Conferences related to Product Security

Back to Top

2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)

ICSE is the premier forum for researchers to present and discuss the most recent innovations,trends, outcomes, experiences, and challenges in the field of software engineering. The scopeis broad and includes all original and unpublished results of empirical, conceptual, experimental,and theoretical software engineering research.


2020 IEEE Frontiers in Education Conference (FIE)

The Frontiers in Education (FIE) Conference is a major international conference focusing on educational innovations and research in engineering and computing education. FIE 2019 continues a long tradition of disseminating results in engineering and computing education. It is an ideal forum for sharing ideas, learning about developments and interacting with colleagues inthese fields.


Oceans 2020 MTS/IEEE GULF COAST

To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.

  • OCEANS '96

  • OCEANS '97

  • OCEANS '98

  • OCEANS '99

  • OCEANS 2000

  • OCEANS 2001

  • OCEANS 2002

  • OCEANS 2003

  • OCEANS 2004

  • OCEANS 2005

  • OCEANS 2006

  • OCEANS 2007

  • OCEANS 2008

    The Marine Technology Society (MTS) and the Oceanic Engineering Society (OES) of the Institute of Electrical and Electronic Engineers (IEEE) cosponsor a joint conference and exposition on ocean science, engineering, education, and policy. Held annually in the fall, it has become a focal point for the ocean and marine community to meet, learn, and exhibit products and services. The conference includes technical sessions, workshops, student poster sessions, job fairs, tutorials and a large exhibit.

  • OCEANS 2009

  • OCEANS 2010

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2011

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2012

    Ocean related technology. Tutorials and three days of technical sessions and exhibits. 8-12 parallel technical tracks.

  • OCEANS 2013

    Three days of 8-10 tracks of technical sessions (400-450 papers) and concurent exhibition (150-250 exhibitors)

  • OCEANS 2014

    The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2015

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2016

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 500 technical papers and 150 -200 exhibits.

  • OCEANS 2017 - Anchorage

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorials on ocean technology, workshops and town meetings on policy and governmental process.

  • OCEANS 2018 MTS/IEEE Charleston

    Ocean, coastal, and atmospheric science and technology advances and applications


2020 IEEE International Conference on Consumer Electronics (ICCE)

The International Conference on Consumer Electronics (ICCE) is soliciting technical papersfor oral and poster presentation at ICCE 2018. ICCE has a strong conference history coupledwith a tradition of attracting leading authors and delegates from around the world.Papers reporting new developments in all areas of consumer electronics are invited. Topics around the major theme will be the content ofspecial sessions and tutorials.


IGARSS 2020 - 2020 IEEE International Geoscience and Remote Sensing Symposium

All fields of satellite, airborne and ground remote sensing.



Periodicals related to Product Security

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Antennas and Propagation, IEEE Transactions on

Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.


Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...



Most published Xplore authors for Product Security

Back to Top

Xplore Articles related to Product Security

Back to Top

Tool support for secure programming by security testing

2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2015

Secure Programming Guidelines help to prevent developers from introducing vulnerabilities. But being just static text to be consulted now and then, the Guidelines are difficult to integrate in the implementation phase of software development, especially when developers are under pressure of delivering software for a deadline. In this paper, we present an IDE integration of security testing and static code ...


Mining social networks for software vulnerabilities monitoring

2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015

Staying informed about security vulnerabilities, work-arounds and the availability of patches regarding the components of a given system is crucial to ensure system security. Several channels can be used to the monitor the new vulnerabilities publications, but these channels are scattered. We propose in this paper a vulnerability monitoring system based on twitter analysis that aggregates and analyses different sources ...


An Application of Inspection in Product Security Based on Distributed and Real-Time System

2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

VI is an instrument based on computer, the application of which is one of the hottest topics in computer applications development and research fields. Remote inspection is the most emergent problem in the product security inspection laboratory. The application of networked VI becomes necessary and feasible. In this paper, we developed a Distributed Real-time Online Inspection System to control VI ...


Anti-counterfeiting using reflective micro structures - Based on random positioning of microstructures

Advances in Optoelectronics and Micro/nano-optics, 2010

We present a novel anti-counterfeiting and product security technique using a secure optical tag based on randomly distributed reflective micro particles. This technique can complement the existing security and logistics mechanisms like 1D/2D barcodes, DataMatrix, holograms etc. or can be used as a standalone solution too. The concept revolves around the use of random distribution of reflective microstructures as physically ...


Improving secure coding rules for automotive software by using a vulnerability database

2018 IEEE International Conference on Vehicular Electronics and Safety (ICVES), 2018

In automotive software development, secure coding is required to enhance the security level because the secure coding guidelines state that vulnerability of software must be eliminated. However, secure coding is difficult to incorporate because it provides different assumptions from the coding guidelines of product development for existing automobiles. More specifically, in the automobile industry, MISRA-C is applied to improve the ...



Educational Resources on Product Security

Back to Top

IEEE-USA E-Books

  • Tool support for secure programming by security testing

    Secure Programming Guidelines help to prevent developers from introducing vulnerabilities. But being just static text to be consulted now and then, the Guidelines are difficult to integrate in the implementation phase of software development, especially when developers are under pressure of delivering software for a deadline. In this paper, we present an IDE integration of security testing and static code analysis to detect vulnerabilities and known insecure coding patterns according to Secure Programming Guidelines. While security testing tools and static analyzers exist for security professionals, similar tools to be used by software engineers who are normally non security experts are missing. This automated tool support is non-intrusive during implementation by being fully integrated in the IDE developers use, efficient to not slow down the overall implementation effort, and extensible to consider different vulnerabilities. We implement this IDE integration as an extension to SAP HANA Web-based Development Workbench. While not proposing new security testing nor static code analysis techniques, we integrate multiple security analysis to make them usable for developers during implementation, as they are relevant threats to SAP HANA applications and thus concerned in the Secure Programming Guidelines.

