The 2024 7th IEEE Conference on Dependable and Secure Computing

Tokyo, Japan | 6-8 November, 2024

The 2024 7th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2024)

Tokyo, Japan | 6-8 November, 2024

Overview

The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevance to dependability and security concerns, are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems.

Recent Updates

  • Oct. 18, 2024: The registration page is updated. Online registration will close on October 30. Participants who have not completed their registration by the deadline will be able to register and make payment on-site at the conference venue.
  • Oct. 15, 2024: The keynote page is now available. See Keynote page.
  • Oct. 8, 2024: The program page is now available. See Program page.
  • Sep. 26, 2024: [Poster] Participation and Registration information for poster authors has been added to the Call for Posters page.
  • Sep. 11, 2024: [Workshop] The submission site of workshop papers is now open. See Workshop page.
  • Sep. 4, 2024: [Workshop] Call for Workshop Paper page is now open. See Workshop page.
  • Sep. 4, 2024: The registration site is now open. See Registration page.

Important Dates

  • Paper (Main Track) submission due: July 18, 2024 July 30, 2024 (Extended, firmed deadline)
  • Paper (Experience and Practice Track) submission due: Aug 22, 2024 Aug 29, 2024 (Extended, firmed deadline)
  • Notification of paper acceptance: September 12, 2024
  • Poster submission due: September 19, 2024 September 25, 2024 (Extended, firmed deadline)
  • Workshop paper submission due: September 19, 2024
  • Notification of Poster / Workshop paper acceptance: September 26, 2024
  • Early Bird registration due: September 30, 2024
  • Camera ready: October 4, 2024
  • Conference Date: November 6-8, 2024

The time zone of Important Dates (except for Conference Date) is AoE (Anywhere on the Earth) 23:59:59.

Main Track: Regular Papers

The DSC conference accepts regular research papers that have no more than 8 pages. Topics of interest include, but are not limited to:

  • Advanced Persistent Threat (APT)
  • Security Big Data Analysis
  • Botnet and Intrusion Detection
  • Cryptographic Methods and Toolkits
  • Cyber attacks
  • Data/Information Reliability
  • Database Security and Privacy
  • Embedded Systems and IoT Devices
  • Experimentation, Measurement, and Assessment
  • Mobile and Cloud Computing
  • Software vulnerabilities
  • Malware analysis
  • SDN and NFV
  • Security and Privacy for AI
  • Hardware security and reliability
  • Fault-Tolerant Architectures and Designs
  • Industrial Design Experiences
  • Security Circuits, Designs, and Detection
  • Security and Dependability of Critical Systems

Experience and Practice Track

The DSC conference will also include a submission category for experience and practice papers on new findings in the aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design know-how or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper for peer-review. Topics of interest include, but are not limited to:

  • Attacks on Information Systems and/or Digital Information Storage
  • CSIRTs, Incident Analysis, and Response
  • Honeypots/Honeynets
  • Malware Analysis and Reversing
  • Mobile Communications Security and Vulnerabilities
  • Newly discovered vulnerabilities in software and hardware
  • Offensive (and Counter-Offensive) Information Technology
  • Reverse Engineering, Forensics, and Anti-Forensics
  • Spyware, Phishing and Distributed Attacks
  • Data Security and Privacy
  • Attacks on model robustness
  • Blockchain and Distributed Ledger Technologies

Submission Instructions

Papers must be written in English and should not exceed 8 pages for regular papers and 2 pages for experience and practice papers, inclusive of figures, tables, references and appendix using IEEE Conference Proceedings Manuscripts style (two-columns, single-spaced, 10 fonts). The materials presented in the papers should not be published or under submission/review elsewhere. All submitted papers will be peer-reviewed. Accepted papers will appear in the conference proceedings and will be eligible for submission to the IEEE Xplore Digital Library. At least one of the authors of any accepted paper is requested to register the paper at the conference.

Paper templates can be downloaded from IEEE website.

All submissions will be made online via their respective web forms.

Anonymous Submission Guidelines

The review process will be anonymous. Papers must be submitted in a format that ensures anonymity:

  • Do not include author names or affiliations on the submitted paper.
  • Review all figures and appendices to ensure no affiliations are accidentally included.
  • Refer to your previous work in the third person, as if it was authored by someone else.
  • You may include links to websites containing source code, tools, or other supplementary materials, but ensure neither the link nor the website reveal the authors’ identities (e.g., by including names or affiliations).

Papers that are not properly anonymized may be rejected without review.

Ethical Considerations for Paper Submissions

Authors are expected to carefully consider and address any ethical issues associated with their research. This includes potential harms, vulnerabilities, and the treatment of human subjects. Failure to address these concerns adequately may result in rejection of the submission.

  • Vulnerability Disclosure: If your research identifies vulnerabilities (e.g., software, hardware, or other systems), you must take steps to avoid harm to affected users. Responsible disclosure to vendors and stakeholders is expected, typically within a 45 to 90-day window prior to publication. Detail the steps taken or planned to address these vulnerabilities in your submission.
  • Human Subjects Research: For research involving human subjects or data derived from them, discuss the measures taken to ensure ethical treatment and respect for participants. If your research received approval or waiver from an ethics review board (IRB), please include this information in your submission. If dealing with personal identifiable information (PII) or sensitive data, outline the steps to mitigate potential harms.
  • General Ethical Concerns: All submissions should include a clear statement on how ethical and legal concerns were addressed. This is crucial for papers with significant ethical implications or high-impact findings.

Organization

General Chairs

  • Koji Nakao, NICT / Yokohama National University
  • Hiroaki Kikuchi, Meiji University

Program Chairs (Main Track)

  • Katsunari Yoshioka, Yokohama National University
  • Takahiro Kasama, NICT

Program Chair (Experience and Practice Track)

  • Ryoichi Isawa, NICT

Program Committee

  • Akira Kanaoka, Toho University
  • Akira Yamada, Kobe University
  • Atsuko Miyaji, Osaka University
  • Ayumu Kubota, KDDI Research Inc.
  • Chansu Han, NICT
  • Gregory Blanc, Telecom SudParis
  • Hiroki Kuzuno, Kobe University
  • Jungsuk Song, KISTI
  • Junichi Sakamoto, AIST
  • Jun’ichi Takeuchi, Kyushu University
  • Kazumasa Omote, University of Tsukuba
  • Kazuomi Oishi Shizuoka Institute of Science and Technology
  • Kazuto Ogawa, NICT
  • Keisuke Kito, Mitsubishi Electric
  • Kosuke Murakami, KDDI Research, Inc.
  • Koichi Mouri, Ritsumeikan University
  • Mamoru Mimura, National Defense Academy
  • Masahiko Kato, Juntendo University
  • Masaki Hashimoto, Kagawa University
  • Masaki Kubo, NICT
  • Masaya Sato, Okayama Prefectual University
  • Noboru Murata, Waseda University
  • Nobuhiro Kobayashi, University of Nagasaki
  • Rui Tanabe, Juntendo University
  • Ryoichi Isawa, NICT
  • Seiichi Ozawa, Kobe University
  • Shigeyoshi Shima, University of Nagasaki
  • Shota Fujii, Hitachi, Ltd.
  • Takayuki Sasaki, Yokohama National University
  • Takeshi Sugawara, The University of Electro-Communications
  • Tomohiro Morikawa, University of Hyogo
  • Toshihiro Yamauchi, Okayama University
  • Yim Minn Pa Pa, Yokohama National University
  • Yoshiaki Shiraishi, Kobe University
  • Yuta Takata, Deloitte Tohmatsu Cyber LLC

Publicity Chair

  • Daisuke Makita, NICT

Publication Chair

  • Rui Tanabe, Juntendo University

Workshop Chairs

  • Akira Fujita, NICT
  • Angelos Stavrou, Virginia Tech
  • Ramesh Ramadoss, MultiTech Ventures LLC

Poster Session Chair

  • Chansu Han, NICT

Local Arrangements Chair

  • Daisuke Inoue, NICT

Treasurer

  • Ryoichi Isawa, NICT

Sponsors & Supporter

Platinum Sponsors

Gold Sponsors

Silver Sponsor

Financial Sponsor

Technical Sponsor

NICT

Workshop Supporter

IEEE Blockchain