News

  • The workshop proceedings will be published in LNCS Proceedings

About

  • Proceeding Download link: Springer
  • STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2022 is the eighteenth workshop in this series and will be held at Copenhagen Denmark, in conjunction with the 27th European Symposium On Research in Computer Security (ESORICS 2022). The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs.

    Topics of interest include, but are not limited to:

    • Access control
    • Anonymity
    • Applied cryptography
    • Authentication
    • Complex systems security
    • Data and application security
    • Data protection
    • Data/system integrity
    • Digital rights management
    • Economics of security and privacy
    • Formal methods for security and trust
    • Identity management
    • Legal and ethical issues
    • Mobile security
    • Networked systems security
    • Operating systems security
    • Privacy
    • Blockchain-based Trust
    • Security and trust metrics
    • Security and trust policies
    • Security and trust management architectures
    • Security and trust for big data
    • Security and trust in cloud environments
    • Security and trust in content delivery networks
    • Security and trust in crowdsourcing
    • Security and trust in grid computing
    • Security and trust in the Internet of Things
    • Security and trust in pervasive computing
    • Security and trust in services
    • Security and trust in social networks
    • Social implications of security and trust
    • Trust assessment and negotiation
    • Trust in mobile code
    • Trust models
    • Trust management policies
    • Trust and reputation systems
    • Trusted platforms
    • Trustworthy systems and user devices

    Important dates

    Paper Submission Author Notification Camera Ready
    August 6, 2022 (Firm! AoE) August 29, 2022 (Extended, AoE) September 25, 2022

    All deadlines are at 11.59PM / 23:59 American Samoa Time

    Please note that authors have to submit their final files by 25 September, but can still update the files till 5 October (AoE). Then all files will be submitted to Srpinger.

    Instructions for Paper Submission

    Submissions are to be made to the submission web site at: https://easychair.org/conferences/?conf=stm2022. At least one author of accepted papers must guarantee that they will present their paper at the workshop.

    All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of accepted papers). All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages in the LNCS format, excluding the bibliography and well-marked appendices, and at most 20 pages in total.

    A paper submitted to STM 2022 cannot be under review for any other conference or journal during the time it is being considered for STM 2022. Furthermore, after you submit to STM 2022, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before or after submission of the paper to STM 2022, we will reject your paper without review and will also notify the other conference/journal. This restriction applies to identical as well as to substantially similar papers.

    As in previous years, the proceedings will be published online by Springer in the Lecture Notes in Computer Science (LNCS) series (past STM proceedings are available here). As such, the final version of an accepted paper must be in the format required for publication in the LNCS series. Authors should consult Springer's authors' guidelines and use their proceedings templates. Springer encourages authors to include their ORCIDs (https://goo.gl/hbsa4D) in their papers. Submissions not meeting these guidelines risk rejection without consideration of their merits.

    In addition, the corresponding author of each accepted paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.

    Best Paper Award

    A best paper award was granted in this workshop. This award was given to the best paper submitted to the workshop, based on the relevance, originality, and technical quality.


    Organizing Committees

    Programme Co-chairs

    • Gabriele Lenzini, University of Luxembourg, Luxembourg
    • Weizhi Meng, Technical University of Denmark (DTU), Denmark

    Programme Committee

    • Cristina Alcaraz, University of Malaga, Spain
    • Chuadhry Mujeeb Ahmed, University of Strathclyde, UK
    • Mauro Conti, University of Padua, Italy
    • Sabrina De Capitani di Vimercati, Universita degli Studi di Milano, Italy
    • Said Daoudagh, ISTI-CNR, Pisa, Italy
    • Jinguang Han, Southeast University, China
    • Marko Holbl, University of Maribor, Slovenia
    • Chenglu Jin, Centrum Wiskunde & Informatica, The Netherlands
    • Panayiotis Kotzanikolaou, University of Piraeus, Greece
    • Wenjuan Li, Hong Kong Polytechnic University, Hong Kong SAR
    • Giovanni Livraga, Universita degli Studi di Milano, Italy
    • Bo Luo, University of Kansas, USA
    • Xiapu Luo, Hong Kong Polytechnic University, Hong Kong SAR
    • Sjouke Mauw, University of Luxembourg, Luxembourg
    • Fabio Martinelli, IIT-CNR, Italy
    • Daisuke Mashima, ADSC, Singapore
    • Olga Gadyatskaya, LIACS, Leiden University, The Netherlands
    • Dieter Gollmann, TUHH, Germany
    • Davy Preuveneers, KU Leuven, Belgium
    • Joachim Posegga, University of Passau, Germany
    • Qingni Shen, Peking University, China
    • Chunhua Su, University of Aizu, Japan
    • Yangguang Tian, University of Surrey, UK
    • Zheng Yang, Southwest University, China
    • Chia-Mu Yu, National Chiao Tung University, Taiwan

    Publicity Chair


    Program

    List of Accepted Papers

    This year for STM 2022, we have selected 10 submitted papers. Following is the list of accepted papers, sorted by paper title. Notifications to all authors have also been sent by email.

