Call for Papers

Conference Scope

The 2017 International Conference on Applications and Technologies in Information Security (ATIS), will be the eighth (8th) event in the ATIS series, which started in 2010.

As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc. ATIS 2017 focuses on all aspects on techniques and applications in information security.

ATIS 2017 focuses on all aspects on techniques and applications in information security research. The purpose of ATIS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world as well as highlight activities in the related areas. The annual ATIS conference highlights new results in the design and analysis of digital security hardware and software implementations. ATIS provides a valuable connection between the theoretical and implementation communities and attracts participants from industry, academia, and government organizations.

Accepted papers will appear in the proceedings to be published as ...


Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings.

Attacks against Implementations

  • Digital Forensics
  • Key Recovery
  • Hacking
  • Reverse Engineering
Tools and Methodologies

  • Evaluation of Security
  • Evaluation of Security Tools
  • Development of Security Tools
Data Privacy

  • Privacy Protection
  • Smart device information leaks
  • Trusted and Trustworthy Computing
  • Privacy Preservation in Data Release

  • Digital Forensics
  • Intrusion Detection
  • Malicious software
Security Implementations

  • Access Control
  • Authentication and Authorization
  • Data and System Integrity
  • Database Security
  • Distributed Systems Security
  • Cryptography
  • Information Hiding and Watermarking
  • Intellectual Property Protection
  • Operating System Security
  • Intellectual Property Protection
  • Key Management

  • Electronic Commerce Security
  • Cloud Security
  • Software Defined Networking
  • Digital Forensics
  • Internet of Things
  • Smartphone Security
  • Language-based Security
  • Sustainable Practice
  • Numerical Modelling
Evaluation, standards and protocols

  • Domain name server security
  • Transport Layer Security
  • Risk Evaluation and Security Certification
  • Security Management
Curbing Cyber Crimes

  • Cyber-Gossip Spread Models
  • Identity authentication
  • Datasets for cyber-gossips detection
  • Collusive crime/piracy detection

Paper Submission

The submitted paper should adhere to the double-blind review policy. All papers will be double-blind reviewed by the Program Committee on the basis of technical quality, relevance to ATIS, originality, significance, and clarity. All paper submissions will be handled electronically. Papers that do not comply with the Submission Guidelines will be rejected without review. Please note:

Paper submission is via Easychair at:

Further Information

For all inquiries, please contact the Conference Secretary, Mr/Ms TBA