Call for papers


THE SELECTED PAPERS ARE AVAILABLE.

IMPORTANT DATES

Registration: June 15th 29th July 3rd
Submission: June 19th July 3rd
Notification of acceptance: September 12th
Final version: September 26th


TOPICS OF INTEREST

The main theme is the security of information and computer systems. In this context, we highlight the following topics, not exhaustive:

  • Access control models and mechanisms
  • Anonymity and privacy
  • Authentication and identity management
  • Biometric identification systems and techniques
  • Computational forensics and criminalistics
  • Cryptography and cryptanalysis: algorithms, protocols, techniques, and applications
  • Intellectual property protection and DRM
  • Secure hardware: RFID, smart cards, secure sensors
  • Secure Voting systems
  • Security and privacy in applications (digital TV, e-banking, social networks, smart grids)
  • Security incidents: prevention, detection, and response
  • Security in cloud computing
  • Security in databases
  • Security in distributed and parallel systems
  • Security in mobile and embedded systems
  • Security in networks
  • Security in operating systems
  • Security in pervasive computing
  • Security in the Internet of Things
  • Security policies, standards, and norms
  • Software security: development, tests, and certification
  • System audit and risk analysis
  • Trust management

INSTRUCTIONS TO AUTHORS

This call refers only to full papers, which should present a research work developed to the point of producing original and relevant results, fully analyzed and validated. Moreover, the paper's presentation should contain a careful and well-based description of the research, as well as conclusions which are consistent with the obtained results. Submitted papers should describe relevant research, experiment reports and case studies.

All submissions must be anonymous, that is, they should not reveal information in the header, body or references that could easily be used to infer the authors' identities.

Articles can be submitted in Portuguese or English. Text formatting should adhere to the SBC template available here. Full papers have a limit of 14 pages, including figures, tables, references and appendix. Submissions will be accepted solely only in PDF format, through SBC's JEMS system.

Papers will undergo a double-blind review process by the Program Committee. Accepted papers must be presented by one of the registered authors in order to be published in the conference proceedings. The PC will also select the best among the accepted and presented full papers.


PROGRAM COMMITTEE

Program committee chairs
Leonardo B. Oliveira, UFMG
Pedro Braconnot Velloso, UFRJ

Program committee members
Alberto Schaeffer Filho, UFRGS
Aldri dos Santos, UFPR
Altair Olivo Santin, PUCPR
Anderson Nascimento, UnB
André Grégio, UFPR
Carla Merkle Westphall, UFSC
Carlos da Silva, UFRN
Carlos Maziero, UTFPR/UFPR
Carlos Westphall, UFSC
Célio Vinicius Neves de Albuquerque, UFF
Davidson Boccardo, INMETRO
Denise Goya, UFABC
Diego Aranha, UNICAMP
Dorgival Guedes, UFMG
Edna Canedo, UnB
Eduardo Alchieri, UnB
Eduardo Feitosa, UFAM
Eduardo Góes, DPF
Eduardo Souto, UFAM
Emerson Ribeiro de Mello, IFSC
Hao Chi Wong, Intel
Jean Martina, UFSC
Jeroen van de Graaf, UFMG
Joaquim Celestino Júnior, UECE
Karina Mochetti, UFF
Lau Cheuk Lung, UFSC
Leonardo Fagundes, UNISINOS
Leonardo Oliveira, UFMG
Lisandro Zambenedetti Granville, UFRGS
Luciano Paschoal Gaspary, UFRGS
Luiz Carlos Albini, UFPR
Luiz Fernando Rust da Costa Carmo, INMETRO
Marco Aurelio Amaral Henriques, UNICAMP
Marcos Simplicio Jr, Poli-USP
Marinho Barcellos, UFRGS
Marjory da Costa Abreu, UFRN
Mário Sérgio Alvim, UFMG
Michele Nogueira, UFPR
Michelle Wangham, UNIVALI
Miguel Elias Mitre Campista, UFRJ
Otto Carlos Muniz Bandeira Duarte, UFRJ
Paulo André da Silva Gonçalves, UFPE
Paulo Lício de Geus, UNICAMP
Pedro Braconnot Velloso, UFRJ
Priscila Solis, UnB
Rafael de Sousa Junior, UnB
Rafael Misoczki, Intel Labs - USA
Raphael Machado, INMETRO
Raul Ceretta Nunes, UFSM
Raul Weber, UFRGS
Ricardo Custódio, UFSC
Ricardo Dahab, UNICAMP
Roberto Gallo, KRYPTUS Segurança da Informação
Rossana Andrade, UFC
Routo Terada, IME-USP
Sergio de Oliveira, UFSJ


THE SELECTED TUTORIALS ARE AVAILABLE.

IMPORTANT DATES

Submission: June 13th 27th
Notification of acceptance: July 20th
Final version: September 15th


PRESENTATION

Tutorials aim to address important subjects that are usually not covered by undergraduate courses in the security area. The SBSeg committee will prioritize current themes and with great potential to attract undergraduate students and professionals. The tutorial must be in Portuguese (text and presentation). The presentation may include laboratory practice and it has to fit at most in three hours and thirty minutes.

If you have any questions about this opportunity or the application process, please contact Michel Abdalla by email michel.abdalla@ens.fr.


TOPICS OF INTEREST

  • Access control models and mechanisms
  • Anonymity and privacy
  • Authentication and identity management
  • Biometric identification systems and techniques
  • Computational forensics and criminalistics
  • Cryptography and cryptanalysis: algorithms, protocols, techniques, and applications
  • Intellectual property protection and DRM
  • Secure hardware: RFID, smart cards, secure sensors
  • Secure Voting systems
  • Security and privacy in applications (digital TV, e-banking, social networks, smart grids)
  • Security incidents: prevention, detection, and response
  • Security in cloud computing
  • Security in databases
  • Security in distributed and parallel systems
  • Security in mobile and embedded systems
  • Security in networks
  • Security in operating systems
  • Security in pervasive computing
  • Security in the Internet of Things
  • Security policies, standards, and norms
  • Software security: development, tests, and certification
  • System audit and risk analysis
  • Trust management

INSTRUCTIONS TO AUTHORS

Instructions are only available in Portuguese.


PROGRAM COMMITTEE

Tutorials Chair
Michel Abdalla (ENS & CNRS)

Program committee members
Altair Santin, PUCPR
Célio Vinicius Neves de Albuquerque, UFF
Eduardo Feitosa, UFAM
Leonardo Oliveira, UFMG
Luis Kowada, UFF
Luis Henrique Costa, UFRJ
Luiz Fernando Rust da Costa Carmo, Inmetro
Marcos Simplicio Jr - Escola Politécnica, USP
Michelle Wangham, Univali
Ricardo Dahab, UNICAMP
Rossana Andrade, UFC


THE SELECTED PAPERS ARE AVAILABLE.

IMPORTANT DATES

Submission: July 18th August 1st
Notification of acceptance: August 24th September 7th
Final version: September 14th 28th


PRESENTATION

The Contest of Theses and Dissertations on Information and Computational Systems Security (CTDSeg), part of SBSeg, aims to acknowledge and reward the best doctoral theses and best post-graduate dissertations in the security field. Researchers are invited to submit a summary paper which describes and summarizes the results concluded in their thesis or dissertation. Theses and dissertations completed between August 2014 to June 2016 are eligible for submission. The contest will award the determined three best doctoral theses and the three best post-graduate dissertations.


INSTRUCTIONS TO AUTHORS

Submitted paper summaries must be written in either Portuguese or English with a maximum page limit of 8 pages. Paper summaries should be formatted based on SBC’s formatting guidelines, available here. Paper summaries in PDF file form must be submitted through SBC’s JEMS portal.

The author must discuss the thesis’s or dissertation’s contribution to its intended academic field as well as it’s thematic originally. The summary must also include the following items: the title of the thesis or dissertation, the author’s name, name of supervisor(s) and co-supervisor(s) and their affiliations, the original abstract, motivations, goals, achievements, associated scientific work, and the web address where an official copy of the thesis or dissertation is published and available for view.

All submissions must have three files (in PDF format): paper summary, Declaration of Completion for the related thesis or dissertation and the thesis or dissertation. The statement must explicitly state that the candidate’s work was approved and successfully defended. The statement must also indicate the location and date of the defense, the supervisor’s name, and database location.


