Second IEEE International Workshop on Security Testing and Monitoring


About STAM:


Distributed computer networked systems and services have become a crucial infrastructure element for the organization of modern society. These networks and services are required to be more and more open and new technology is designed to facilitate the inter-operation between these networks composed of heterogeneous, communicating devices. Since the environment may be potentially hostile and contain malicious components, it is crucial to define frameworks adapted to distributed systems to enforce security and privacy.

The STAM workshop tries to answer how vulnerability, intrusions and attacks modeling can help users understand the occurrence of malicious behaviors in order to avoid them, and what are the advantages and drawbacks of the existing models. At the same time, the workshop tries to understand how to solve the challenging security testing and monitoring problem given that testing distributed systems is a complex task and security will add new challenges and difficulties to be solved.




Submission Deadline:

January 31st, 2016 extented to February 19th, 2016

Author Notification:

March 21st, 2016

Camera-Ready Due:

April 28th, 2016

Workshop Date:

June 27th, 2016


Topics of Interest:


•Security testing in distributed systems

•Security testing in distributed systems

•Security monitoring in distributed systems

•Testing techniques in distributed systems: Fuzz, regression, mutation, safety and robustness etc.

•Formals models for security in distributed systems

•Security requirements definition and modeling

•Security testing and monitoring automation

•Attacks tolerance in distributed environments

•Remediation and reactions against attacks in distributed systems

•Security testing and monitoring for cloud and multi-cloud systems

•Security testing and monitoring for IoT

•Security testing and monitoring for big data

•Security testing and monitoring for critical infrastructure

•Trust and privacy in distributed environments

•Tools for security testing and monitoring

•Industrial experience reports

General Chairs :

•Ana Rosa Cavalli (Montimage/Telecom SudParis)

• Wissam Mallouli (Montimage, France)

Program Committee :

•Fabien Autrel (Telecom Bretagne, France)

•Javier Baliosian (University of the Republic, Uruguay)

•Valentina Casola, (CERICT, Italy)

•Thibault Cholez (INRIA, France)

•Josep Domingo-Ferrer (Universitat Rovira i Virgili, Catalonia)

•Jürgen Grossman (Fraunhofer Fokus, Germany)

•Rob Hierons (Brunel University, UK)

•Natalia Kushik (Institut Mines-Telecom/Telecom SudParis, France)

•Alexandre K. Petrenko (ISPRAS, Russia)

•Shinsaku Kiyomoto (KDDI R&D Laboratories Inc, Japan)

•Stephane Maag (Telecom SudParis)

•Bertrand Mathieu (Orange, France)

•Mercedes Merayo (Complutense University of Madrid, Spain)

•Edgardo Montes de Oca (Montimage, France)

•Antonio Skarmeta (Universidad de Murcia, Spain)

•Nina Yevtushenko (Tomsk University - Russia)

•Fatiha Zaidi (Universite de Paris Sud, France)

Paper Selection Procedure:

Full papers (6 pages) and short papers (2 pages) are requested in IEEE two-column format. Also, demonstrations of security testing tools (4 pages) and project success stories are solicited. Each paper will be reviewed by at least 3 program committee members. Easychair platform is used for the submission and review process.

The STAM workshop proceedings are expected to be published in the IEEE ICDCS Proceedings.