8th International Conference on Software Security (ICSS 2022)

Friday, Dec 23, 2022 at 9:00 AM to Saturday, Dec 24, 2022 at 6:00 PM AEDT

Sydney, Australia, Sydney, Australia, Sydney, Australia, Sydney, Australia, Sydney, Australia, Sydney, Australia, Australia

Register Now
Days
Hours
Minutes
Seconds

Registration

Sale ended

Free Registration Partial Approval - Free

Enter your discount code

  • Fee
  • Total amount

Friday, Dec 23, 2022 at 9:00 AM to Saturday, Dec 24, 2022 at 6:00 PM AEDT

Sydney, Australia, Sydney, Australia, Sydney, Australia, Sydney, Australia, Sydney, Australia, Australia.

 

December 23 ~ 24, 2022, Sydney, Australia

https://cndc2022.org/icss/index

Scope

8th International Conference on Software Security (ICSS 2022) is traditionally, security in software has been thought to be something that can be easily added on as a patch, post-development, and sometimes even after the deployment of the software. According to the US-Computer Emergency Readiness Team (US-CERT), “most successful attacks result from targeting and exploiting known, non-patched software vulnerabilities and insecure software configurations, many of which are introduced during design and code.” Hence, it is imperative that secure design, coding and testing principles as well as deployment and maintenance are thoroughly embedded in the software development lifecycle. At the same time, software security is very inter-disciplinary, as software is being developed for a variety of applications – web, Internet, database, single and distributed computer systems, etc.

Topics of interest

·         Software Security Attacks and Solutions

·         Static and Dynamic Code Analysis for Software Security

·         Validation, Verification and Testing for Software Security

·         Virtualization and Cloud Computing for Software Security

·         Cryptography for Software Security

·         Firewalls and Intrusion Detection/Prevention Systems for Software Security

·         Software Penetration and Protection

·         Measurements and Metrics for Software Security

·         Secure Software Development Lifecycle

·         Principles and Models for Secure Software Design

·         Secure Coding Standards and Their Implementation

·         Software Security for Wireless and Mobile Applications

·         Software Security for Database Systems

·         Software Security for Web and Internet Applications

·         Security of Open Source Software

·         Software Threats and Vulnerabilities

·         Risk Analysis for Software Security

Paper Submission

Authors are invited to submit papers through the conference Submission System by October 15, 2022. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from ICSS 2022, after further revisions, will be published in the special issues of the following journals

·         International Journal of Computer Networks & Communications (IJCNC) – Scopus, WJCI, ERA Indexed

·         International Journal of Network Security & Its Applications (IJNSA) – ERA, WJCI Indexed

·         International Journal On Cryptography And Information Security (IJCIS)

·         International Journal of Security, Privacy and Trust Management (IJSPTM)

·         International Journal of Software Engineering & Applications (IJSEA)

·         Information Technology in Industry (ITII)

Important Date

 Submission Deadline : October 15, 2022

Authors Notification : November 26, 2022

Registration & Camera-Ready Paper Due : December 03, 2022

Contact Us

Here’s where you can reach us : icss@cndc2022.org or icssconfe@yahoo.com

 

Ronan R

8th International Conference on Software Security (ICSS 2022) is traditionally, security in software has been thought to be something that can be easily added on as a patch, post-development, and sometimes even after the deployment of the software. According to the US-Computer Emergency Readiness Team (US-CERT), “most successful attacks result from targeting and exploiting known, non-patched software vulnerabilities and insecure software configurations, many of which are introduced during design and code.” Hence, it is imperative that secure design, coding and testing principles as well as deployment and maintenance are thoroughly embedded in the software development lifecycle. At the same time, software security is very inter-disciplinary, as software is being developed for a variety of applications – web, Internet, database, single and distributed computer systems, etc.

Contact the Organizer View other events