Bring your ideas and research to Secure Our Streets.
CONTENT:
We are inviting presentations of recent advances in the area of automotive security and privacy including technology, organizational strategies, implementation of policy and regulations, methodologies, use-case demonstrations, challenges and future directions. The list of topics includes, but is not limited to:
- Autonomous Vehicles and AI Security: Securing AI-enabled automotive systems and addressing adversarial and safety risks.
- Beyond CAN: Security considerations for next-generation in-vehicle networks and protocols.
- Software-Defined Vehicle (SDV): Security challenges in software-centric vehicle architectures, including detection, isolation, and resilience.
- Electric Vehicles (EV) and EV Supply Equipment (EVSE): Threats and defenses for EV platforms and charging infrastructure.
- Smart Streets and Intelligent Transportation Systems: Security and privacy issues for connected vehicles, infrastructure, and V2X systems.
- Aftermarket Security and Secondary Lifecycle Protection: Risks and protections beyond initial vehicle production, including modification and repair.
- Supply Chain and Manufacturing Security: Managing dependencies, vulnerabilities, risk, and SBOM-related transparency mechanisms.
- Simulations and Testing for Automotive Security: Use of testbeds, digital twins, and simulation for security evaluation and response.
- Digital Forensics in Automotive: Challenges and techniques for investigation while preserving safety and privacy.
- Detection and Response Operations: Intrusion detection, prevention, fleet monitoring, and VSOC workflows for connected vehicles.
- Future of Digital Identity Management: Identity, authentication, and access control across vehicles and supporting services.
- Lightweight Cryptography: Efficient, low-latency security for resource-constrained ECUs, sensors, and V2X devices.
- Key Management Systems (KMS): Secure generation, storage, and lifecycle management of cryptographic keys.
- Post-Quantum Cryptography (PQC): Preparing automotive systems for quantum-resistant security, including crypto agility and migration.
- Hardware Security: Hardware-based trust anchors, accelerators, and emerging open architectures such as RISC-V.
- Human Factors and Usability: Usable security, driver interaction, service workflows, and minimizing human error in connected vehicles.
- Planes, Trains, Automobiles, and Beyond: Cross-domain vehicle security challenges and lessons learned across transportation sectors.
- Security in Micro-Mobility and Motorcycles: Security risks and mitigations for scooters, motorcycles, and light electric vehicles.
- Understanding the Evolving Global Security Compliance Landscape: Emerging automotive standards, regulations, and frameworks across regions and ecosystems.
SUBMISSION:
We accept:
- Extended Abstract at least 2 pages
- Results of work-in progress
- Complete and published works
REQUIREMENTS:
- Speaker Information: The submission form must include the presenters’ real legal names, biographies, and accurate contact details. Aliases or pseudonyms are not permitted.
- Anonymous Paper Submission: The submitted paper/extended abstract must be fully anonymized. Do not include author names, affiliations, company branding, logos, or any identifying references in the paper.
- Minimum Length: Proposals must be at least two full pages. Incomplete or excessively brief submissions will not be reviewed.
- Technical Focus: Submissions must clearly describe the concepts, research, findings, or solutions to be presented. Priority will be given to original research, new tools, vulnerabilities, or innovative technical solutions.
- Responsible Disclosure: Presentations involving security disclosures must confirm that affected organizations have been informed. The conference prioritizes education and research, not publicity.
- No Commercial Content: Sales pitches, vendor promotion, or product marketing talks will not be accepted as conference presentations. Such content is restricted to sponsor areas.
- Direct Submission: Proposals must be submitted by the researcher(s) or speaker(s). Submissions from PR agencies or marketing representatives will not be considered.
- Multiple Proposals: Individuals may submit multiple proposals, but each must be submitted separately.
- Review Communication: The review board may contact submitters for clarification using the information provided in the speaker form.
- Publication Policy: Presentations and recordings may be published after the conference unless the submitter opts out during submission or notifies organizers before the event. Post-conference opt-out requests cannot be accommodated.
- Video Restrictions: Only demonstration or test-case videos are permitted. Promotional or introductory videos will not be accepted.
Pre-Recorded Videos:
Since this conference is international and the worldwide infrastructure and scheduling issues can have an impact on the quality of the presented content at the conference, we require that all presentations be pre-recorded. Presentations can be also live, however, a pre-recorded video is still required.
Videos must be at least HD quality.