Organizing Committee

Carol Fung
Virginia Commonwealth University, USA

Emmanouil Vasilomanolakis
Aalborg University, Denmark

Thibault Cholez
Université de Lorraine, France

Steering Committee

Jérôme François
Inria Nancy Grand Est, France

Mohamed Faten Zhani
École de Technologie Supérieure, Canada

Weverton Cordeiro
UFRGS, Brazil

Program Committee

Carol Fung, Virginia Commonwealth University, USA

Christian Hammerschmidt, University of Luxembourg, Luxembourg

Daishi Kondo, Osaka Prefecture University, Japan

Emmanouil Vasilomanolakis, Aalborg University, Denmark

Gerard Wagener, CIRCL, Luxembourg

Hsu-Chun Hsiao, National Taiwan University, Taiwan

Jassim Happa, University of Oxford, UK

Jérôme François, Inria Nancy Grand Est, France

Joerg Daubert, TU Darmstadt, Germany

Mohamed Faten Zhani, Ecole de Technologie Superieure, Canada

Rafael Esteves, IFRS, Brazil

Ramin Sadre, Université Catholique de Louvain, Belgium

Shankar Karuppayah, Universiti Sains Malaysia, Malaysia

Thibault Cholez, Université de Lorraine, France

Weverton Cordeiro, UFRGS, Brazil

Past Editions

DISSECT 2020 Virtual Event

DISSECT 2019 @ Washington, D.C.

DISSECT 2018 @ Taipei, Taiwan

DISSECT 2017 @ Lisbon, Portugal

DISSECT 2016 @ Istanbul, Turkey

DISSECT 2015 @ Ottawa, Canada



6TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)

Co-located with IEEE/IFIP NOMS 2020
Budapest, Hungary


Latest Updates

  • The workshop program is available below.
  • The submission deadline for research papers is Jan. 5th, 2020
  • DISSECT 2020 website is online!


DISSECT 2020 Program

Because of the Covid-19 pandemic, DISSECT will run this year as a virtual conference on the Friday morning, April 24.

9:00am - 11:00am
Technical Session I: long papers
Chair: Thibault Cholez
Location: WebEx link TBD

  • Hardening X.509 Certificate Issuance using Distributed Ledger Technology
    Holger Kinkelin, Richard von Seck, Germany Georg Carle, Technical University of Munich, Germany.
  • Decision Support for Mission-Centric Network Security Management
    Michal Javorník, Jana Komarkova, Luká Sadlek, Martin Husak, Masaryk University, Czech Republic.
  • Clustering IoT Malware based on Binary Similarity
    Márton Bak, Dorottya Papp, Csongor Tamás, Levente Buttyán, Budapest University of Technology and Economics, Hungary.
  • Scan Correlation - Revealing distributed scan campaigns
    Steffen Haas, Florian Wilkens, Mathias Fischer, University Hamburg, Germany.

11:00am - 12:00am
Technical Session II: short papers
Chair: Emmanouil Vasilomanolakis
Location: WebEx link TBD

  • Citrus: Orchestrating Security Mechanisms via Adversarial Deception
    Ryan Mills, Matthew Broadbent, Nicholas Race, Lancaster University, Great Britain.
  • A Privacy-Aware Collaborative DDoS Defense Network
    Carol Fung, Yadunandan Pillai, Virginia Commonwealth University, USA.
  • A framework for automatic firewalls configuration via argumentation reasoning
    Erisa Karafili, University of Southampton, Great Britain ; Fulvio Valenza, Politecnico di Torino, Italy ; Yichen Chen, Imperial College London, Great Britain ; Emil Lupu, Imperial College, Great Britain.


Download the call for papers

The computer networking landscape is subject to a multitude of changes that occur very rapidly. First, paradigm shifts such as fog computing, mobile edge computing, BlockChain, Named Data Networking (NDN) and emerging open networking technologies such as Software-Defined Networking (SDN), Network Function Virtualization (NFV), and Programmable Networks are reshaping the way networks are designed, deployed, and managed. The benefits are manifold, including an unprecedented flexibility for network operation and management, and a favorable environment for delivering innovative network applications and services. However, those paradigm shifts bring a multitude of security challenges that have to be addressed in order to provide secure, trustworthy, and privacy-preserving data communication and network services. Second, large scale and distributed deployment of mobile communications, Internet-of-Things (IoT), Intelligent Transport Systems, smart grids or industrial systems has become real but also emphasizes particular privacy and security issues to be overcome, especially when interconnected with Internet.

Addressing all these challenges may require not only revisiting existing solutions (e.g., for intrusion detection, privacy preserving, and resilience against attacks), but also designing novel security and resilience schemes tailored to the specific design of open networking technologies and infrastructures. New types of attacks and threats also appear against usual services over Internet such as DNS or routing. DISSECT 2020 follows the track of its four previous editions, and will put focus on security issues and challenges arising with the emergence of novel networking technologies and paradigms but also on new threats emerging against former services and technologies, towards a secure cognitive management in a cyber-world. The workshop will shed light on new challenges and present state-of-the-art research on the various security aspects of next-generation networking technologies and service management frameworks.

DISSECT will offer a venue for bringing together students, researchers, and professionals from academia and industry sharing common interest on security challenges related to the design and management of the distributed networks and infrastructures. DISSECT is intended to (1) discussing these challenges as well as future trends on security management, (2) presenting and discussing work-in-progress security-related research on cutting-edge technologies, and (3) strengthening collaboration and research ties among peers.

Topics of Interest

The research community will be invited to contribute with manuscripts describing novel, work-in-progress research on the design of solutions to relevant security issues on a wide variety of next generation networking technologies. The topics of interest include, but are not limited to, the following

  • Secure and resilient design and deployment of open networking technologies
  • Privacy-preserving solutions
  • Security models and threats
  • Security and privacy properties and policies
  • Verification and enforcement of security properties
  • Trust and identity management
  • SDN or NFV-based security functions and services
  • Security of software-defined infrastructures, protocols and interfaces
  • Threat modeling
  • Security measurement and monitoring
  • Industrial Control System security
  • Security and availability management
  • Security for Internet of Things
  • Intrusion detection, resilience, and prevention
  • Honeypots
  • Network forensics and auditing
  • Detection and resilience against large-scale distributed attacks
  • Security of programmable components
  • Security-related business and legal aspects
  • Security challenges and trends for open networking technologies
  • Secure programmable data plane
  • Collaborative intrusion detection
  • Blockchain and distributed consensus
  • Denial of service mitigaton
  • Cloud network security

Date and Location

Budapest, Hungary, April 20th or 24th, 2020

Held co-located with IFIP/IEEE Network Operations and Management Symposium (NOMS)


DISSECT 2020 will take place at Radisson Blue Béke Hotel. Ideally located close to both the business and shopping districts, the hotel is within walking distance of popular attractions like the famous Andrássy Street, State Opera House and Heroes' Square. Further information on workshop venue, accommodation, travel, and more is available on the NOMS 2020 website https://noms2020.ieee-noms.org/hotel-travel

Important Dates

Jan. 5th, 2020 Paper submission Deadline

Jan. 26, 2020 Acceptance Notification

Feb. 16, 2020 Camera-Ready Version Due

Apr. 20 or 24, 2020 Workshop Day

Paper Submission

Paper submissions must present original, unpublished research or experiences. Papers under review elsewhere must not be submitted to the workshop. All contributions must be submitted in PDF format via JEMS.

The submission and acceptance of contributions will be subject to a rigorous peer review process to ensure originality, timeliness, relevance, and readability.

Paper Format

All papers must be limited to 6 pages in an IEEE 2-column style and will be subject to a peer-review process.

The accepted papers will be submitted for publication in the IEEE Xplore Digital Library. Papers will be withdrawn from IEEE Xplore in case the authors do not present their paper at the workshop.

Distinguished papers will be invited to submit an extended version in the International Journal on Network Management (IJNM).

Poster Info

Papers accepted as posters must be limited to 4 pages in an IEEE 2-column style. The accepted posters will also be submitted for publication in the IEEE Xplore Digital Library. Posters will be withdrawn from IEEE Xplore in case the authors do not present them at the workshop.