TOPICS OF INTEREST

In order to be eligible for consideration, submitted theses and dissertations must be related to a topic in the field of Information and Computational Systems Security.


EVALUATION

The paper summaries for an applicant’s thesis or dissertation will undergo an initial evaluation by three research experts on SBSeg’s Program Committee. The paper summaries accepted from the initial evaluation stage will be published in the SBSeg symposium proceedings. Furthermore, the principal author must present their thesis or dissertation at the CTDSeg. At CTDSeg, the contest’s Evaluation Committee will review the completed thesis or dissertation and evaluate the applicant’s oral presentation in order to determine the three best doctoral thesis and post-graduate dissertation contestants.


ORGANIZING COMMITTEE

CTDSeg Chairs
Diego F. Aranha, UNICAMP
Luciano Paschoal Gaspary, UFRGS

Program committee members
TBA


THE SELECTED PAPERS ARE AVAILABLE.

IMPORTANT DATES

Submission: July 15th 22th
Notification of Acceptance: August 19th
Final version: September 09th


PRESENTATION

The Workshop on Scientific Initiation and Undergraduate Degree (WTICG), a joint event with Brazilian Symposium on Information and Computational Systems Security (SBSeg), aims to encourage new graduates and undergraduates to participate in the production and dissemination of scientific papers on topics related to information and computational systems security.

WTICG 2016 will be held in conjunction with SBSeg 2016 in Niterói, RJ, from November 7, 2016 to November 10, 2016. Undergraduate students currently enrolled in university and recent graduates who completed their undergraduate course work from January 1, 2015 are invited to participate in WTICG 2016 (the status of undergraduate student or recent graduate must be proven with proper documentation, to be sent with the paper submission). Authors are invited to submit papers related to Scientific Initiation (IC) projects, completion of course work (TCC), software implementations, and independent projects completed in the years 2015 and 2016 or that are in the final stages of completion. Work completed must be submitted on the category ''Full paper''. Work in progress must be submitted on the category ''Poster''.


TOPICS OF INTEREST

  • Access control models and mechanisms
  • Anonymity and privacy
  • Authentication and identity management
  • Biometric identification systems and techniques
  • Computational forensics and criminalistics
  • Cryptography and cryptanalysis: algorithms, protocols, techniques, and applications
  • Intellectual property protection and DRM
  • Secure hardware: RFID, smart cards, secure sensors
  • Secure Voting systems
  • Security and privacy in applications (digital TV, e-banking, social networks, smart grids)
  • Security incidents: prevention, detection, and response
  • Security in cloud computing
  • Security in databases
  • Security in distributed and parallel systems
  • Security in mobile and embedded systems
  • Security in networks
  • Security in operating systems
  • Security in pervasive computing
  • Security in the Internet of Things
  • Security policies, standards, and norms
  • Software security: development, tests, and certification
  • System audit and risk analysis
  • Trust management

FULL PAPER

Submitted papers may be written in Portuguese or English with a maximum length of 10 pages. Papers must be formatted based on SBC's formatting guidelines, available here. Papers must be submitted through SBC’s JEMS portal only in PDF format.

The following criteria will be used in the evaluation of submitted papers: originality, relevance, presentation, results and technical quality. Submissions selected by the Program Committee will be published (in digital form), provided that at least one of the papers’ authors is registered for the workshop. All papers selected for publication must be presented during the workshop by one of the authors.

During the event, the three best works on the category ''Full Paper'' will be announced. Works that are candidates to win the awards are the ones presented by undergraduate students or recent graduates.


POSTER

Submitted papers may be written in Portuguese or English with a maximum length of 4 pages. Papers must be formatted based on SBC's formatting guidelines, available here. Papers must be submitted through SBC’s JEMS portal only in PDF format.

This category is intended to work in progress, without consolidated results. The following criteria will be used in the evaluation of submitted papers: originality, relevance, presentation, partial results and technical quality. Submissions selected by the Program Committee will be published (in digital form), provided that at least one of the papers’ authors is registered for the workshop. All papers selected for publication must be presented during the workshop by one of the authors.

During the event, the best work on the category ''Poster'' will be announced. Works that are candidates to win the award are the ones presented by undergraduate students or recent graduates.


