تجاوز إلى المحتوى الرئيسي
User Image

Abdelouahid Derhab

Associate Professor

Faculty member

علوم الحاسب والمعلومات
Address: Office No. 4, Center of Excellence in Information Assurance (CoEIA), Building No. 31, King Saud University
إعلان

International workshop on Mobile Computing Security (MCS)

International workshop on Mobile Computing Security (MCS)
In conjunction with The 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015) 
September 27-30, 2015, Berlin, Germany

 
General Co-Chairs
Abdelouahid Derhab,King Saud University
Email: abderhab@ksu.edu.sa
Mohamed Guerroumi, USTHB university
Email: guerroumi@gmail.com
Kashif Saleem, King Saud University
Email: ksaleem@ksu.edu.sa
 
Scope
Technological advances in recent years have provided significant increases in the computing power and networking capabilities of mobile devices. For example, many smartphones and personal digital assistants (PDAs) currently employ powerful processors and have Internet broadband connectivity that rival that of desktop computers and laptops.  For these reasons, mobile devices are being used for many applications including social networking, and business applications like: online banking. Because these devices are ubiquitous, they are high-value targets for cyber criminals that seek financial gains.
 
 Mobile devices are still suffering from many security challenges. The security policy offered by the mobile platforms is loose because it allows developers and users to install any application. As a result, we witnessed an increasing number of attacks and malware targeting mobile platforms like Android and iOS, and which caused serious issues for the user. For example, the malware can integrate compromised mobile devices into a botnet, it can also send SMS messages to premium numbers without the user’s knowledge, and hence the user’s bill is charged. In addition, the users are increasingly using their devices to handle their private information. However, the devices provide insufficient data security and data protection.
 
This workshop aims at gathering researchers and practitioners working on mobile computing security to share ideas and new research innovations in the field.
 
 
Topics
 
Topics of the workshop consist of all aspects related to mobile computing security. They include but are not limited to:
 

  • Smartphone security.
  • Vulnerability analysis for smartphones.
  • Data protection and privacy.
  • Security and privacy of operating systems, middleware, and applications.
  • Evaluation of mobile security solutions.
  • Mobile malware collection, statistics, and analysis;
  • Mobile malware detection.
  • Bots on mobile devices.
  • Mobile botnet detection.
  • Mobile botnet design and countermeasures.
  • Reverse engineering and automated analysis of mobile malware.
  • Traffic monitoring and detection algorithms for mobile platforms.
  • Cloud security and privacy solutions for mobile devices.
  • Mobile device forensics.
  • Mobile services and social networking security.
  • Security for smart payment applications.
  • Test beds and case studies for secure mobile platforms.
  • Formal models and architecture design for secure mobile platforms.
  • Virtualization solutions for mobile security.
  • Web browser security on mobile devices.

 
TPC members
TBA
 
Important Dates
Submission Deadline: March 30, 2015
Author Notification: May 15, 2015
Final Manuscript: June 10, 2015

Paper Submission
Authors are requested to submit papers reporting original research results according to the below requirements:

Authors are requested to submit their papers electronically in PDF format to the chairs: 
​Abdelouahid Derhab: abderhab@ksu.edu.sa
Mohamed Guerroumi: guerroumi@gmail.com 
Kashif Saleem: ksaleem@ksu.edu.sa
 
Publication
All accepted papers will be published by Elsevier Science in the open-access Procedia Computer Science series on-line. Procedia Computer Sciences is hosted on www.Elsevier.com and on Elsevier content platform ScienceDirect (www.sciencedirect.com), and will be freely available worldwide. All papers in Procedia will be indexed by Scopus (www.scopus.com) and by Thomson Reuters' Conference Proceeding Citation Index (http://thomsonreuters.com/conference-proceedings-citation-index/). The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP ((http://dblp.uni-trier.de/)).

مزيد من إعلان
announcement

Dataset used in the paper "Two-hop Monitoring Mechanism based on Relaxed Flow Conservation…

announcement

The 2nd International Workshop  Reliability of eHealth Information Systems (ReHIS 2015…

announcement

International workshop on Mobile Computing Security (MCS) In…