STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2024 is the twentieth workshop in this series and will be held in Bydgoszcz, Poland, in conjunction with the 29th European Symposium On Research in Computer Security (ESORICS 2024). The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:
Paper Submission | Author Notification | Camera Ready |
---|---|---|
July 4, 2024 | August 1, 2024 | August 19, 2024 |
All deadlines are at 11.59PM / 23:59 American Samoa Time
Submissions are to be made to via EasyChair. At least one author of accepted papers must guarantee that they will present their paper at the workshop.
All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of accepted papers). All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages in the LNCS format, excluding the bibliography and well-marked appendices, and at most 20 pages in total.
A paper submitted to STM 2024 cannot be under review for any other conference or journal during the time it is being considered for STM 2024. Furthermore, after you submit to STM 2024, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before or after submission of the paper to STM 2024, we will reject your paper without review and will also notify the other conference/journal. This restriction applies to identical as well as to substantially similar papers.
As in previous years, the proceedings will be published online by Springer in the Lecture Notes in Computer Science (LNCS) series (past STM proceedings are available here). As such, the final version of an accepted paper must be in the format required for publication in the LNCS series. Authors should consult Springer's authors' guidelines and use their proceedings templates. Springer encourages authors to include their ORCIDs (https://goo.gl/hbsa4D) in their papers. Submissions not meeting these guidelines risk rejection without consideration of their merits.
In addition, the corresponding author of each accepted paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.
(Note: presentation times include 5 mins for Q&A)
09:00 - 10:30 | SESSION 1 |
---|---|
09:00 - 10:00 | Mauro Conti. Keynote presentation |
10:00 - 10:20 | Tobias Hilbig, Erwin Kupris and Thomas Schreck. Machines Have Identities Too! Extending NIST’s SP 800-63 for Device Identity |
10:20 - 10:40 | COFFEE BREAK |
10:40 - 12:30 | SESSION 2: ANONYMITY, TRUST AND NETWORK SECURITY |
10:40 - 11:10 | Alperen Aksoy and Dogan Kesdogan. Distributed Dynamic Self-Control Anonymity Management Model |
11:10 - 11:40 | Amir Zarei and Staal Vinterbo. Statistically secure multiparty computation of a biased coin |
11:40 - 12:10 | Davide Ferraris and Lorenzo Monti. DrATC: Dynamic routing Algorithm based on Trust Characteristics |
12:10 - 12:30 | Lorenzo Mirabella, Cinzia Bernardeschi, Giuseppe Lettieri, Fabio Lucattini and Salvatore Montanarella. A portable research honeypot for corporate networks |
12:30 - 13:45 | LUNCH BREAK |
13:45 - 15:15 | SESSION 3 |
13:45 - 14:45 | Zheng Li. On the Privacy Risks of Machine Learning Models. ERCIM STM PhD AWARD PRESENTATION |
14:45 - 15:15 | Jacek Pomykała, Mariusz Jurkiewicz, Olgierd Żołnierczyk and Kamila Prabucka. On beta-separating sets and deterministic factoring |
15:15 - 15:30 | COFFEE BREAK |
15:30 - 17:10 | SESSION 4: SYSTEMS AND APPLICATION SECURITY |
15:30 - 16:00 | Carlo Mazzocca, Andrea Garbugli, Michele Armillotta, Rebecca Montanari and Paolo Bellavista. Flexible and Secure Process Confinement with eBPF |
16:00 - 16:30 | Giovanni Ciaramella, Francesco Mercaldo and Antonella Santone. Dynamic Analysis for Explainable Fine-grained Android Malware Detection |
16:30 - 16:50 | Haitham Al-Sinani and Chris Mitchell. Unleashing AI in Ethical Hacking |
16:50 - 17:10 | Ioana Sandu, Rita Borgo, Prokar Dasgupta, Ramesh Thurairaja and Luca Viganò. A Formal Approach For Modelling And Analysing Surgical Procedures |
Any doubts or queries can be addressed to the PC Chairs using the following emails: