The 2018 IEEE Conference on Dependable and Secure Computing (DSC 2018)

Country: Taiwan

City: Kaohsiung

Abstr. due: 12.05.2018

Dates: 10.12.18 — 13.12.18

Area Of Sciences: Physics and math; Technical sciences;

Organizing comittee e-mail:,

Organizers: IEEE


The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems. The scope of DSC includes, but is not limited to, the following topics.
Regular Track: Computer Systems, Networks and Software/Hardware

    Advanced Persistent Threat (APT)
    Network Attack and Defense Techniques
    Botnet and Intrusion Detection
    Cryptographic Methods and Toolkits
    Cyber attacks
    Software Vulnerabilities and Security
    Database Security and Privacy
    Embedded Systems and IoT Devices
    Mobile and Cloud Computing security
    AI and Big Data Analysis for security
    Malware Mutation
    Deep Learning for Attack and Defense
    Block Chain and Finance Security
    Security Hardware and Circuits
    Authentication and Authorization
    Soft-Error Analysis and Models
    CAD Algorithms and Tools
    Electronic Circuits and Systems
    Fault-Tolerance and Reliability
    Industrial Design Experiences
    Noise- and Power-Aware Designs
    Stochastic Circuits and Systems
    Temperature-Aware Designs
    Variable-Latency Designs

Experience and Practice

The DSC conference will also include a submission category for experience and practice papers on new findings in the two aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design knowhow or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper along with a supplemental video to demonstrate the implementation and/or the practicability of the work. Topics of interest include, but are not limited to:

    Attacks on Information Systems and Digital Storage
    CSIRTs, Incident Analysis and Response
    Hacking Techniques and Countermeasures
    Malware Analysis and Reversing
    Mobile Communications Security and Vulnerabilities
    Newly discovered vulnerabilities
    Offensive Information Technology
    Reverse Engineering, Forensics, and Anti-Forensics
    Spyware, Phishing and Distributed Attacks
    VLSI/CAD Design Knowhow


Conference Web-Site: