The International Workshop on Secure Internet of Things 2018 (SIoT 2018) will be held in conjunction with the European Symposium on Research in Computer Security (ESORICS 2018)in Barcelona, Spain, at the Universitat Politecnica de Catalunya - BarcelonaTech, on 6 September 2018.

SIoT is a community where interested stakeholders, from academia and industry, can present their original work on providing a secure environment for connecting systems in an Internet-specific structure. The wide spread of mobile and embedded devices, able to connect to a network and share information, requires a careful look at the security risks taken by end users. In this context, the workshop will focus on contributions related to the security of mesh and machine-to-machine networks, secure software stacks running on ubiquitous network nodes, and algorithms used to provide secure end-to-end communication between nodes.


The SIOT workshop will have a joint program with the PADG Workshop. 08:45 - 09:10 Opening Remarks 
09:00 - 11:00 Session 1 - PADG 

  • Self-Generating Policies for Machine Learning in Coalition Environments 
    Seraphin Calo
  • AGENP: An ASGrammar-based GENerative Policy Framework 
    Alessandra Russo
  • Value of Information: Quantification and Application to Coalition Machine Learning 
    Geeth de Mel
  • Can N-version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? 
    Elisa Bertino

11:15 - 12:55 Session 2 - PADG 

  • Simulating user activity for assessing effect of sampling on DB activity monitoring anomaly detection 
    Hagit Grushka
  • FADa-CPS - Faults and Attacks Discrimination in Cyber Physical Systems 
    Leonardo Querzoni
  • Towards Enabling Trusted Artificial Intelligence via Blockchain 
    Donna Dillenberger

14:00 - 15:00 Keynote Speaker PADG - Florian Kerschbaum 
15:00 - 15:30 Keynote Speaker SIOT - Miroslaw Kutylowski (presenting joint work with Piotr Syga nad Moti Yung): Watchdogs for IOT 

  • One of critical security challenges that emerge for large scale systems based on cheap devices is the threat of a poor and/or malicious implementation of protocols. Such a weakness may lead to leaking secrets from IoT devices -- in particular the secrets that are fundamental for security claims of the system. Unfortunately, the security flaw discovered in RSA implementation of Estonian personal ID cards proves that this is not a hypothetical situation. In our talk we concentrate on protocols based on symmetric cryptography. We present an approach based on a watchdog concept – a man-in-the-middle device that does not know the secrets of communicating parties, but aims to destroy any covert channel leaking secret information (regardless whether the channel is intentional or not). We do not propose to redesign all the existing protocols. Instead, we focus on upgrading cryptographic primitives used by the cryptographic protocols so that they become controllable by the watchdog.

15:45 - 17:15 Session 3 - SIOT 

  • Optimal Deployments of Defense Mechanisms for the Internet of Things 
    Mengmeng Ge, Charles A. Kamhoua, Jin-Hee Cho and Dong Seong Kim
  • Guidelines for the Choice of a Wireless Secure Positioning and Communication System 
    Baptiste Pestourie, Vincent Beroulle and Nicolas Fourty
  • PADS: Practical Attestation for Highly Dynamic Swarm Topologies 
    Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani and Silvio Ranise

17:15 - 17:30 Closing Remarks 

Call for paper

Important Dates

Draft paper submission deadline:2018-06-27

Topics of submission

The focus of this workshop is to create a secure environment for connecting systems in an Internet-specific structure. These may include, but are not limited to, the following topics:

  • Threat Models in Internet of Things
  • Attack Strategies for Internet of Things
  • Security Architectures
  • Secure Mobile Applications
  • Secure Mobility Management
  • Intrusion and Malware Detection
  • Security in Wireless Sensor Networks
  • Reliable Interactions with Network Services
  • System and Data Integrity
  • Scalability and Robustness for Internet of Things
  • Identity Management in Internet of Things
  • Trustworthiness in Internet of Things
  • Secure Operating Systems
  • Privacy in Internet of Things
  • Adaptive Security in Internet of Things


Leave a message


Contact information

  • Mr.Mihai CHIROIU

Sponsored By

  • Spain Section
    Tech Lounge