University of Lisbon
State University of Rio de Janeiro
CyberSecurity is a critical issue for the viability of the Internet of Things and Industry 4.0. Security breaches lead to serious impacts on the well-being of the citizen, on the operation of industries, and on the stability of nations. The impact of security breaches in all dimensions of the Society has led more and more countries to understand CyberSecurity as a State issue - and therefore to investigate strategies to address CyberSecurity in a systematic and effective manner.
SecurityStandards Special Session at the IEEE International Workshop on Metrology for Industry 4.0 and IoT aims at discussing how to address CyberSecurity via the use of international standards. SecurityStandards seeks advances in two dimensions, as we discuss next.
Security Requirements. How to establish standards and requirements for equipment, systems and professionals in the area of security. How to assess the risks associated with each field of application. How to define the sectors in which the State must intervene by establishing mandatory safety requirements.
Security Assessment. How to verify compliance with safety requirements by equipment, systems and professionals. Which tests are most effective to characterize the fulfillment of such requirements. Which conformity assessment schemes are best suited to each scenario. How to attest the competence of professionals and laboratories to carry out security assessment activities.
In this sense, SecurityStandards seeks original contributions on the following themes:
Standards and Conformity Assessment:
- Security standards for software and smart devices;
- Conformity assessment methods for cybersecurity;
- Information security management systems standards;
- Risk assessment standards;
- Accreditation of security assessment laboratories.
- Cryptography Standards;
- Software Applications;
- Smart Devices;
- Management Systems;
- Professional Competence;
- Security in new paradigms: Cloud, IoT, Cyber-Physical;
- Privacy and Confidentiality Requirements.
- Side-channel attacks and countermeasures;
- Fault attacks and countermeasures;
- Hardware tampering and tamper-resistance;
- Hardware and software reverse engineering;
- Trusted computing platforms;
- Secure storage devices;
- Cryptographic processors and co-processors;
- True and pseudorandom number generators;
- Physical unclonable functions.
- Water and Sewage;
- Financial System;
- Public Security and Civil Defense.
- Static code analysis;
- Dynamic software analysis;
- Software Testing;
- Code obfuscation;
- Software incorruptibility;
- Software watermarks;
- Software validation;
- Reference datasets.
Alan Oliveira de Sá holds a Ph.D. in Informatics at the Federal University of Rio de Janeiro (2019), received the M.Sc. degree in electronic engineering at the State University of Rio de Janeiro (2015) and graduated in electronic engineering at the Rio de Janeiro Federal Center for Technological Education (2006). He is currently Professor at the Department of Informatics, Faculty of Sciences of the University of Lisbon, and member of the LASIGE - Computer Science and Engineering Research Centre. His research interests include cybersecurity, defense systems, control systems, and intelligent systems.
Lucila Maria de Souza Bento, holds a Ph.D. in Informatics at the Federal University of Rio de Janeiro (2015), a Master's degree in Informatics also from the Federal University of Rio de Janeiro (2012) and is a Technologist in Computer Systems at the Fluminense Federal University (2010). She is currently Professor at the Institute of Mathematics and Statistics of the State University of Rio de Janeiro. Her research interests include algorithms, graph theory, artificial intelligence, and information security.