Abbrevation
ESSoS
City
Milan
Country
Italy
Deadline Paper
Start Date
End Date
Abstract

<pre>CONTEXT AND MOTIVATION Trustworthy, secure software is a core ingredient of the modern world&#046; So is the Internet&#046; Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere&#046; To address this, high&#8211;quality security building blocks (e&#046;g&#046;, cryptographic components) are necessary, but insufficient&#046; Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors&#046; Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software&#8242;s security properties&#046; GOAL AND SETUP The goal of this symposium, which will be the sixth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering&#046; Being one of the few conference&#8211;level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross&#8211;fertilization&#046; The symposium will feature two days of technical program&#046; In addition to academic papers, the symposium encourages submission of high&#8211;quality, informative industrial experience papers about successes and failures in security software engineering and the lessons learned&#046; Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight&#046; TOPICS Paper submissions are solicited in all areas relating to secure software and secure systems research, including but not limited to: &#8211; Cloud security, virtualization for security &#8211; Mobile devices security &#8211; Automated techniques for vulnerability discovery and analysis &#8211; Model checking for security &#8211; Binary code analysis, reverse&#8211;engineering &#8211; Programming paradigms, models, and domain&#8211;specific languages for security &#8211; Operating system security &#8211; Verification techniques for security properties &#8211; Malware: detection, analysis, mitigation &#8211; Security in critical infrastructures &#8211; Security economics &#8211; Security by design &#8211; Static and dynamic code analysis for security &#8211; Web applications security &#8211; Program rewriting techniques for security &#8211; Security measurements &#8211; Empirical secure software engineering &#8211; Security&#8211;oriented software reconfiguration and evolution &#8211; Computer forensics &#8211; Processes for the development of secure software and systems &#8211; Human&#8211;computer interaction for security &#8211; Security testing &#8211; Embedded software security </pre>