STPSA 2019: The 14th IEEE International Workshop on Security, Trust & Privacy for Software Applications

STPSA 2019 Program

STPSA 1: The 14th IEEE International Workshop on Security, Trust & Privacy for Software Applications
Friday July 19, 8:00 – 9:30
Location: Ballroom A
Session Chair: Mohammad Hossein Manshaei, Florida International University, USA

Identification of the Effects of Code Changes on the Security of Software
Moataz Abdelkhalek, Lotfi Ben Othmane and Ameerah-Muhsinah Jamil

User Behaviour-Based Access Control for Social Media with Qualitative Research and Bayesian Modelling
Sara McCloskey and John Herbert

Designing Good Security Metrics
George Yee

STPSA 2: The 14th IEEE International Workshop on Security, Trust & Privacy for Software Applications
Friday July 19, 1:00 – 2:30
Location: Ballroom A
Session Chair: Debbie Perouli, Marquette University, USA

Toward Machine Learning based Analyses on Packed Firmware
Seoksu Lee, Joon-Young Paik, Rize Jin and Eun-Sun Cho

Identifying Security Features for Proximity Identification
Juan Wang, Karim Lounis and Mohammad Zulkernine

Continuous User Authentication Based on Context-Emphasized Behavior Profiling
Shen Fu, Mathew L. Wymore, Neil Gong and Daji Qiao

Hands-on File Proactive Control Education for Secure Software Development
Hossain Shahriar, Mohammad Rahman, Hongmei Chi, Sheikh Ahamed, Fan Wu

Call for Papers

This workshop will bring researchers from academia and industry to discuss methods and tools to achieve security, trust, and privacy goals of both pervasive and non-pervasive software applications. This workshop will focus on techniques, experiences and lessons learned with respect to the state of art for the security, trust, and privacy aspects of both pervasive and non-pervasive software applications along with some open issues.

Information security has become a major concern for software and applications. Software systems must be engineered with reliable protection mechanisms with respect to security, privacy, and trust, while still delivering the expected value of the software to their customers. The traditional approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security, trust, and privacy (STP) issues. These issues should be addressed by building more effective STP-aware software applications. The principal obstacle in developing STP-aware software is that current software specification, design, implementation, and testing practices do not include adequate methods and tools to achieve security, trust, and privacy goals. Further, emerging techniques such as blockchain bring on new challenges to adopt them into developing STP-aware software and applications.

As most systems now are Internet-based, the number of attackers is increased dramatically and threat scenarios have changed. Traditional security measures do not fit well for the software of pervasive applications. Since location and contexts are key attributes of pervasive applications, the privacy issues need to be handled in a novel manner than traditional software applications. The devices in pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need for new trust models for pervasive computing applications. In this workshop, we will also welcome papers on the challenges and requirements of security, privacy, and trust for pervasive software applications.

Scope of the workshop

Topics of interest include, but are not limited to, the following:

  • Security, trust, and privacy specific software development practices
  • Security, trust, and privacy requirements elicitation and specification
  • Models and languages for STP-aware software specification and design
  • Architecture for STP-aware software development
  • STP challenges for pervasive software applications
  • Testing security, trust, and privacy properties of both pervasive and non-pervasive software
  • STP management and usability issues in software applications
  • User interfaces for STP-aware pervasive and non-pervasive software
  • Software reengineering for security, trust, and privacy for both pervasive and non-pervasive applications
  • Tradeoffs among security, privacy, trust, and other criteria
  • STP challenges in e-services, e.g. e-health, e-government, e-banking, e-commerce, e-marketing and other web-based and pervasive applications
  • STP challenges in mobile software applications
  • STP issues in sensor-based software applications
  • User interfaces for secure and privacy-aware pervasive computing applications
  • STP-aware service discovery mechanisms for pervasive computing environments
  • Models for ensuring security, trust, and privacy in pervasive software applications
  • STP issues for handheld device software applications such as healthcare
  • Teaching, innovative course or curriculum for STP-aware software development
  • Experience reports on developing STP-aware software
  • Offensive security and attacks on software applications and mitigation techniques
  • Application of blockchain technologies for STP-aware software development
  • Ethical issues in STP-aware software and application development
  • Experience reports on developing STP-aware software

STPSA Organizers

Steering Committee Chairs

Sheikh Iqbal Ahamed, Marquette University, USA

Mohammad Zulkernine, School of Computing, Queen’s University, Canada

General Chairs

Hossain Shahriar, Kennesaw State University Marietta, USA

Hongmei Chi, Florida A&M University, USA

Program Co-Chairs

Mohammad Rahman, Florida International University, USA

Debbie Perouli, Marquette University, USA

Natalia Stakhnova, University of Saskatchewan, Canada

Program Committee

Lin Deng, Towson University, USA
Hasan Jamil, University of Idaho, USA
Suryadipta Majumdar, SUNY Albany, USA
Pushkar Ogale, Stephen F. Austin State University, USA
Lingyu Wang, Concordia University, Canada
Marco Gerosa, North Arizona State University, USA
Ahmed Bouabdallah, IMT Atlantique, France
Alberto Casto-Hernandez, Miami University, USA
George Yee, Carleton University, Canada
Salimur Chowdhury, Lakehead University, USA
George Roussos, University of London, UK
Lotfi Ben Othmane, Iowa State University, USA
I-Ling Yen, University of Texas at Dallas, USA
Fadi Mohsen, University of Michigan – Flint, USA
Uttam Ghosh, Vanderbilt University, USA