The First International Workshop on Systems Vulnerabilities

SYVUL 2007

July 1-6, 2007 - Silicon Valley, USA


Technical Co-Sponsors and Logistics Supporters

This workshop is part of ICIMP 2007.


Submit a Paper:

Submit a paper using the same page as the ICIMP 2007 conference.

Touristic Information:

Touristic information is available from the hosting conference, ICIMP 2007.

Hotels and Travel:

Hotels and travel information is available from the hosting conference page, ICIMP 2007.

Call for Papers:

The design, implementation and deployment of large distributed systems are subject to conflicting or missing requirements leading to visible and/or hidden vulnerabilities. Vulnerability specification patterns and vulnerability assessment tools are used for discovering, predicting and/or bypassing known vulnerabilities. 

Vulnerability self-assessment software tools have been developed to capture and report critical vulnerabilities. Some of vulnerabilities are fixed via patches, other are simply reported, while others are self-fixed by the system itself. Despite the advances in the last years, protocol vulnerabilities, domain-specific vulnerabilities and detection of critical vulnerabilities rely on the art and experience of the operators;  sometimes this is fruit of hazard discovery and difficult to be reproduced and repaired.

The International Workshop on Systems Vulnerabilities, SYVUL 2007, brings together practitioners and researchers for discussion and work on the emerging aspects pertaining to advanced techniques, platforms, paradigms, theories, and techniques for specifying, assessment, discovering and fixing system vulnerabilities. .

TOPICS OF SPECIAL INTEREST (but not limited to):

  • Vulnerability specification languages
  • System vulnerability assessment
  • Formal methods for safety-critical systems
  • Prediction capabilities of vulnerability discovery models
  • Highly vulnerable systems
  • Critical vulnerabilities
  • Errors and configurations leading to vulnerabilities
  • Incident reports and handling
  • Networks resiliency methods
  • Capacity planning for resilience and emergency
  • Operational resilience
  • Theory of disaster-tolerant systems
  • Web service vulnerability
  • Protocol vulnerability
  • Vulnerabilities in database systems
  • Vulnerability in control systems
  • Vulnerability analysis and. requirements for the security
  • Vulnerabilities by self-managed sensors
  • Recovery by disruption resource procedures
  • Common vulnerability scoring systems
  • Cost models and vulnerability business impact

INSTRUCTIONS FOR THE AUTHORS

The SYVUL 2007 Proceedings will be published by IEEE Computer Society Conference Publishing Services, posted on IEEE Xplore Digital Library, and indexed with major indexes.

Important deadlines:

Submission deadline March 4, 2007
Notification April 7, 2007
Registration and camera ready April 20, 2007

Regular papers

Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via the EDAS system.

Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page.

Once you receive the notification of paper acceptance, you will be provided by the IEEE CS Press an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will be published in the conference’s CD collection, together with the regular papers. Please send your presentations to petre@iaria.org

Tutorials

Tutorials provide overviews of current high interest topics. Proposals can be for half or full day tutorials. Please send your proposals to petre@iaria.org

Panel proposals

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. Please send your proposals to petre@iaria.org

Committees:

Co-Chairs:
TBD
TBD

TPC Members:

Petre Dini, Cisco Systems, Inc., USA // Concordia University, Canada
Luis Javier García Villalba, Complutense University of Madrid, Spain
Pietro Michiardi, Eurecom, France
Andy Ozment, University of Cambridge, UK
Shyaam Sundhar R. S., Endeavor Security Inc. McLean, VA

(to be completed)

Tutorials:

Tutorials are available from the hosting conference page, ICIMP 2007.

Preliminary Program:

Preliminary program is available from the hosting conference page, ICIMP 2007.

Manuscript Preparation:

Manuscript preparation is available from the hosting conference page, ICIMP 2007.

Registration Form:

Registration form is available from the hosting conference page, ICIMP 2007.

Statistics:

Statistics are available from the hosting conference page, ICIMP 2007.

Photos:

Photos are available from the hosting conference page, ICIMP 2007.

Awards:

Awards are available from the hosting conference page, ICIMP 2007.

 
 

Copyright (c) 2006, IARIA