August 21-24, 2019
한국정보보호학회

The WISA Workshop




The 2019 WISA Workshop
(WISA-Workshop 2019)
 
In conjunction with WISA 2019
 
 
August 21, 2019
MAISON GLAD, Jeju Island, Korea

 
 
Overview
 
The first WISA workshop, WISA-Workshop 2019, will be held in conjunction with WISA 2019.
 
WISA-Workshop 2019 aims to bring together the academic and industry working on different aspects, exchange ideas, and explore new research directions for addressing the latest challenges in information security applications. As a workshop of WISA 2019, it is also mainly intended to showcase the state-of-art researches and technologies including preliminary results of work in progress which are closely related to systems and network security including all other technical and practical aspects of security applications.

 
 
Important Dates

 
  • - Acceptance notification: July 30, 2019 (23:59 UTC-12)
  • - Proceedings version deadline: August 8, 2019 (23:59 UTC-12)
 
 
Publication


The accepted papers will be published by the online proceedings, which will be available in the workshop.
Because this publication is not official, each paper's copyright is owned by its authors.
In other words, each paper can be freely published in other conferences or journals.
 
After the workshop, all the papers will be invited to be revised and extended for the following special issues 
or the fast tracks (the invitation is decided based on each paper's topic, and does not guarantee the final acceptance):

   
Submission Guidelines


Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to journals or any other conferences that have proceedings. The paper should be limited to at least 8 pages in total and prepared according to the "Authors Instruction for LNCS"
Available at http://www.springer.de/comp/lncs/authors.html.
 
The submission of contributions to WISA 2019 must occur through 
 wisa4cmr@isyou.info
 
 
Topics

 
  • - Analysis of network and security protocols
  • - Anonymity and censorship-resistant technologies
  • - Applications of cryptographic techniques
  • - Authentication and authorization
  • - Automated tools for source code/binary analysis
  • - Automobile security
  • - Botnet defense
  • - Blockchain security
  • - Critical infrastructure security
  • - Denial-of-service attacks and countermeasures
  • - Digital Forensics
  • - Embedded systems security
  • - Exploit techniques and automation
  • - Hardware and physical security
  • - HCI security and privacy
  • - Intrusion detection and prevention
  • - Malware analysis
  • - Mobile/wireless/cellular system security
  • - Network-based attacks
  • - Network infrastructure security
  • - Operating system security
  • - Practical cryptanalysis (hardware, DRM, etc.)
  • - Security policy
  • - Side channel attacks and countermeasures
  • - Storage and file systems security
  • - Techniques for developing secure systems
  • - Trustworthy computing
  • - Trusted execution environments
  • - Unmanned System Security for Vehicle/Drone/Ship Systems
  • - Vulnerability research
  • - Web security
 
 
Workshop Chair
 
Dr. Prof. Jeong Hyun Yi (Soongsil University, Korea)
 
 
Venue

Maison Glad Jeju (http://maison-glad.hotelsinjeju.com/en/)
80, Noyeon-ro, Jeju-si, Jeju-do, Korea
 

 
Contact

All questions about submissions should be emailed to kiisc@ kiisc.or.kr