ORGANIZING COMMITTEE

WTICG Chair
Daniel Macêdo Batista, USP

Program committee members
Altair Santin, PUCPR
Anderson Nascimento, UnB
Andre Gustavo Degraf Uchoa, The University of York
Arlindo Marcon Jr., IFPR
Carla Merkle Westphall, UFSC
Carlos Maziero, UFPR
Diego Aranha, Unicamp
Edna Dias Canedo, UnB
Eduardo Feitosa, UFAM
Eduardo Souto, UFAM
Emerson Ribeiro de Mello, IFSC
Heverson B. Ribeiro, Université de Neuchâtel
Iguatemi E. Fonseca, UFPB
João Gondim, UnB
Jose Antonio Xexeo, IME
Lau Cheuk Lung, UFSC
Leonardo B. Oliveira, UFMG
Lisandro Zambenedetti Granville, UFRGS
Luiz Fernando Rust da Costa Carmo, Inmetro
Marcos Simplicio Jr, USP
Michelle Wangham , UNIVALI
Paulo André da Silva Gonçalves, UFPE
Priscila Solis, UnB
Rafael Obelheiro, UDESC
Raphael Machado, Inmetro
Raul Ceretta Nunes, UFSM
Ricardo Custódio, UFSC
Rossana Andrade, UFC
Vivek Nigam, UFPB
William de Souza, University of London


IMPORTANT DATES

Submission: September 13th23th 30th
Notification of Acceptance: October 14th
Final Version: October 21th


PRESENTATION

Identity Management consists of an integrated system of policies, processes and technologies that enables organizations to treat and handle users and devices identities in authentication, authorization, accounting and auditing procedures.

This is an active research topic and, given its complexity and relevance, should continue from now on. This finding stems from the numerous technical issues that identity management systems should consider such as: ease of use, privacy and user anonymity, security, single sign on, scalability, fine-grained access control (based on attributes), interoperability and system costs (total cost of ownership).

The 6th Workshop on Digital Identity Management (WGID) aims to be a forum for discussion and technical paper presentations around the state of the art on technologies related to identity management. In addition, it seeks also to identify research challenges and enable the meeting of researchers on this subject.


TOPICS OF INTEREST

Authors are invited to submit original works on digital identity management. Topics of interest include (but are not limited to):

  • Federated mobile access and mobile certification
  • Attribute aggregation
  • Reference Architectures and Frameworks for IdM
  • Auditing in IdM systems
  • Authentication Single Sign On
  • Devices Authentication
  • Authentication and access control for non-web applications and mobile computing
  • Digital Certification
  • Attribute Certificates
  • Life cycle of digital identities (provisioning and administration)
  • Attribute Based Access Control (ABAC)
  • Developing applications using infrastructure of A&A provided by federations
  • Scalability in IdM systems
  • Academic Networks Federations
  • Tools for federations management and monitoring
  • Trust Management in IdM systems
  • Attributes Management
  • Management of A&A in interinstitutional projects
  • User-centric Identity Management
  • Identity Management and Cloud Computing
  • Identity Management and Electronic Government
  • Identity Management and Computational Grids
  • Identity Management and Internet of Things
  • Federated Identity Management
  • Electronic Identity
  • Interoperability between IdM systems
  • Level of Assurance on IdM
  • New approaches to authentication and access control
  • Privacy and anonymity of IdM systems
  • Authentication and Authorization Protocols
  • Social Networks and Digital Identities
  • Techniques for preventing fraud and identity theft
  • Usability in Identity Management technologies

WORKSHOP FORMAT

WGID will include the presentation of papers accepted for publication, invited lectures, and a panel discussion.

INSTRUCTIONS TO AUTHORS

Articles can be submitted in two categories:

Full papers: A full paper presents research work with original and relevant results, adequately validated and analyzed. Full papers are limited to 12 pages, including all figures, tables, references, and appendices.

Short papers: Short papers describe ongoing research, computer tools, and practical experiments. Short papers are up to 4 pages long. Papers describing tools and experiments should contain the following information: problem statement and motivation; architecture and description of the main features; URLs for the tool and its documentation; description of eventual demonstrations.

