Visible to the public SoS Literature SurveyConflict Detection Enabled

Potential Science of Security paper sources for calendar year 2018

To suggest additional sources, please email BSCPC@cps-vo.org.

Conference Dates

Conference/Journal Title and URL

Award papers and notes

2/18-21/2018

Internet Society Network and Distributed System Security Symposium 2018 (NDSS)
https://www.ndss-symposium.org/ndss2018/programme/

Cisco Network Security Best Paper award

Distinguished paper awards (2)

4/16-17/2018

Principles of Security and Trust (POST) 7th Intl conf. (part of ETAPS)
https://link.springer.com/book/10.1007/978-3-319-89722-6

No awards found. Papers freely available from Springer.

4/29-5/32018 Eurocrypt
https://eurocrypt.iacr.org/2018/program.html
https://eurocrypt.iacr.org/2018/proceedings.html
No awards found.

5/21-23/2018

IEEE Symposium on Securty & Privacy
https://www.ieee-security.org/TC/SP2018/

Distinguished Paper Award (Google)

  • DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice

Distinguised Paper Award (Facebook)

  • On Enforcing the Digital Immunity of a Large Humanitarian Organization

Distingushed Practical Paper Award (Baidu)

  • FPGA-Based Remote Power Side-Channel Attacks

6/25-6/28/2018

IEEE/IFIP Dependable Systems and Networks Conference (DSN)
https://dsn2018.uni.lu/main-track-sessions/

Best paper award candidates listed in program:

  • Wren: Nonblocking Reads in a Partitioned Transactional Causally Consistent Data Store
  • Code-Dependent and Architecture-Dependent Reliability Behaviors
  • Modeling Soft Error Propagation in Programs

6/26-27/2018

Int. Symp. On Engineering Secure Software and Systems
https://distrinet.cs.kuleuven.be/events/essos/2018/programme.html

No awards found

7/9-12/2018

IEEE Computer Security Foundations Symposium
http://www.cs.ox.ac.uk/conferences/csf2018/accepted.html

3 Distinguished paper awards:

  • Secure compilation of side-channel countermeasures: the case of cryptographic "constant-time"
  • Types for Information Flow Control: Labeling Granularity and Semantic Models
  • Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting

8/12-17/18

USENIX Security
https://www.usenix.org/conference/usenixsecurity18/technical-sessions

Paper awards:
5 Distinguished paper awards:

SOUPS (at USENIX Security)]
https://www.usenix.org/conference/soups2018/technical-sessions

Distinguished Paper award

  • "I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach

Honorabe Mention

  • When is a Tree Really a Truck? Exploring Mental Models of Encryption

Privacy award

  • "Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia

9/3-7/2018

ESORICS (European Symposium on Research In Computer Security)
https://esorics2018.upc.edu/program.do
https://link.springer.com/book/10.1007/978-3-319-99073-6
https://link.springer.com/book/10.1007/978-3-319-98989-1

Best paper award:

  • "Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs"
    pages 449-469

I think these awards are to individuals, not papers:

  • ESORICS 2018 Outstanding Research Award: Pierangela Samarati
  • ESORICS 2018 Outstanding Contribution Award: Einar Arthur Snekkenes

9/30-10/2/2018

IEEE Cybersecurity Development (SecDev) 2018
https://secdev.ieee.org/2018/accepted-papers/

Best research paper award:

Best BP (best practice) award:

8/18-23/2018 Crypto 2018
https://crypto.iacr.org/2018/program.html
No awards found

8/28-31/2018

New Security Paradigms Workshop
https://www.nspw.org/2018/accepted
<proceedings not yet in ACM Digital Library as of 12/21/18>

No awards found

10/15-19/18

ACM Computer and Communications Security Conference (ACM CCS)
https://www.sigsac.org/ccs/CCS2018/accepted/papers/

Two Best Paper awards:

  • LEMNA: Explaining Deep Learning based Security Applications
  • Toward Detecting Violations of Differential Privacy

12/3-7/2018

Annual Computer Security Applications Conf (ACSAC)
https://www.acsac.org/2018/openconf/modules/request.php?module=oc_program&action=program.php

Two Distinguished Paper awards:

  • Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection - Distinguished Paper Award
  • Tracking Users across the Web via TLS Session Resumption

Runner up papers:

PERIODICALS

IEEE Transactions on Dependable and Secure Computing
Available in IEEE Digital Library:
http://www.computer.org/csdl/trans/tq/index.html
2018 is Volume 15

ACM Transactions on Privacy and Security (TOPS)
Available in ACM digital library:
http://dl.acm.org/citation.cfm?id=J1547
2018 is Volume 21, Issue 1 through Vol 22, Issue 1

Journal of Computer Security (IOS Press)
Available at: http://www.iospress.nl/journal/journal-of-computer-security/
2018 is Volume 26

Computers & Security (Elsevier)
http://www.journals.elsevier.com/computers-and-security/recent-articles/
2018 publication year includes Volumes (= issues) 72-80

IEEE Security & Privacy Magazine
https://www.computer.org/csdl/mags/sp/2018/index.html
2018 is Volume 16

Journals a bit farther afield but may have relevant articles:

IEEE Transactions on Information Forensics and Security
https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10206
2018 is Vol. 13

IEEE Transactions on Software Engineering
https://www.computer.org/csdl/trans/ts/2018/index.html
2018 is Vol. 44

ACM Computing Surveys
https://dl.acm.org/pub.cfm?id=J204
2018 is Vol. 50, Issue 6 - Vol 51, Issue 5

Journal of the ACM
https://dl.acm.org/pub.cfm?id=J401
2018 is Vol 65 issue 1 - Vol. 66, Issue 1
Area editor for crypto and security