MobiSecServ 2024 - Ninth International Conference On Mobile And Secure Services, 9-10 November 2024

Papers should be submitted for publication consideration in the IEEE Xplore Digital Library
Part Number: CFP24RAC-ART
ISBN: 979-8-3503-9089-6
IEEE Conference Record #63327

Conference Venue: Miami Beach, Miami, Florida, USA

/

Full and Short Papers deadline: August 14th 2024
Full and Short Papers acceptance/rejection: September 9th 2024

Work in Progress (WIP) Papers deadline: September 23th 2024
Work in Progress (WIP) Papers acceptance/rejection: October 7th 2024

EDAS link: https://edas.info/N32451

Previous Conferences

The Eigthth MobiSecServ was held in November 2023, see the conference website, and the Proceedings of the Eigthth International Conference on Mobile and Secure Services

The Seventh MobiSecServ was held in February 2022 (Virtual Conference), see the conference website, and the Proceedings on IEEE Xplore of the Seventh International Conference on Mobile and Secure Services

The Sixth MobiSecServ was held in February 2020 at Miami Beach, see the conference website, and the Proceedings on IEEE Xplore of the Sixth International Conference on Mobile and Secure Services

The Fifth MobiSecServ was held in March 2019 at Miami Beach, see the conference website, and the Proceedings on IEEE Xplore of the Fourth International Conference on Mobile and Secure Services

The fourth MobiSecServ was held in February 2018 at Miami Beach, see the conference website, and the Proceedings on IEEE Xplore of the Fourth International Conference on Mobile and Secure Services

The third MobiSecServ was held in February 2017 at Miami Beach, see the conference website, and the Proceedings on IEEE Xplore of the Third International Conference on Mobile and Secure Services

The second MobiSecServ was held in February 2016 at the Gainesville University, see the conference website, and the Proceedings on IEEE Xplore of the Second International Conference on Mobile and Secure Services

The first MobiSecServ was held in February 2015 at the Gainesville University, see the conference website, and the Proceedings on IEEE Xplore of the First International Conference on Mobile and Secure Services
A video of MobiSecServ 2015 is available at this link

An early version of MobiSecServ was organized in February 2014 at the Gainesville University, see the workshop website
A video of this previous event is available at this link

About the University of Florida and Telecom Paris

The University of Florida (UF) is a major, public, comprehensive, land-grant, research university. With more than 50,000 students, UF is now one of the largest universities in the nation. UF has a 2,000-acre campus and more than 900 buildings (including 170 with classrooms and laboratories).

Telecom Paris is an international and multidisciplinary French research centre for digital technology, which combines disciplinary expertise at the highest level and a unique capacity for a cross-disciplinary and interdisciplinary approach across all the sectoral areas in direct response to the socio-economic issues of the digital revolution. Research at Telecom ParisTech relies on 172 faculty members, 14 engineers and technicians,  70 post-PhDs, 60 visiting scientists, 285 PhD students, producing an average of 625 international publications and 20 patents. The contractual turnover is about 10.8M€.

Preliminary  Program

Venue: Hilton Cabana Miami Beach
6261 Collins Avenue, Miami Beach, Florida, 33140, USA

Saturday november 9th

9h15-9h50: Welcome
9h50-9h59: Opening

10h00-11h00: keynote1, Osama A. Mohammed
PhD, NAI Fellow, IEEE Fellow,CES Fellow
Distinguished Professor and Director, Energy Systems Research Laboratory
Florida International University, Miami, Florida, USA

Title: Energy Cyber-Physical Systems and their Communication and ControlChallenges for Operational Security in Industrial Systems
This talk describes how the developed solution can protect the power grid and industrial infrastructure from cyber-attacks and build cybersecurity protection into emerging power grid components and services. This includes microgrid and demand-side management components and protecting the network (substations and productivity lines) and data infrastructure (SCADA) to increase the resilience of the energy delivery systems against cyber-attacks. These developments will also help utility security systems manage large amounts of cybersecurity risk data and cybersecurity operations. For these developments to succeed, cybersecurity testbeds and testing methodologies are necessary to evaluate the effectiveness of any proposed security technologies

11h00-12h00: Session 1

Title: "A Complementary Algorithm for Image Cryptosystems to Enhance Entropy"
Authors: Manuel Alejandro Cardona López, Juan Carlos Chimal-Eguía, Víctor Manuel Silva-García and Rolando Flores-Carapia (Instituto Politécnico Nacional, Mexico)

Title: "Eclectic Ethical Decision Making For Autonomous Vehicles"
Authors: Pranay Chowdary Jasti (Texas State University, USA); Henry Griffith (San Antonio College, USA); Heena Rathore (Texas State University, USA)

12h00-13h30: Lunch

13h30-14h30: Keynote2, Dominique Bolignano
Member of the National Academy of Technologies of France (NATF)
President founder of the ProvenRun company
In 2001 he introduced the concept of Trusted Execution Environment (TEE)
He founded the Trusted Logic company in 1999, acquired in 2010 by Gemalto
PHD from Paris 6 University, MS from University of Michigan at Ann Arbor, Ecole Centrale de Lyon (ECL) 1980

Title: "On the importance of increasing cybersecurity but also the level of trust of connected objects and services"
We first try to show why the level of security as well as the level of trust of connected objects and services must be increased. We then give leads, directions and solutions to achieve this goal.