Paper formatting should follow the SBC template, available here. Papers should be submitted as PDF files SBC's JEMS system.

After submission to WGID, full and short papers will be evaluated by a body of reviewers in a double-blind manner (without any identification about authors, reviewers or institutions) and the selected works will be organized for presentation and publication in the symposium proceedings. At least one author of each selected paper should register in the Brazilian Symposium on Information and Computational Systems Security and appear at the time and place to be announced in the event program to present the work.


ORGANIZING COMMITTEE

WGID chair
Michelle S. Wangham, UNIVALI

Program committee members
Altair Santin, PUC-PR
Antonio Tadeu Gomes, LNCC
Carlos da Silva, UFRN
Carlos Ferraz, UFPE
Debora Muchaluat-Saade, UFF
Emerson Ribeiro de Mello, IFSC
Fábio Borges, LNCC
Flavio Deus, UnB
Gustavo Motta, UFPB
Jean Martina UFSC
Leonardo Oliveira, UFMG
Marco Aurélio Amaral Henriques, UNICAMP
Michelle Wangham, UNIVALI
Natália Fernandes, UFF
Noemi Rodriguez, PUC-Rio
Rafael de Sousa Junior, UnB
Ricardo Custódio, UFSC
Ricardo Dahab, UNICAMP
Roberto Samarone Araujo, UFPA
Vinod Rebello, UFF


IMPORTANT DATES

Submission: September 13th 23th
Notification of Acceptance: October 14th
Final Version: October 21th


PRESENTATION

The popularization of the Internet and the proliferation of electronic data processing and communication devices have made technology an ever-increasing part of people's lives. At the same time it opens a virtually infinite spectrum of possibilities for interaction and collaboration, it also creates opportunities for committing different types of crimes. The field of computer forensics is concerned with collecting, extracting, preserving and analysing digital evidence to support investigative and audit procedures. The challenges are great, including several technological, legal and social barriers that have to be overcome, as well as the need for providing professionals with the skills required to work in this area.

The V Workshop on Computer Forensics (WFC) aims to be a forum for discussions and technical paper presentations around the state of the art on technologies related to computer forensics. In addition, it also seeks to identify research challenges and foster the integration of researchers and professionals interested in computer forensics.


TOPICS OF INTEREST

Authors are invited to submit original works related to computer forensics. Topics of interest include (but are not limited to):

  • Advance Persistent Threat (APT) campaign analysis
  • Anti-forensics and anti-anti-forensics
  • Big Data approaches to forensics, including collection, data mining, and visualization
  • Case studies and trend reports
  • Crime monitoring and detection tools
  • Data hiding and discovery (steganography and steganalysis)
  • Data recovery and reconstruction
  • Database forensics
  • Digital crime
  • Digital evidence and the law
  • Digital evidence storage and preservation
  • Event reconstruction methods and tools
  • ICS/SCADA forensics
  • Internet-of-Things (IoT) forensics (IP cameras, smart TVs, videogames)
  • Interpersonal communications and social network analysis
  • Large-scale investigations
  • Malware forensics and attribution
  • Memory forensics
  • Mobile and embedded device forensics
  • Multimedia forensics
  • Network and distributed systems forensics
  • Point-of-Sale (PoS) malware analysis
  • Pornography and child pornography detection
  • Real-time incident response and analysis
  • Storage forensics
  • Tool testing and development
  • Traffic analysis, traceback and attribution
  • Virtualized environment forensics (virtual machines and cloud computing)

INSTRUCTIONS TO AUTHORS

WFC will include the presentation of papers accepted for publication, invited lectures and a forensics challenge. Papers can be submitted in two categories:

Full papers: A complete article describes in up to 12 pages (including figures, tables, references, appendices and attachments) a research work that has been developed to the point of producing original and relevant results, properly validated and analyzed.

Short papers: A short paper describes in up to 4 pages (including figures, tables, references, appendices and attachments) a research work in progress or a computational tool and / or practical experiments. In the case of tools and / or experiments, the abstract should contain at least the following information: description and motivation of the problem addressed by the tool; solution's architecture and description of the main features; tool's URL; tool documentation's URL and description of a possible demonstration.

