Call for Speakers

in 133 days

Secure Our Streets 2024

event date

19 Sep 2024

location

Online

website

sos.asrg.io


Secure Our Streets (SOS) is a conference aiming to provide a global platform for information exchange among industry experts and researchers in the domain of automotive security and privacy technology. The goal of the conference is to enable the community of automotive OEMs, providers, academic researchers, policy makers, and government regulators to showcase the recent advances and challenges in areas of automotive security and privacy technologies, organizational strategy and cybersecurity plan and government policies.

open, 9 days left
Call for Speakers
Call opens at 12:00 AM

01 Jan 2024

Call closes at 11:59 PM

17 May 2024

Call closes in W. Europe Daylight Time (UTC+02:00) timezone.
Closing time in your timezone () is .

We are inviting presentations of recent advances in the area of automotive security and privacy including technology, organizational strategies, implementation of policy and regulations, methodologies, use-case demonstrations, challenges and future directions. The list of topics includes, but is not limited to:

  • Standardization and Automation of Asset Management, TARA, Vulnerability Management and Incident Response: Best and worst practices, case studies, and lessons learned in standardizing and automating TARA, Asset Management, and Vulnerability Management processes.
  • Vehicle Operations Center: Demonstrations, discussions on implementation challenges, and lessons learned in establishing and operating Vehicle Operations Centers for managing automotive fleets and systems.
  • Threat Intelligence and Forensics in the Automotive Domain: Demos, techniques and case studies showcasing effective threat intelligence and digital forensics methodologies tailored for the automotive industry.
  • Over-the-Air Software/Firmware Updates: Strategies and technologies for addressing challenges associated to configuration management, test bench maintenance and assessing new risks introduced by Over-the-Air (OTA) software/firmware updates for vehicle systems
  • Integration of CSMS and ISMS in Automotive Products: Exploration of worst and best practices in integrating and interfacing CSMS and ISMS in automotive products, with case studies and practical insights.
  • Security and Privacy Reference Architectures: Lessons learned in designing secure and private systems for next-generation vehicles, including electric and autonomous vehicles.
  • Software Bill of Materials (SBOM), Hardware Bill of Materials (HBOM), CryptoBOM, and Asset Management: Case studies and best practices in managing software, hardware, cryptographic components, and assets within automotive systems, focusing on security and supply chain management.
  • Use Cases of AI in Automotive Security and Security for AI in Automotive Use Cases: Exploration of AI applications in automotive security and security considerations for AI implementation in automotive systems, highlighting use cases and challenges.
  • Simulations and Testing for Automotive Cybersecurity: Advancements in simulation technologies and testing methodologies for evaluating and enhancing automotive cybersecurity.
  • ISO/SAE AWI PAS 8475 Cybersecurity Assurance Levels (CAL) and Targeted Attack Feasibility (TAF): Examination of the ISO/SAE AWI PAS 8475 standards and their implications for assessing cybersecurity assurance levels and targeted attack feasibility in automotive systems.
  • ISO/SAE AWI 8477 Cybersecurity Verification and Validation: Insights into the ISO/SAE AWI 8477 standard and its role in verifying and validating cybersecurity measures in automotive systems.
  • Cybersecurity for Motorcycles: Discussions on unique cybersecurity challenges and solutions specific to motorcycle systems and infrastructure.

Requirements

  • Submissions must have a real name, no aliases.
  • Disclosure presentations in which the affected companies have not been informed, will not be considered. The reason for this conference is not fame, but to inform.
  • Submissions may only be entered by researchers/speakers (no submissions from PR firms/marketing representatives).
  • Product or vendor-related pitches can only take place in Sponsor Booths.
  • Submissions must clearly detail concepts, ideas, findings, and solutions a researcher or speaking team plans to present.
  • Submissions that highlight new research, tools, vulnerabilities, etc. will be given priority.
  • Submissions that include White Papers are highly encouraged and will also be given priority.
  • Incomplete Submissions will not be considered.
  • Individuals may submit more than one proposal, but each proposal must be submitted via a separate submission form.
  • Each submission must include detailed biographies of the proposed speaking team.
  • Submitters will be contacted directly if Review Board members have any questions about a submission.
  • Presentations and videos will be published sometime after the conference unless the submitter requests specifically not to be published.
  • To request work not to be published after the conference must be done at the time of submission or per email before the conference. Requests after the conference will not be considered.
  • No video introductions or other video content which is not a demonstration or test case.

Video Recording

Since this conference is international and the worldwide infrastructure and scheduling issues can have an impact on the quality of the presented content at the conference, we require that all presentations be pre-recorded. Presentations can be also live, however, a pre-recorded video is still required.

Videos must be at least HD quality.


Login with your preferred account


If you haven't logged in before, you'll be able to register.

Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.