MobiSecServ 2019 - Fifth International Conference On Mobile And Secure Services, 2-3 March 2019

Conference Venue: Miami Beach, FL 33141, USA

Papers will be submitted for publication consideration in the IEEE Xplore Digital Library
IEEE Conference Record #: 45340
IEEE Catalog Number: CFP19RAC-ART
ISBN: 978-1-5386-7700-1
https://conferences.ieee.org/conferences_events/conferences/conferencedetails/45340

Full and Short Papers deadline: November 12th 2018 November 26th 2018

Full and Short Papers camera ready deadline: January 21st 2019

The submission link for EDAS is the following:
https://edas.info/newPaper.php?c=25450

Work In Progress Papers deadline: January 7th 2019

Work In Progress Papers camera ready deadline: February 4th 2019

The submission link for EDAS is the following:
https://edas.info/newPaper.php?c=25450&track=94570

Previous Conferences

The fourth MobiSecServ was held in February 2018 at Miami Beach, see the conference website, and the Proceedings of the Fourth International Conference on Mobile and Secure Services

The third MobiSecServ was held in February 2017 at Miami Beach, see the conference website, and the Proceedings of the Third International Conference on Mobile and Secure Services

The second MobiSecServ was held in February 2016 at the Gainesville University, see the conference website, and the Proceedings of the Second International Conference on Mobile and Secure Services

The first MobiSecServ was held in February 2015 at the Gainesville University, see the conference website, and the Proceedings of the First International Conference on Mobile and Secure Services
A video of MobiSecServ 2015 is available at this link

An early version of MobiSecServ was organized in February 2014 at the Gainesville University, see the workshop website
A video of this previous event is available at this link

About the University of Florida and Telecom ParisTech

The University of Florida (UF) is a major, public, comprehensive, land-grant, research university. With more than 50,000 students, UF is now one of the largest universities in the nation. UF has a 2,000-acre campus and more than 900 buildings (including 170 with classrooms and laboratories).

Telecom ParisTech is an international and multidisciplinary French research centre for digital technology, which combines disciplinary expertise at the highest level and a unique capacity for a cross-disciplinary and interdisciplinary approach across all the sectoral areas in direct response to the socio-economic issues of the digital revolution. Research at Telecom ParisTech relies on 172 faculty members, 14 engineers and technicians,  70 post-PhDs, 60 visiting scientists, 285 PhD students, producing an average of 625 international publications and 20 patents. The contractual turnover is about 10.8M€.

Preliminary Program


Conference location
Grand Beach Hotel, 7th floor, 4835 Collins Avenue, Miami Beach, FL 33140


Saturday March 2

8h30: Breakfast
9h15: Opening

9h30-10h30: Keynote

EMV Payment System and Cryptocurrencies
Nour EL MADHOUN, Orange Labs, Caen, France

10h30-12h30: Session 1

Social privacy score through vulnerability contagion process
- Aghiles DJOUDI, LIP6, Sorbonne University, Paris, France
- Guy Pujolle, LIP6, Sorbonne University, Paris, France

Future Security of Smart Speaker and IoT Smart Home Devices
- Shawn Godwin, Dept. of Computer Science Florida Polytechnic University Lakeland, USA
- Brett Glendenning, Dept. of Computer Science Florida Polytechnic University Lakeland, USA
- Kanwalinderjit Gagneja, Dept. of Computer Science Florida Polytechnic University Lakeland, USA

The Revelation of Insider Attacks Two-Step Intrusion Revelation Algorithm
- Harsh Dholakia, Electrical Engineering and Computer Science Texas A&M University- Kingsville, TX, USA
- Phanindra Sidhanthi, Electrical Engineering and Computer Science Texas A&M University- Kingsville, TX, USA
- Gahangir Hossain, Electrical Engineering and Computer Science Texas A&M University- Kingsville, TX, USA

A Novel Moving Target Defense Technique to Secure Communication Links in Software-Defined Networks
- Abdulrahman Almohaimeed, EECS Department Wichita State University Wichita, Kansas, USA
- Abu Asaduzzaman, EECS Department Wichita State University Wichita, Kansas, USA

12h30-14h00: Lunch

14h00-16h00: Session 2

When not to Offload? Analyzing Offload Feasibility in Mobile Cloud Computing
- Abhishek Kulkarni, Electrical Engineering and Computer Science Texas A&M UniversityKingsville, TX, USA
- Ajith Paul, Electrical Engineering and Computer Science Texas A&M UniversityKingsville, TX, USA
- Harsh Dholakia, Electrical Engineering and Computer Science Texas A&M University Kingsville, TX, USA
- Gahangir Hossain, Electrical Engineering and Computer Science Texas A&M University Kingsville, TX, USA

Vulnerability Finding and Firmware Association in Power Grid
- Yuyan Sun, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
- Limin Sun, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
- Zhiqiang Shi, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
- Wenhao Yu, Institute of Information Communication, China Electric Power Research Institute, Beijing, China
- Huan Ying, Institute of Information Communication, China Electric Power Research Institute, Beijing, China

