STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2022 is the eighteenth workshop in this series and will be held at Copenhagen Denmark, in conjunction with the 27th European Symposium On Research in Computer Security (ESORICS 2022). The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:
Paper Submission | Author Notification | Camera Ready |
---|---|---|
August 6, 2022 (Firm! AoE) | August 29, 2022 (Extended, AoE) | September 25, 2022 |
All deadlines are at 11.59PM / 23:59 American Samoa Time
Please note that authors have to submit their final files by 25 September, but can still update the files till 5 October (AoE). Then all files will be submitted to Srpinger.Submissions are to be made to the submission web site at: https://easychair.org/conferences/?conf=stm2022. At least one author of accepted papers must guarantee that they will present their paper at the workshop.
All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of accepted papers). All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages in the LNCS format, excluding the bibliography and well-marked appendices, and at most 20 pages in total.
A paper submitted to STM 2022 cannot be under review for any other conference or journal during the time it is being considered for STM 2022. Furthermore, after you submit to STM 2022, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before or after submission of the paper to STM 2022, we will reject your paper without review and will also notify the other conference/journal. This restriction applies to identical as well as to substantially similar papers.
As in previous years, the proceedings will be published online by Springer in the Lecture Notes in Computer Science (LNCS) series (past STM proceedings are available here). As such, the final version of an accepted paper must be in the format required for publication in the LNCS series. Authors should consult Springer's authors' guidelines and use their proceedings templates. Springer encourages authors to include their ORCIDs (https://goo.gl/hbsa4D) in their papers. Submissions not meeting these guidelines risk rejection without consideration of their merits.
In addition, the corresponding author of each accepted paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.
A best paper award was granted in this workshop. This award was given to the best paper submitted to the workshop, based on the relevance, originality, and technical quality.
This year for STM 2022, we have selected 10 submitted papers. Following is the list of accepted papers, sorted by paper title. Notifications to all authors have also been sent by email.
(Note: time is CEST time (GMT + 2))
08:50 - 09:00 | WELCOME |
---|---|
Workshop Chairs | |
09:00 - 10:50 | SESSION 1: SECURITY AND AUTHENTICATION |
09:00 - 09:30 | Chris Hicks, Vasilios Mavroudis, and Jon Crowcroft. SIMple ID: QR Codes for Authentication using Basic Mobile Phones in Developing Countries |
09:30 - 10:00 | Yanmin Zhao, Siu Ming Yiu, Yang Wang, Yu Liu, and Meiqin Wang. A Hierarchical Watermarking Schemes for PRFs from Standard Assumption |
10:00 - 10:30 | Pascal Oser, Felix Engelmann, Stefan Lüders, and Frank Kargl. Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices |
10:30 - 10:50 | Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, and Jelizaveta Vakarjuk. Server-Supported Decryption for Mobile Devices |
10:50 - 11:00 | BREAK |
11:00 - 12:00 | BEST PHD THESIS AWARD |
12:00 - 12:10 | BREAK |
12:10 - 13:00 | SESSION 2: DEEP LEARNING FOR SECURITY AND TRUST |
12:10 - 12:40 | Xin Zhou, and Rakesh Verma. Software Vulnerability Detection via Multimodal Deep Learning |
12:40 - 13:00 | Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, and Antonella Santone. Assessing Deep Learning Prediction in Image-based Malware Detection with Activation Maps |
13:00 - 14:20 | BREAK |
14:20 - 15:40 | SESSION 3: DATA ANALYSIS OF SECURITY AND TRUST |
14:20 - 14:50 | Florimond Houssiau, Vincent Schellekens, Antoine Chatalic, Shreyas Kumar Annamraju, and Yves-Alexandre de Montjoye. M2M: A general method to perform various data analysis tasks from a differentially private sketch |
14:50 - 15:20 | Luca Buccioli, Stefano Cristalli, Edoardo Vignati, Lorenzo Nava, Daniele Badagliacca, Danilo Bruschi, Long Lu, and Andrea Lanzi. JChainz: Automatic Detection of Deserialization Attacks in the Java Environment |
15:20 - 15:40 | Pan Wang, Zeyi Li, Xiaokang Zhou, Chunhua Su, and Weizheng Wang. FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection |
15:40 - 16:00 | BREAK |
16:00 - 16:50 | SESSION 4: TRUST AND SECURITY |
16:00 - 16:30 | Marietjie Botes. The relevance of consent in the digital age: A consideration of its origins and its fit for digital application. |
16:30 - 16:50 | Fangyi Yu, and Miguel Vargas Martin. HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks |
16:50 - 17:00 | CLOSING CEREMONY |