Co-located with the 40th International Information Security and Privacy Conference (IFIP SEC 2025)
Home
At a glance:
Workshop: 23 May 2025 (Maribor, Slovenia)
Submission deadline: 31 January 2025 (11.59pm AoE, Firm)
Notification of acceptance: 28 February 2025
Delivery of camera-ready papers: 21 March 2025
Organizer: IFIP WG11.4 “Network & Distributed Systems Security”
Proceedings published by Springer IFIP series
Call for Papers
Background:
Working Group 11.4 “Network & Distributed Systems Security” (https://www.ifiptc11.org/wg114) of the International Federation for Information Processing (IFIP, https://ifip.org/) is organizing a workshop. The workshop will be co-located with the 40th International Information Security and Privacy Conference (IFIP SEC 2025, https://sec2025.um.si/), the flagship conference of IFIP Technical Committee 11 “Security and Privacy Protection in Information Processing Systems”. The workshop is open to all; membership in IFIP or in WG11.4 is not necessary. Attending the workshop requires registration at the IFIP SEC conference (options for registering either for the whole conference or only for the workshop are available).
Call for papers:
The aim of the workshop is to provide a forum for discussion among researchers, practitioners, regulators, students, and any other interested parties. The scope of the workshop covers the security of computer networks and of distributed systems. Topics of interest include, but are not limited to:
- Attacks on networks and distributed systems
- Distributed defense strategies against cyberattacks
- Distributed identity and access management
- Federated learning
- Mobile and wireless network security
- Privacy and data protection
- Public key infrastructures
- Secure multiparty computation
- Security and privacy in cloud computing, edge computing, and the Internet of Things
- Security and privacy in Distributed Ledger Technologies
- Security and privacy in emerging networks and distributed technologies (e.g., 6G and beyond, digital twins, metaverse, quantum computing and networking)
- Security and privacy in networked cyber-physical systems (e.g., connected autonomous mobility, smart homes, body-area networks)
- Security and privacy in web applications and services
- Security and privacy of distributed applications
- Security and privacy of distributed Artificial Intelligence applications, including machine learning and generative AI
- Security of critical infrastructures
- Security of network protocols
- Security protocols
- Surveillance and Cyber-resilience
Submission guidelines:
Submitted papers must be original, unpublished, and not submitted to another conference, workshop, or journal for consideration. Submitted papers must be written in English. Submissions should not be anonymised. Beyond technical papers and papers presenting the results of completed research, also work-in-progress papers, position papers, survey papers, and papers discussing non-technical aspects are of interest. Submissions must be either full papers of at most 14 pages, or short papers of at most 10 pages. In both cases, the page count includes figures, tables, references, and appendices (if any). Authors must follow the Springer LNCS formatting instructions. For camera-ready papers, Latex or Word format must be used. Author instructions and templates can be found at https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines.
At least one author of each accepted paper must register, following the rules of the main conference, and present the paper at the workshop.
Papers must be submitted via the EasyChair conference system, which can be found at https://easychair.org/conferences/?conf=wndss2025.
Best student paper award:
The aim of the best student paper award is to reward the best paper accepted to and presented at the workshop, the main author of which is a student. To be eligible, the main author of the paper must be a Bachelor or Master student at the time of the workshop, or he/she must have been a Bachelor or Master student when the work reported in the paper was carried out. During the submission process, papers eligible for the best student paper award should be marked as such in the submission system, and proof of the main author's student status has to be uploaded along with the paper itself. Based on the number of accepted student papers, the workshop chairs reserve the right to decide on the number of student papers to be rewarded, which could be 0, 1, or more.
Important dates:
Deadline for submission: 31 January 2025 (11.59pm AoE, Firm)
Notification of acceptance: 28 February 2025
Delivery of camera-ready papers: 21 March 2025
Committee
Workshop chairs:
- Alessandro Brighente, University of Padova, Italy
- Joaquin Garcia-Alfaro, Institut Polytechnique de Paris, France
- Zoltan Mann, University of Halle-Wittenberg, Germany
Program committee:
- Abdelrahaman Aly, Technology Innovation Institute, United Arab Emirates
- Mikael Asplund, Linköping University, Sweden
- Giuseppe Bianchi, University of Rome Tor Vergata, Italy
- Matt Bishop, University of California Davis, USA
- Levente Buttyan, Budapest University of Technology and Economics, Hungary
- Michal Choras, Bydgoszcz University of Science and Technology, Poland
- Sabrina De Capitani di Vimercati, University of Milan, Italy
- Jose Maria de Fuentes, Universidad Carlos III de Madrid, Spain
- Mathias Fischer, University of Hamburg, Germany
- Lorena González Manzano, Universidad Carlos III de Madrid, Spain
- Dogan Kesdogan, University of Regensburg, Germany
- Hiroaki Kikuchi, Meiji University, Japan
- Csaba Krasznay, National University of Public Service, Hungary
- Torsten Krauß, University of Würzburg, Germany
- Jorn Lapon, KU Leuven, Belgium
- Kaitai Liang, TU Delft, The Netherlands
- Giovanni Livraga, University of Milan, Italy
- David Megias, Universitat Oberta de Catalunya, Spain
- Weizhi Meng, Lancaster University, United Kingdom
- Vincent Naessens, KU Leuven, Belgium
- Guillermo Navarro-Arribas, Autonomous University of Barcelone, Spain
- Josef Pieprzyk, CSIRO/Data61, Australia and ICS, PAS, Poland
- Isabel Praca, GECAD / ISEP, Portugal
- Peter Roenne, University of Luxembourg, Luxembourg
- Savio Sciancalepore, TU Eindhoven, The Netherlands
- Paria Shirani, University of Ottawa, Canada
- Dave Singelée, KU Leuven, Belgium
- Vicenc Torra, Umea University, Sweden
- Florian Tschorsch, TU Dresden, Germany
- Edgar Weippl, University of Vienna, Austria
- Nicola Zannone, TU Eindhoven, The Netherlands
- Thomas Zefferer, A-SIT Plus GmbH, Austria
Program
All times are according to Central European Summer Time (CEST - UTC+02:00). All sessions take place at Hall City C.
FRIDAY 23 MAY 2025, Hall City C. | |
08:00-09:00 | Registration |
09:00-09:10 | Opening |
09:10-10:15 |
KEYNOTE Security Issues with Networked and Distributed Systems. Matt Bishop (University of California Davis, USA) |
10:15-10:40 |
Session 1: Security of Industrial Control Systems A Novel Evidence-Based Threat Enumeration Methodology for ICS. Can Özkan (KU Leuven, Belgium) and Dave Singelée (KU Leuven, Belgium) |
10:40-11:10 | Coffee Break |
11:10-12:10 |
Session 2: Binary Protocols and Security of Smart Grids Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. August See (University of Hamburg, Germany), Lilly Sell (University of Hamburg, Germany), Benedikt Ostendorf (University of Hamburg, Germany), and Mathias Fischer (University of Hamburg, Germany) Security Metrics for False Data Injection in Smart Grids. Moritz Volkmann (Hamburg University of Applied Sciences, Germany), Sascha Kaven (Hamburg University of Applied Sciences, Germany), and Volker Skwarek (Hamburg University of Applied Sciences, Germany) |
12:10-13:10 | Lunch Break |
13:10-14:50 |
Session 3: Resilience, Anonymity Networks, and Liveness Detection A Quantum Algorithm for Assessing Node Importance in the st-Connectivity Attack. Iain Burge (Institut Polytechnique de Paris, France), Michel Barbeau (Carleton University, Canada), and Joaquin Garcia-Alfaro (Institut Polytechnique de Paris, France) BERMUDA: A BPSec-Compatible Key Management Scheme for DTNs. Fiona Fuchs (Technische Universität Dresden, Germany), Felix Walter (Technische Universität Dresden, Germany), and Florian Tschorsch (Technische Universität Dresden, Germany) Impact Analysis of Sybil Attacks in the Tor Network. Christoph Sendner (Julius-Maximilians Universität Würzburg, Germany), Dominik Schreider (Julius-Maximilians Universität Würzburg, Germany), and Alexandra Dmitrienko (Julius-Maximilians Universität Würzburg, Germany) Time-Aware Face Anti-Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning. Moritz Finke (University of Wuerzburg, Germany) and Alexandra Dmitrienko (University of Wuerzburg, Germany) |
14:50-15:00 | Short Break |
15:00-15:20 | Session 4: IFIP WG11.4 Meeting & Closing Remarks |
15:20-15:50 | Farewell refreshments & last chats |
Keynote
Matt Bishop
Matt Bishop received his Ph.D. in computer science from Purdue University, where he specialized in computer security, in 1984. He was a research scientist at the Research Institute of Advanced Computer Science and on the faculty at Dartmouth College before joining the Department of Computer Science at the University of California at Davis.
His main research area is the analysis of vulnerabilities in computer systems, including modeling them, building tools to detect vulnerabilities, and ameliorating or eliminating them. He works in network security, resilience, attribution, policy modeling, software assurance testing, and formal modeling of access control. He worked on numerous analyses of e-voting systems including the RABA study in Maryland, and was one of the two principle investigators of the California Top-to-Bottom Review, which performed a technical review of all electronic voting systems certified in the State of California.
He is a member of the ISSA Hall of Fame, the Cybersecurity Hall of Fame, and a Distinguished Member of the ACM, as well as a Distinguished Professor at the University of California.
He is active in cybersecurity education, and received the 2022 IEEE Computer Society Taylor L. Booth Education Award. He co-led the Joint Task Force that developed the ACM/IEEE/ASIS SIGSAC/IFIP WG11.8 Cybersecurity Curricular Guidelines. The second edition of his textbook, Computer Security: Art and Science, was published in November 2018 by Addison-Wesley Professional. He teaches introductory programming, operating systems, and computer security.
Talk title: Security Issues with Networked and Distributed Systems
TBA.