    1. Chris Hicks, Vasilios Mayroudis, and Jon Crowcroft. SIMple ID: QR Codes for Authentication using Basic Mobile Phones in Developing Countries.
    2. Yanmin Zhao, Siu Ming Yiu, Yang Wang, Yu Liu, and Meiqin Wang. A Hierarchical Watermarking Schemes for PRFs from Standard Assumption
    3. Pascal Oser, Felix Engelmann, Stefan Lüders, and Frank Kargl. Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices
    4. Xin Zhou, and Rakesh Verma. Software Vulnerability Detection via Multimodal Deep Learning
    5. Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, and Antonella Santone. Assessing Deep Learning Prediction in Image-based Malware Detection with Activation Maps
    6. Florimond Houssiau, Vincent Schellekens, Antoine Chatalic, Shreyas Kumar Annamraju, and Yves-Alexandre de Montjoye. M2M: A general method to perform various data analysis tasks from a differentially private sketch
    7. Luca Buccioli, Stefano Cristalli, Edoardo Vignati, Lorenzo Nava, Daniele Badagliacca, Danilo Bruschi, Long Lu, and Andrea Lanzi. JChainz: Automatic Detection of Deserialization Attacks in the Java Environment
    8. Pan Wang, Zeyi Li, Xiaokang Zhou, Chunhua Su, and Weizheng Wang. FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection
    9. Marietjie Botes. The relevance of consent in the digital age: A consideration of its origins and its fit for digital application.
    10. Fangyi Yu, and Miguel Vargas Martin. HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks

    STM 2022 Workshop Program

    Thursday, September 29th 2022

    (Note: time is CEST time (GMT + 2))

    08:50 - 09:00 WELCOME
    Workshop Chairs
    09:00 - 10:50 SESSION 1: SECURITY AND AUTHENTICATION
    09:00 - 09:30 Chris Hicks, Vasilios Mavroudis, and Jon Crowcroft. SIMple ID: QR Codes for Authentication using Basic Mobile Phones in Developing Countries
    09:30 - 10:00 Yanmin Zhao, Siu Ming Yiu, Yang Wang, Yu Liu, and Meiqin Wang. A Hierarchical Watermarking Schemes for PRFs from Standard Assumption
    10:00 - 10:30 Pascal Oser, Felix Engelmann, Stefan Lüders, and Frank Kargl. Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices
    10:30 - 10:50 Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, and Jelizaveta Vakarjuk. Server-Supported Decryption for Mobile Devices
    10:50 - 11:00 BREAK
    11:00 - 12:00 BEST PHD THESIS AWARD
    12:00 - 12:10 BREAK
    12:10 - 13:00 SESSION 2: DEEP LEARNING FOR SECURITY AND TRUST
    12:10 - 12:40 Xin Zhou, and Rakesh Verma. Software Vulnerability Detection via Multimodal Deep Learning
    12:40 - 13:00 Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, and Antonella Santone. Assessing Deep Learning Prediction in Image-based Malware Detection with Activation Maps
    13:00 - 14:20 BREAK
    14:20 - 15:40 SESSION 3: DATA ANALYSIS OF SECURITY AND TRUST
    14:20 - 14:50 Florimond Houssiau, Vincent Schellekens, Antoine Chatalic, Shreyas Kumar Annamraju, and Yves-Alexandre de Montjoye. M2M: A general method to perform various data analysis tasks from a differentially private sketch
    14:50 - 15:20 Luca Buccioli, Stefano Cristalli, Edoardo Vignati, Lorenzo Nava, Daniele Badagliacca, Danilo Bruschi, Long Lu, and Andrea Lanzi. JChainz: Automatic Detection of Deserialization Attacks in the Java Environment
    15:20 - 15:40 Pan Wang, Zeyi Li, Xiaokang Zhou, Chunhua Su, and Weizheng Wang. FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection
    15:40 - 16:00 BREAK
    16:00 - 16:50 SESSION 4: TRUST AND SECURITY
    16:00 - 16:30 Marietjie Botes. The relevance of consent in the digital age: A consideration of its origins and its fit for digital application.
    16:30 - 16:50 Fangyi Yu, and Miguel Vargas Martin. HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks
    16:50 - 17:00 CLOSING CEREMONY