Call for Papers
DevSecOpsRA accepts regular papers (up to 8 pages), short papers (up to 5 pages), and position papers (up to 2 pages). Lenghts include bibliography and well marked appendices.
Full papers will be published in the proceedings of EuroS&P. Position and short papers will not be included in the proceedings. Extended versions of selected papers will be invited to special issues of peer-reviewed journals.
Papers must be typeset in LaTeX in A4 format (not "US Letter") using the IEEE conference proceeding template we supply at this link (the link will be avaiable soon). Please do not use other IEEE templates.
Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader XI and when printed in black and white.
Papers must be submitted through the EasyChair system.
Important Dates
Full papers will be included in EuroS&P’s proceedings, while short papers will not.
Authors of selected papers will be invited to submit an extended version to a special issue in a peer-reviewed journal.
- Paper submission deadline : Feb. 13, 2025
- Notification of acceptance: Mar. 17, 2025
- Final papers: Apr. 7, 2025
Scope and topics
The security implications of attacks on the software supply chain are nowadays well-known. Indeed, attacks such as the SolarWinds hack showed the world that security cannot be treated as an add-on feature in software development and distribution.
The need for this integration and the design of suitable methodologies is often referred to as DevSecOps or SecDevOps. Despite the recently proposed models for secure development (e.g., SLSA and CSA CMM), no comprehensive framework exists that guarantees the security and resiliency of the Software Development Lifecycle (SDLC). The heterogeneity of solutions adopted by different vendors and the rapid advancement of developing technologies further complicate the creation and adoption of a common security framework. Furthermore, they create novel attack surfaces that malicious users could exploit. Thus, it is fundamental to uncover these novel threats before they can actually affect an SDLC.
With this workshop, we aim to attract novel contributions to the security of the software supply chain to foster the creation of more conscious, robust, resilient, and advanced methodologies to either expose novel threats or propose advanced countermeasures to existing threats. We invite academics, industry professionals, and enthusiasts to contribute their research, experiences, and insights into the challenges and advancements in DevSecOps.
Topics of interest include but are not limited to:
- Methodological approaches to agile secure software development
- Security testing integration in the software supply chain
- Static and dynamic software bill of materials
- Secure software development via cloud testing
- Secrets management along the software supply chain
- Novel attacks on the software supply chain
- Machine learning approaches to speed up security testing
- Maturity models for secure software development
- Declinations of DevSecOps in different fields
- Integration of incident and response team operations
- Tracking and handling updates along the software supply chains
- AI support to Secure Software Development
- Automated vulnerability detection
- Fuzzing methodologies for the software supply chain
- Automated approaches in detecting software vulnerabilities
- Automated application of software patches
- Strategies for meeting regulatory compliance and addressing security challenges in DevSecOps
- Approaches for the creation of an effective Software Bill Of Materials
Use of Generative AI Technology provides great advantages to its users and, in particular, generative AI may be tempting to use as a substitute for human work. While this is great for a lot of tasks, critical thinking and fact-checking is not yet among the tasks at which these models excel. Therefore, we encourage authors to provide substantial contributions via critical thinking and carefully checking the correctness of whatever information is included in the paper. The use of generative AI for reviewing is, on the other hand, strictly prohibited. We will instruct reviewers in this sense to guarantee you quality reviews and without leaking any confidential information you will include in your work.