logo

Organizing Committee

Weverton Cordeiro
UFRGS, Brazil

Jérôme François
Inria Nancy Grand Est, France

Emmanouil Vasilomanolakis
TU Darmstadt, Germany

Hsu-Chun Hsiao
National Taiwan University, Taiwan


Steering Committee

Carol Fung
Virginia Commonwealth University, USA

Mohamed Faten Zhani
École de Technologie Supérieure, Canada


Program Committee

Chen-Mou Cheng, National Taiwan University, Taiwan

Thibault Cholez, Université de Lorraine / Inria, France

Weverton Cordeiro, UFRGS, Brazil

Rafael Esteves, Federal Institute of Rio Grande do Sul, Brazil

Carol Fung, VCU, USA

Luciano Gaspary, UFRGS, Brazil

Christian Hammerschmidt, University of Luxembourg, Luxembourg

Jassim Happa, University of Oxford, UK

Tiffany Hyun-Jin Kim, HRL Laboratories, USA

Shankar Karuppayah, Universiti Sains Malaysia, Malaysia

Chi-Yu Li, National Chiao Tung University, Taiwan

Qi Li, Tsinghua Univerisity, China

Giovane Moura, SIDN Labs, The Netherlands

Jéferson Nobre, UNISINOS, Brazil

Minho Park, Soongsil University, Korea

Ramin Sadre, Université Catholique de Louvain, Belgium

Jair Santanna, University of Twente, The Netherlands

Ricardo Schmidt, University of Passo Fundo, Brazil

Pawel Szalachowski, Singapore University of Technology and Design, Singapore

Emmanouil Vasilomanolakis, Technische Universität Darmstadt, Germany

Cynthia Wagner, Restena Foundation, Luxembourg

Qian Wang, Wuhan University, China

Mohamed Faten Zhani, École de Technologie Supérieure, Canada


Past Editions

DISSECT 2020 Virtual Event

DISSECT 2019 @ Washington, D.C.

DISSECT 2018 @ Taipei, Taiwan

DISSECT 2017 @ Lisbon, Portugal

DISSECT 2016 @ Istanbul, Turkey

DISSECT 2015 @ Ottawa, Canada

 

IEEE/IFIP DISSECT 2018

4TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)

Secure Cognitive Management in a Cyber World

Co-located with IEEE/IFIP NOMS 2018
Taipei, Taiwan

 

Latest Updates

  • We are pleased to announce that Guillaume Doyen, Associate Professor @ Troyes University of Technology (France), will deliver a keynote during DISSECT 2018! Dr. Doyen will present a feedback experience gained by considering NFV as an enabler for Named Data Networking (NDN). He will first present a monitoring plane for NDN security, and then demonstrate to what extent Management and Orchestration (MANO) components of NFV can be a support to mitigate these attacks. For further information, please click here!
  • We are also pleased to announce that Professor Shih-Kun Huang (National Chiao Tung University, Taiwan) will deliver a keynote during DISSECT! On his keynote, Dr. Huang will discuss about Bug as a Backdoor, software crashes and how symbolic failure models can be derived from them to produce software attacks automatically. For further information, please click here!

Older News

  • The preliminary workshop program is online!
  • The registration and submission deadlines were extended to January 26th
  • Our workshop will be held on April 23rd (Monday)
  • DISSECT 2018 website is online!

 

Download the call for papers

The computer networking landscape is subject to a multitude of changes that occur very rapidly. First, paradigm shifts such as fog computing, mobile edge computing, Named Data Networking (NDN) and emerging open networking technologies such as Software-Defined Networking (SDN), Network Function Virtualization (NFV), and Programmable Networks are reshaping the way networks are designed, deployed, and managed. The benefits are manifold, including an unprecedented flexibility for network operation and management, and a favorable environment for delivering innovative network applications and services. However, those paradigm shifts bring a multitude of security challenges that have to be addressed in order to provide secure, trustworthy, and privacy-preserving data communication and network services. Second, large scale and distributed deployment of mobile communications, Internet-of-Things (IoT), Intelligent Transport Systems, smart grids or industrial systems has become real but also emphasizes particular privacy and security issues to be overcome, especially when interconnected with Internet.

Addressing all these challenges may require not only revisiting existing solutions (e.g., for intrusion detection, privacy preserving, and resilience against attacks), but also designing novel security and resilience schemes tailored to the specific design of open networking technologies and infrastructures. New types of attacks and threats also appear against usual services over Internet such as DNS or routing. DISSECT 2018 follows the track of its four previous editions, and will put focus on security issues and challenges arising with the emergence of novel networking technologies and paradigms but also on new threats emerging against former services and technologies, towards a secure cognitive management in a cyber-world. The workshop will shed light on new challenges and present state-of-the-art research on the various security aspects of next-generation networking technologies and service management frameworks.

DISSECT will offer a venue for bringing together students, researchers, and professionals from academia and industry sharing common interest on security challenges related to the design and management of the distributed networks and infrastructures. DISSECT is intended to (1) discussing these challenges as well as future trends on security management, (2) presenting and discussing work-in-progress security-related research on cutting-edge technologies, and (3) strengthening collaboration and research ties among peers.

Topics of Interest

The industry and academia research community will be invited to contribute with manuscripts describing novel, work-in-progress research on the design of solutions to relevant security issues on a wide variety of next generation networking technologies. The topics of interest of the workshop include, but are not limited to

  • Secure and resilient design and deployment of open networking technologies
  • Privacy-preserving solutions
  • Security models and threats
  • Security and privacy properties and policies
  • Verification and enforcement of security properties
  • Trust and identity management
  • NFV-based security functions and services
  • Security of software-defined infrastructures, protocols and interfaces
  • Threat modeling
  • Security measurement and monitoring
  • Industrial Control System security
  • Security and availability management
  • Security for Internet of Things
  • Intrusion detection, tolerance, and prevention
  • Network forensics and auditing
  • Detection and resilience against large-scale distributed attacks
  • Security of programmable components
  • Security-related business and legal aspects
  • Security challenges and trends for open networking technologies
  • Secure programmable data plane
  • Collaborative intrusion detection
  • Security for 5G technology
  • Blockchain and distributed consensus
 

Date and Location

Taipei, Taiwan, April 23rd, 2018

Held in conjunction with IEEE/IFIP Network Operations and Management Symposium (NOMS)

Venue

To be held at the NTUH International Convention Center. Located in the most elite Zhong Zheng District where professionals and intellectuals gather, NTUH (National Taiwan University Hospital) International Convention Center is a precious stone that shines on the historical campus of NTUH amid all other government buildings in its surroundings. Further information on workshop venue, accommodation, travel, and more is available on the NOMS 2018 website http://noms2018.ieee-noms.org/

Important Dates

5th Jan 2018 26th Jan 2017 Paper submission Deadline (EXTENDED)

28th Feb 2018 Acceptance Notification

9th Mar 2018 Camera-Ready Version Due

23 April 2018 Workshop Day

Paper Submission

Paper submissions must present original, unpublished research or experiences. Papers under review elsewhere must not be submitted to the workshop.

All contributions must be submitted in PDF format via JEMS https://submissoes.sbc.org.br/noms2018_dissect.

The submission and acceptance of contributions will be subject to a rigorous peer review process to ensure originality, timeliness, relevance, and readability.

Paper Format

All papers must be limited to 6 pages in an IEEE 2-column style and will be subject to a peer-review process.

The accepted papers will be submitted for publication in the IEEE Xplore Digital Library. Papers will be withdrawn from IEEE Xplore in case the authors do not present their paper at the workshop.

Distinguished papers will be invited to extend an extended version for a Special Issue of the Int'l Journal on Network Management (IJNM) on Security for Emerging Open Networking Technologies.

Poster Info

Papers accepted as posters must be limited to 4 pages in an IEEE 2-column style. The accepted posters will also be submitted for publication in the IEEE Xplore Digital Library. Posters will be withdrawn from IEEE Xplore in case the authors do not present them at the workshop.