The formatting of the text should follow the pattern of SBC, available here and shall not contain the names of the authors, affiliation, aknowledgements or any other obvious reference to authorship. Papers must be submitted in English or Portuguese through SBC's JEMS system and shall be exclusively in PDF format.

Papers must be written in English or Portuguese, and must be anonymized: remember to remove authors' names and other revealing information prior to submission. All submissions will be evaluated by a body of reviewers in a double-blind manner (without any identification of authors, reviewers or institutions). Accepted papers will be presented at the workshop and published in proceedings.

Authors are expected to present their work in person at the workshop. At least one registration per paper is required in order to be included in the proceedings.


ORGANIZING COMMITTEE

WFC Chair
Rafael R. Obelheiro, UDESC


IMPORTANT DATES

Submission: September 13th 20th
Notification of Acceptance: October 14th
Final Version: October 21th


PRESENTATION

The Workshop for Regulation, Conformity Assessment and Certification on Security (WRAC+) is a satellite event of the Brazilian Symposium on Information and Computational Systems Security (SBSeg). The WRAC+ is a forum where Regulators, Certification Bodies, Laboratories, Government, Academia and Industry can discuss different aspects of Conformity Assessment in the area of Information and Computer Systems Security.


JUSTIFICATION

The so-called "Cyberspace" includes a set of software, hardware and communication networks often invisible, though it supports most of the applications we use every day. This "space" contains Internet and its computers, and also includes a great number of intelligent devices and equipments dedicated to specific applications, in addition to networks interconnecting all of them - those networks may be connected to the Internet or may simply be a segregated network.

More and more, it becomes evident that engendered attacks in Cyberspace may have a major impact on the Society welfare. Thus, cyberspace should be subject to some sort of control by the State, in search for its safe operation. Such control takes place by means of a regulatory process in which the State establishes some rules and conduct patterns in order to ensure minimum security in cyberspace - or part of it.

WRAC+ will provide a forum in which all stakeholders interested in Cybersecurity issues will be able to interact and discuss how to build rules so that Brazil can reach an appropriate security status in its Cyberspace.

Topics address issues of interest to the Academy, Industry and Government, such as:

  • Which areas are subject to some sort of regulation/control by the State?
  • How to define a set of appropriate requirements for each kind of application?
  • How to specify systematic procedures (tests) to assess compliance with requirements as regarding equipments, software or smart devices operating in Cyberspace?
  • How to evaluate laboratory competency as for the implementation of security assessment activities of equipments, software or smart devices?
  • How to set up a conformity assessment infrastructure and how to integrate it to approval/regulators registration systems?
  • What are the technical limitations of conformity assessment tools?

TOPICS OF INTEREST

Although WRAC+ is mainly focused on Regulation and Conformity Assessment, information systems and any embedded software devices are very important objects in assessment process. Therefore, we are also concerned about issues involving Software and Smart Devices Security. WRAC+ intends to deepen discussions related to "security requirements specification" for software and intelligent devices and its "validation" with respect to a given set of requirements.

Topics of interest include - but are not limited to - the following:

  • Software protection and analysis
  • Software testing, verification and validation
  • Software debugging and understanding
  • Metrics, measurement and software analysis
  • Software Vulnerabilities
  • Formal methods
  • Malware detection and analysis
  • Risk management
  • Security regulations and standards
  • Hardware Security: invasive, semi-invasive and non-invasive methods
  • Products and Processes conformity assessment
  • Laboratory accreditation for security testing

INSTRUCTIONS TO AUTHORS

Papers may be submitted in two categories:

Full Papers: A full paper should present a research work developed to the point of producing original and relevant results, fully analyzed and validated. They are limited to a maximum of 10 pages.

Short Paper: A short paper should describe a research work in progress or practical experiments and "cases". They should contain between 4 and 6 pages.

Text formatting should adhere to the SBC template available here. Submissions will be accepted solely in PDF format, through SBC's JEMS system.

Papers will undergo a double-blind review process by the Program Committee. Accepted papers must be presented by one of the registered authors in order to be published in the conference proceedings.


ORGANIZING COMMITTEE

WRAC+ Chair
Raphael Machado, INMETRO


Organized by:
Supported by:
Sponsored by:
Diamond
Gold
Silver
Bronze
Developed by: