STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2021 is the seventeenth workshop in this series and will be held virtually at Darmstadt, Germany, in conjunction with the 26th European Symposium On Research in Computer Security (ESORICS 2021). The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:
|Paper Submission||Author Notification||Camera Ready|
All deadlines are at 11.59PM / 23:59 American Samoa Time
Submissions are to be made to the submission web site at: https://easychair.org/conferences/?conf=stm2021. For the second round, papers must be received by the deadline of August 22th (11:59 p.m. American Samoa time). At least one author of accepted papers must guarantee that they will present their paper at the workshop.
All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of accepted papers). All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages in the LNCS format, excluding the bibliography and well-marked appendices, and at most 20 pages in total.
A paper submitted to STM 2021 cannot be under review for any other conference or journal during the time it is being considered for STM 2021. Furthermore, after you submit to STM 2021, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before or after submission of the paper to STM 2021, we will reject your paper without review and will also notify the other conference/journal. This restriction applies to identical as well as to substantially similar papers.
As in previous years, the proceedings will be published online by Springer in the Lecture Notes in Computer Science (LNCS) series (past STM proceedings are available here). As such, the final version of an accepted paper must be in the format required for publication in the LNCS series. Authors should consult Springer's authors' guidelines and use their proceedings templates. Springer encourages authors to include their ORCIDs (https://goo.gl/hbsa4D) in their papers. Submissions not meeting these guidelines risk rejection without consideration of their merits.
In addition, the corresponding author of each accepted paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.
A best paper award was granted in this workshop. This award was given to the best paper submitted to the workshop, based on the relevance, originality, and technical quality.
The award went to Korbinian Spielvogel, Henrich C. Pöhls and Joachim Posegga for their paper TLS beyond the broker: Enforcing fine-grained security and trust in publish/subscribe environments for IoT.
This year for STM 2021, we have selected 10 of the 26 submitted papers. Following is the list of accepted papers, sorted by paper title. Notifications to all authors have also been sent by email.
(Note: time is CEST time)
|14:15 - 14:30||WELCOME|
|14:15 - 14:30||Workshop chairs: Rodrigo Roman and Jianying Zhou|
|14:30 - 15:15||SESSION 1: APPLIED CRYPTOGRAPHY|
|14:30 - 14:55||Masayuki Fukumitsu and Shingo Hasegawa. An Aggregate Signature with Pre-Communication in the Plain Public Key Model|
|14:55 - 15:15||Yongge Wang. The Adversary Capabilities In Practical Byzantine Fault Tolerance|
|15:15 - 16:15||SESSION 2: PRIVACY|
|15:15 - 15:35||Yifei Chen, Meng Li, Shuli Zheng, Chhagan Lal and Mauro Conti. Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services|
|14:35 - 15:55||Peeter Laud. Efficient permutation protocol for MPC in the head|
|14:55 - 16:15||Alireza Kavousi, Javad Mohajeri and Mahmoud Salmasizadeh. Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF|
|16:15 - 16:30||BREAK|
|16:30 - 17:10||SESSION 3: FORMAL METHODS FOR SECURITY AND TRUST|
|16:30 - 16:50||Robert Abela, Christian Colombo, Peter Malo, Peter Sýs, Tomáš Fabšič, Ondrej Gallo, Viliam Hromada and Mark Vella. Secure Implementation of a Quantum-Future GAKE Protocol|
|16:50 - 17:10||Laouen Fernet and Sebastian Mödersheim. Deciding a Fragment of (alpha, beta)-Privacy|
|17:10 - 18:10||SESSION 4: SYSTEMS SECURITY|
|17:10 - 17:30||Korbinian Spielvogel, Henrich C. Pöhls and Joachim Posegga. TLS beyond the broker: Enforcing fine-grained security and trust in publish/subscribe environments for IoT|
|17:30 - 17:50||Georgios Fotiadis, Jose Moreira, Thanassis Giannetsos, Liqun Chen, Peter B. Roenne, Mark D. Ryan and Peter Y. A. Ryan. Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols|
|17:50 - 18:10||Joud Khoury, Zachary Ratliff and Michael Atighetchi. Towards Decentralized and Provably Secure Cross-Domain Solutions|
|18:10 - 18:30||BREAK|
|18:30 - 19:25||STM PhD AWARD TALK|
|18:30 - 19:25||Jo Van Bulk. Microarchitectural Side-Channel Attacks for Privileged Software Adversaries|
|19:25 - 19:30||CLOSING, STM BEST PAPER AWARD|