The 8th International Workshop on Security and Forensics of IoT

to be held in conjunction with the 19th International Conference on Availability, Reliability and Security

July 30August 02, 2024

Internet-of-Things (IoT) devices are now ubiquously and increasingly prevalent in our society, as the backbone of interconnected smart homes, smart hospitals, smart cities, smart wearables and other smart environments. IoT leverage embedded technologies equipped with sensors and communication capabilities; they are able to broadcast their presence to other objects and interact with them using a plethora of protocols and technologies. It was estimated by Gartner and Statista that a number of devices between 20.4 and 31 billion was in use in 2020, which may rise to 75 billion devices by 2025. Along with usability, efficiency, and cost savings benefits, increasingly, the use of IoT pose security risks and raise challenges to digital forensics. The constantly growing IoT botnets, such as Dark Nexus, emphasize the need to focus on these aspects. This workshop aims to bring together researchers and practitioners from both communitiessecurity and forensicsto discuss problems and solutions regarding IoT.

Topics of interest include, but are not limited to

Adaptive security in IoT
Challenges related to IoT forensics and security
Coexistence of different security protocols in IoT
Covert communication in IoT
Cryptographic protocols and algorithms for IoT
Cybercrimes exploiting IoT
Data analysis of IoT for forensic investigation
Data ownership and attack simulation methods for IoT networks and devices
Identification/preservation of evidence for digital forensic investigations involving IoT
Intrusion and malware detection/prevention technologies for IoT

Legal, ethical and human aspects of security and forensics of IoT
Models for risk identification and assessment in IoT networks
Privacy and trust in IoT
Security and forensic aspects in cyber physical IoT systems
Security applications and management of IoT
Security architectures and protection mechanisms for IoT
Security in Wireless Sensor Networks applied to IoT
Threat models and attack strategies for IoT
Applications of Artificial Intelligence in security and forensics in IoT
Adversarial attacks using IoT

Important Dates

Submission Deadline April 29, 2024
Author Notification May 29, 2024
Proceedings Version June 18, 2024
Conference July 30 – August 02, 2024
Best Paper Award

The best paper award will be sponsored by the Institute of Cyber Security for Society (iCSS), University of Kent, UK. The decision criterion will consider both the paper quality and the oral presentation quality.

Workshop Chairs

Virginia N. L. Franqueira
University of Kent, UK

Aleksandra Mileva
Goce Delcev University, MK

Ville Leppänen
University of Turku, FI

Pedro Inácio
Universidade da Beira Interior, PT

Mauro Conti
University of Padua, IT

Raul H. C. Lopes
Brunel University London, JISC & CMS/CERN, UK

Asma Adnane
Loughborough University, UK

Xiaojun Zhai
University of Essex, UK

Program Committee

Enrico Bassetti, TU Delft, NL
Simona Bernardi, Universidad de Zaragoza, ES
Alessandro Brighente, University of Padua, IT
Luca Caviglione, National Research Council, IT
Tiago Cruz, University of Coimbra, PT
Fabio de Gaspari, Sapienza University of Rome, IT
Vesna Dimitrova, Ss. Cyril and Methodius University, MK
James Hardy, University of Derby, UK
José Luis Hernández-Ramos, Universidad de Murcia, ES
Vinod P. Nair, University of Padua, IT
Musa Samaila, National Space Research and Development Agency, NG
Simona Samardjiska, Radboud University, NL
Henrique Santos, University of Minho, PT
Bruno Silva, Universidade da Beira Interior, PT
Tiago Simões, Universidade da Beira Interior, PT
Amit Singh, University of Essex, UK
Tomasz Szydlo, Newcastle University, UK
Seppo Virtanen, University of Turku, FI
Katinka Wolter, Freie Universität Berlin, DE
Weiqiang Yi, University of Essex, UK
Chia-Mu Yu, National Chung Hsing University, TW
Wangyang Yu, Shaanxi Normal University, CN

Submission Guidelines

The submission guidelines can be found at (6-8 pages, a maximum of 10 pages is tolerated). Double blind review: All papers submitted to EasyChair should be anonymized (no names or affiliations of authors should be visible in the paper) with no obvious self-references. Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the workshop. Proceedings will be published by ACM.