Call for Papers

DeSECSyS Factsheet

Important Dates

  • Submission deadline: June 21st, 2020 July 5th, 2020
  • Notification to Authors: July 26th, 2020 August 2nd, 2020
  • Preparation of the videos: August 24, 2020
  • Pre-proceedings versions: August 24, 2020
  • Camera-ready versions: To be announced after the completion of the workshop


Information security and privacy have already been established as some of the most crucial aspects of technology especially in a world that is migrating to digital applications by the day. This has inevitably led to the emergence of technologies that support the safety and dependability of the ever-increasing sensitive data handled by these applications. Additionally, besides these technologies which target security by their design, there are other technologies, such as machine learning, which could potentially be applied to security in innovative schemes.

The goal of the DeSECSys workshop is to foster collaboration and discussion among cyber-security researchers and practitioners to discuss the various applications, opportunities and possible shortcomings of these technologies and their integration. Effectively we aim to produce a collection of state-of-the-art research about emerging security technologies, their applications, their shortcomings and their verification with a focus on their uncompromised, in terms of security, safety and dependability, integration. Industry experience reports and empirical studies are also welcome.


Topics of interest include but are not limited to:

  • Emerging security and privacy technologies and solutions
  • Next-generation trustworthy computing security solutions and attacks (e.g., TPMs, TEEs, SGX, SE), and their impact
  • Utilization of novel artificial intelligence and machine learning based technologies in the context of security
  • Blockchain / Smart contracts for auditability and accountability
  • Fog Computing
  • Runtime risk assessment
  • Vulnerability Analysis
  • Formal Verification/Validation of design
  • Advanced cryptographic techniques (e.g., homomorphic encryption, secure multi-party computation and differential privacy)
  • Impact of quantum computing on cyber-security (not limited to cryptography)
  • Novel attacks and protection solutions in mobile, IoT and Cloud
  • Standardization of cyber security and trust techniques
  • Novel schemes for Trust and Reputation in Distributed Environments
  • Policy languages for advanced Access and Usage Control
  • Consensus mechanisms
  • Security in 5G networks

Submission Guidelines

Submitted papers must not substantially overlap with papers that have been published or have been submitted, in parallel, to any other venue with formally published proceedings. The workshop proceedings will be published online by Springer (more information would become available later).

All submissions must follow the original LNCS format from the time they are submitted. We invite the following types of papers:

Regular paper submissions should be at most 18 pages, including the bibliography but excluding well-marked appendices. Committee members are not required to read the appendices, so the paper should be intelligible without them. Regular papers should describe original work that is not previously published or concurrently submitted elsewhere.

The workshop will also consider short research paper submissions of up to 8 pages, using the same template. Research papers aim at fostering discussion and collaboration by presenting preliminary research activities, work in progress and/or industrial innovations. Research papers may summarize research results published elsewhere or outline new emerging ideas.

Submissions must be anonymous, and authors should refer to their previous work in the third-person. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions are to be made via the following web site You will be requested to upload the file of your paper (in PDF format only). Submissions not meeting these guidelines risk rejection without consideration of their merits. Each accepted paper must be presented by an author, who will have to register by the early-bird registration deadline.

Submission are to be made on Easychair.

Programme for DeSECSys

TIME (UK time) 10am = 11:00 CEST

TimeTitle & AuthorsPresentation
[10:00-10:15]Welcome and Instruction
[10:15-11:00]Keynote TalkTBA
[11:00-12:30]Session 1: Trustworthy Computing Session Chair: Christoforos Dadoyan, Ionian University11:00-11:45 “ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Modules (TPMs)”: Antonio Munoz (University of Malaga), Aristeidis Farao (Neurosoft), Jordy Ryan Casas (University of Malaga), Christos Xenakis (University of Piraeus) [Abstract Presentation]:

11:45-12:30 “CloudVaults: Integrating Trust Extensions into System Integrity Verification for Cloud-based Environment”: Benjamin Larsen (DTU), Heini Bergsson (DTU), Thanassis Giannetsos (DTU) [Abstract Presentation]:
[12:30-13:30]Lunch break
[13:30-14:15]Keynote TalkTBA
[14:15-15:45]Session 2: Vulnerability Management and Security Analysis Session Chair: Nikos Koutroumpouchos, University of Piraeus14:15-15:00 “Making Picnic Feasible for Embedded Devices”: Johannes Winkler (Infineon) “Sandboxing the Cyberspace for Cybersecurity Education and Learning”: Stylianos Karagiannis (Ionian University), Emmanouil Magkos (Ionian University), Christoforos Dadoyan (Ionian University), Luis Landeiro Ribeiro (PDM&FC) [Abstract Presentation]:
[15:45-16:00]Coffee break
[16:00-16:50]Cyber Security EU-funded Projects16:00-16:10 “ASTRID – AddreSsing Threats for virtuallseD Services”16:10-16:20 “FutureTPM: Future Proofing the Connected World – A Quantum-Resistant Trusted Platform Module”16:20-16:30 “INCOGNITO – Identity Verification with Privacy-Preserving Credentials for Anonymous Access To Online Services”16:30-16:40 “SECONDO – A Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era “16:40-16:50 “CUREX – Secure and private Health Data Exchange“
[16:50-17:00]Closing Remarks


Pre-proceeding papers

1st-DESECSYS paper 1

1st-DESECSYS paper 2

1st-DESECSYS paper 3

1st-DESECSYS paper 4

Keynote Talk


General Chairs:

  • Liqun Chen (University of Surrey, UK)
  • Christos Xenakis (University of Piraeus, GR)

Program Co-Chairs:

  • Thanassis Giannetsos (Technical University of Denmark, DK)
  • Chrisoforos Ntantogian (Ionian University, GR)
  • Panagiotis Gouvas (UBITECH Limited, GR)

Program Committee:

  • Linzhi Jiang (University of Surrey)
  • Ioannis Krontiris (Huwaei Technologies, Germany)
  • David Oswald (University of Birmingham)
  • Matteo Repetto (CNR)
  • Riccardo Sisto (Politecnico di Torino)
  • Emmanouil Magkos (Ionian University)
  • Aggeliki Tsohou (Ionian University)
  • Fulvio Valenza (Politecnico di Torino)
  • Stefan Covaci (Technical University of Berlin)
  • Georgios Karopoulos (European Commission Joint Research Center (JRC), Cyber & Digital Citizens)
  • Antonis Michalas (University ot Tampere in Finland)
  • Marios Anagnostopoulos (Norwegian University of Science and technology NTNU)
  • Jose Moreira (University of Birminghan)
  • Weizhi Meng (Technical _University of Denmark)


Send Contact Mail


Based on careful consideration of attendees’ health and safety, the organizers of the 25th European Symposium on Research in Computer Security (ESORICS ’20) have decided that this years’ conference and all its associated workshops will take place as a virtual event. Therefore, we look forward to meeting you virtually at the 1st DeSECSyS workshop. Please visit the main conference web page for the latest details on the virtual event and its registration:

 Sponsors:- FutureTPM (GA: 779391)
– INCOGNITO (GA:824015)
– SECONDO (GA:832997)
– ASTRID (GA: 786922) and
– CUREX (GA: 826404) projects.
All projects have received funding from the European Union’s Horizon 2020 research and innovation programme under the above-mentioned grant agreement numbers.


1st Workshop on Dependability and Safety Emerging Cloud and Fog Systems (DESECSYS)