  • Mining social networks for software vulnerabilities monitoring

    Staying informed about security vulnerabilities, work-arounds and the availability of patches regarding the components of a given system is crucial to ensure system security. Several channels can be used to the monitor the new vulnerabilities publications, but these channels are scattered. We propose in this paper a vulnerability monitoring system based on twitter analysis that aggregates and analyses different sources of data and extracts zero-day vulnerabilities.

  • An Application of Inspection in Product Security Based on Distributed and Real-Time System

    VI is an instrument based on computer, the application of which is one of the hottest topics in computer applications development and research fields. Remote inspection is the most emergent problem in the product security inspection laboratory. The application of networked VI becomes necessary and feasible. In this paper, we developed a Distributed Real-time Online Inspection System to control VI remotely using LabVIEW. Firstly, the architecture of the system is introduced. Secondly, the design of system and key techniques are discussed. Finally, the test of controlling VI remotely is successfully performed. It provides us a high reference value for the VI networked inspection. Since the System use the bottom layer programming technique which makes the bottom layer interfaces independent and multithreading technique ensures the system's good transplantability, stability, reliability, and efficiency. Our experiments show that the system works well in both local and remote inspection.

  • Anti-counterfeiting using reflective micro structures - Based on random positioning of microstructures

    We present a novel anti-counterfeiting and product security technique using a secure optical tag based on randomly distributed reflective micro particles. This technique can complement the existing security and logistics mechanisms like 1D/2D barcodes, DataMatrix, holograms etc. or can be used as a standalone solution too. The concept revolves around the use of random distribution of reflective microstructures as physically unclonable function (PUF). The particles are embedded into product surface or in the document. These particles are invisible to naked eye, the verification is done by imaging the reflections from these micro structures with a camera enabled cellphone equipped with some add-on optics. Here we present an overview of the system for using the secure optical tag, its registration and authentication.

  • Improving secure coding rules for automotive software by using a vulnerability database

    In automotive software development, secure coding is required to enhance the security level because the secure coding guidelines state that vulnerability of software must be eliminated. However, secure coding is difficult to incorporate because it provides different assumptions from the coding guidelines of product development for existing automobiles. More specifically, in the automobile industry, MISRA-C is applied to improve the reliability of software. To achieve higher dependability and security level, an original guideline was developed in this study for the AUTOSAR adaptive platform. In this paper, we discuss the secure coding guidelines for strengthening security in classic and adaptive platforms.

  • Automating Threat Intelligence for SDL

    Threat intelligence is very important in order to execute a well-informed Security Development Lifecycle (SDL). Although there are many readily available solutions supporting tactical threat intelligence focusing on enterprise Information Technology (IT) infrastructure, the lack of threat intelligence solutions focusing on SDL is a known gap which is acknowledged by the security community. To address this shortcoming, we present a solution to automate the process of mining open source threat information sources to deliver product specific threat indicators designed to strategically inform the SDL while continuously monitoring for disclosures of relevant potential vulnerabilities during product design, development, and beyond deployment.

  • Notice of Retraction<br>Design of fuzzy logic controller for coal mine drainage system

    This article has been retracted by the publisher.

  • Developing Secure Products in the Age of Advanced Persistent Threats

    Advanced persistent threats (APTs) are making technology providers reconsider their security assumptions for secure product development. This article suggests an industry roadmap for rethinking product security in the face of APTs. It also describes steps EMC has taken to implement this roadmap and strengthen its product development practices.

  • Design of authenticity evaluation metric for Android applications

    For enforcing security, Android platform uses authorizing system which grants permission per application at install-time. With authorized privilege, user applications can modify and delete user's personal information. Therefore, inspection of granted permiss ion usage can be used to detect security vulnerabilities. ISO/IEC 25 010 defines software product security characteristic and provides g uidelines to evaluate software product quality. Among sub-characte ristics of security, Authenticity is related to Android permission sys tem. In this paper, we present authenticity metric for android application. This metric can quantify the permission usage of applicatio n and measured information can be used to classify the malware applications. To verify the applicability of metric, we perform evaluat ion to benign and malware application and compare its results.

  • Driving Secure Software Development Experience in a Diverse Product Environment

    Siemens' central security team drives secure software development across a diverse product portfolio. From factory automation to wind turbines, Siemens builds security in by activities including standardizing roles and responsibilities, threat and risk analysis, and product security risk management across Siemens' 15,000 software developers.



Standards related to Product Security

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


Standard for Information System Security Assurance Architecture (ISSAA)

This standard specifies the architecture of a systematic approach for managing the health/state of the security controls of information systems, including the cost-effective selection, documentation, implementation, and ongoing assessment of security controls, and for making and maintaining system security accreditation decisions. The general schema and description of related components are provided.


Systems and software engineering -- Software life cycle processes

This International Standard establishes a common framework for software life cycle processes, with welldefined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that are to be applied during the acquisition of a software product or service and during the supply, development, operation, maintenance and disposal of software products. Software includes the software portion ...