Pietro Ferrara JuliaSoft SRL, Italy, Amit Kr Mandal Università Ca' Foscari, Venezia, Italy, Agostino Cortesi Università Ca' Foscari Venezia, Fausto Spoto U. Verona | ||
12:00 30mTalk | The Refinement-Risk Loop - A Process for Security Engineering in Isabelle SPIoT Florian Kammüller Middlesex University, UK |
14:00 - 15:30 | |||
14:00 30mTalk | ADTLang: A Programming Language Approach to Attack Defense Trees SPIoT René Rydhof Hansen Aalborg University, Denmark, Peter Gjøl Jensen Aalborg University, Denmark, Kim Larsen Aalborg University, Axel Legay INRIA Rennes, Danny Bøgsted Poulsen University of Kiel, Germany | ||
14:30 30mTalk | Learning from attacks and failures: generating reliability models from data SPIoT Marielle Stoelinga University of Twente and Radboud University, Nijmegen | ||
15:00 30mTalk | Graph-based Technique for Survivability Estimation and Optimization of IoT Applications SPIoT |