BYOD-Insure: A Security Assessment Model for Enterprise BYOD
- Melva M. Ratchford, College of Business and Information Systems, Dakota State University, Madison, SD, USA
- Yong Wang, Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, SD, USA

Reference Architectures for Security-by-design IoT:Comparative Study
- Valentin VALLOIS, Beamap, LIPADE, Sopra Steria Group & Paris Descartes, Paris, France
- Fouad GUENANE, Beamap, Sopra Steria Group, Paris, France
- Ahmed MEHAOUA, LIPADE, Paris Descartes, Paris, France

16h00-16h30: Break

16h30-18h00: Session 3

Automatic Pedestrians Detection System Based of Features Level Extraction
- Reda Shbib, International University of Beirut, Beirut, Lebanon
- Ali Rachini, Lebanese University, Beirut, Lebanon

IoT Device Discovery for Incidence Response
- Caleb Riggs, Dept. of Computer Science Florida Polytechnic University Lakeland, FL, USA
- Jesal Patel, Dept. of Computer Science Florida Polytechnic University Lakeland, FL, USA
- Kanwalinderjit Gagneja, Dept. of Computer Science Florida Polytechnic University Lakeland, FL, USA

Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
- Abdulrahman Almohaimeed, EECS Department Wichita State University Wichita, Kansas, USA
- Abu Asaduzzaman, EECS Department Wichita State University Wichita, Kansas, USA

20h00: Social
Free for all registered participants.
Lola Restaurant & Grill
5555 Collins Ave, Miami Beach, FL 33140, États-Unis
http://www.lolarestaurantgrill.com/
social

Sunday March 3

9h00: Breakfast

9h45-10h45 Tutorial

Wallets and Crypto Terminals for Blockchain; introducing the Big Bang paradigm
Pascal Urien, Telecom ParisTech, LTCI Laboratory, Paris, France

10h45-12h15: Session 4

Integrity Probe: Using Programmer as Root Of Trust For Bare Metal Blockchain Crypto Terminal
- Pascal Urien, Telecom Paristech, Paris, France

Privacy and Security analysis of cryptocurrency mobile applications
- Ashish Rajendra Sa,i Lero University of Limerick Limerick, Ireland
- Jim Buckley, Lero University of Limerick Limerick, Ireland
- Andrew Le Gear, Horizon Globex Ireland DAC Nexus Center, University of Limerick Limerick, Ireland

Using reputation as a coin to bet on information items distributed in a Smart City
- Luis Silva, Instituto de Telecomunicacoes / University of Aveiro, Portugal
- Carlos Senna, Instituto de Telecomunicacoes, Portugal
- Andre Zuquete, DETI / IEETA / IT, University of Aveiro, Portugal

12h15: Closing

12h30: Lunch


Important Dates

November 12th 2018 November 26th 2018 Full and Short Papers submission deadline

December 17th 2018 Full/short Papers Acceptance/Rejection notification

January 7th 2019 WIP Papers submission deadline

January 21th 2019 WIP Papers Acceptance/Rejection notification

Scope

The goal of the "Conference on Mobile Applications, Security, and Services" is to explore the challenges, issues and opportunities both for academic researchers and industrial innovators.

We are looking for both research papers on new applications and presentations of deployment experiments or new business opportunities.

This conference aims to bring researchers and industrial experts together to discuss the latest frontiers of mobile technology and also novel applications that have not been thought of before.

In an always-on and everything connected context, mobile applications are more and more interacting with sensitive or personal resources hosted in cloud computing or Internet of Things infrastructure. As a consequence, security and trust are critical issues, and likely a prerequisite for the deployment of IoT frameworks.

Among other, the NFC technology enables communication in close proximity. With NFC mobiles surfacing the market so quickly, mobile operating systems are prepared for support with dedicated frameworks. This offers researchers and developers a great opportunity for getting quick traction with novel applications.

So far, the main close proximity enabled services deal with payment, access control, or ticketing. Commercial applications today mainly target mobile payments, or eTickets managed by transportation companies. The broad availability of communication technologies fertilizes research and development of novel applications and can go well beyond these intended applications.

The conference welcomes contributions addressing (but not limited to) the following topics:

Proximity communication technologies for mobile (NFC, Bluetooth Low Energy, ZibBee,…), secure transactions over proximity communications;

Trust for mobile applications and services, Secure Elements, SIM frameworks; SecureSD, (including Google Vault) platforms; Single Wire Protocol (SWP); Trusted Service Manager (TSM); Secure over the air (OTA) services, Flash over the air (FOTA)Hardware Secure Module (HSM)

New mobile secure architectures. Host Card Emulation (HCE). Trusted Execution Environment (TEE).

New services and business perspectives New payment applications; Apple Pay, Android Pay, Samsung Pay Services; Crypto Currencies (Bitcoin, Ethereum); secure tokenisation technologies; proximity communication for access control; automotive industry perspectives; applications for the consumer industry; applications for smart cities; Internet Of Things (IoT) new perspectives;

Mobile Applications for Social Networks.

Deployment experimentsand testing for IoT Platforms, payments, transport, ticketing, access control, couponing, macro localization (Tags).

 

MobiSecServ Conference