14h30-16h30: Session 2

Title: Leveraging Human Knowledge in Large Language Model for Obfuscation-resisted Phishing URL Detection
Authors: Zhiwei Fu (McGill University, Canada); Sudipta Acharya and Steven Ding (Queen's University, Canada); Yifan Zhu (University of Illinois Urbana-Champaign, Canada); Jia Fu and Chen Xu (Queen's University, Canada)

Title: Assessing Hallucination in Large Language Models under Adversarial Attacks
Authors: Shivangi Tripathi (Texas State University, USA); Henry Griffith (San Antonio College, USA); Heena Rathore (Texas State University, USA)

Title: Adversarial Machine Learning for Privacy-preserving Space Situational Awareness
Authors: Sergio A. Salinas and Neha Chauhan (Wichita State University, USA)

Title: Malware Detection Through Windows System Call Analysis
Authors: Badis Hammi (Institut Polytechnique de Paris, Télécom SudParis, France); Joel Hachem (Rochester University, MI, USA); Ali Rachini (Holy Spirit University of Kaslik, Lebanon); Hassane Aissaoui Mehrez (Telecom Paris, France); Rida Khatoun (Telecom Paris, France)

16h30-16h45: Break

16h45-18h15: Session 3

Title: Comparing iOS and Android Anti-Virus Protection: A Survey
Authors Rebekah Lane and Stephen Andrew Torri (Mississippi State University, USA)

Title: Policy Review of AI and IoMT in the Senior Health Care: Dilemma of Functionality, Security and Privacy
Authors: Adam Zhou (Lycée International de St Germain en Layes, France), Selwyn Piramuthu (University of Florida, USA)

Title: Investigating the performance of Elasticsearch for Large Scale IoT Logging
Authors Imad Mahgoub, Alain Edwards and Ismail Butun (Florida Atlantic University, USA)

19h30-22h00: Social
Lola Restaurant & Grill
5555 Collins Ave, Miami Beach, FL 33140, États-Unis


Sunday November 10th

9h00-9h45: Welcome

9h45-10h45: keynote3 Pat McCoy
Senior Practice Leader , Red Team, Proactive Security, and Security Controls Validation Services
Mandiant Consulting, Google

10h45-12h15: Session 4

Title: Voice Command Drone for Law Enforcement and Emergency Response Authors: Swarnamouli Majumdar (Zenext AI, USA); Sonny Kirkley (Indiana University, USA)

Title: Innovative Open On-Line Secure Elements Providing Secure Storage and Trusted Computing Resources Author: Pascal Urien (Telecom Paris, France)

Title: On the set of significant features to determine phishing attacks Authors: Gaurav Kapoor (University of Arkansas, USA); Wei Zhou (ESCP Europe, France); Selwyn Piramuthu (University of Florida, USA)

12h15-13h45: Lunch & Closing

Important Dates

Full and Short Papers submission deadline: August 19th 2024
Full ans Short Paper acceptance/rejection: September 9th 2024
Full and Short Papers Camera ready: September 23th 2024

Work In progress (WIP) Papers submission deadline: September 19th 2024
Wook In progress  Paper acceptance/rejection: October 7th 2024
Work In Progress Papers Camera ready: October 14th 2024

Scope

The goal of the "Conference on Mobile Applications, Security, and Services" is to explore the challenges, issues and opportunities for academic researchers and industrial innovators.
We are looking for both research papers on new applications and presentations of deployment experiments or new business opportunities.
This conference aims to bring researchers and industrial experts together to discuss the latest frontiers of mobile technology, and also novel applications that have not been thought of before.
In an always-on and everything connected context, mobile applications are more and more interacting with sensitive or personal resources hosted in cloud computing or Internet of Things infrastructure.
As a consequence, security and trust are critical issues, and likely a prerequisite for the deployment of IoT and Cyber Physical System and frameworks.
Digital society offers to researchers and developers a great opportunity for getting quick traction with novel applications.
The broad availability of communication technologies fertilizes research and development of novel applications and can go well beyond these intended applications.

The conference is open but not limited to the following topics:

Proximity communication technologies for mobile (NFC, Bluetooth Low Energy, ZibBee,…)
Secure transactions over proximity communications
Deployment experiments and testing for IoT Platforms
Payments, transport, ticketing, access control, couponing, macro localization (Tags)
Trust for mobile applications and services
Secure Elements, SIM frameworks; SecureSD, Single Wire Protocol (SWP)
Trusted Service Manager (TSM)
Secure over the air (OTA) services
Flash over the air (FOTA)
Hardware Secure Module (HSM)
New mobile secure architectures
Host Card Emulation (HCE)
Trusted Execution Environment (TEE)
New services and business perspectives
New payment applications
Crypto Currencies (Bitcoin, Ethereum)
Secure tokenization technologies
Proximity communication for access control
Automotive industry perspectives
Applications for the consumer industry
Applications for smart cities
Internet Of Things (IoT) new perspectives
Mobile Applications for Social Networks
Deep learning applications trust & security
AI for trust and security

 

MobiSecServ Conference