Call for Papers / Presentations

Present at the
Secure Our Streets

Secure Our Streets (SOS) is a conference aiming to provide a global platform for information exchange among industry experts and researchers in the domain of automotive security and privacy technology. The goal of the conference is to enable the community of automotive OEMs, providers, academic researchers, policy makers, and government regulators to showcase the recent advances and challenges in areas of automotive security and privacy technologies, organizational strategy and cybersecurity plan and government policies.

Information about Secure our Streets

What you need to know

Bring your ideas and research to Secure Our Streets

We are inviting presentations of recent advances in the area of automotive security and privacy including technology, organizational strategies, implementation of policy and regulations, methodologies, use-case demonstrations, challenges and future directions. The list of topics includes, but is not limited to:

  • Standardization and Automation of Asset Management, TARA, Vulnerability Management and Incident Response: Best and worst practices, case studies, and lessons learned in standardizing and automating TARA, Asset Management, and Vulnerability Management processes.
  • Vehicle Operations Center: Demonstrations, discussions on implementation challenges, and lessons learned in establishing and operating Vehicle Operations Centers for managing automotive fleets and systems.
  • Threat Intelligence and Forensics in the Automotive Domain: Demos, techniques and case studies showcasing effective threat intelligence and digital forensics methodologies tailored for the automotive industry.
  • Over-the-Air Software/Firmware Updates: Strategies and technologies for addressing challenges associated to configuration management, test bench maintenance and assessing new risks introduced by Over-the-Air (OTA) software/firmware updates for vehicle systems
  • Integration of CSMS and ISMS in Automotive Products: Exploration of worst and best practices in integrating and interfacing CSMS and ISMS in automotive products, with case studies and practical insights.
  • Security and Privacy Reference Architectures: Lessons learned in designing secure and private systems for next-generation vehicles, including electric and autonomous vehicles.
  • Software Bill of Materials (SBOM), Hardware Bill of Materials (HBOM), CryptoBOM, and Asset Management: Case studies and best practices in managing software, hardware, cryptographic components, and assets within automotive systems, focusing on security and supply chain management.
  • Use Cases of AI in Automotive Security and Security for AI in Automotive Use Cases: Exploration of AI applications in automotive security and security considerations for AI implementation in automotive systems, highlighting use cases and challenges.
  • Simulations and Testing for Automotive Cybersecurity: Advancements in simulation technologies and testing methodologies for evaluating and enhancing automotive cybersecurity.
  • ISO/SAE AWI PAS 8475 Cybersecurity Assurance Levels (CAL) and Targeted Attack Feasibility (TAF): Examination of the ISO/SAE AWI PAS 8475 standards and their implications for assessing cybersecurity assurance levels and targeted attack feasibility in automotive systems.
  • ISO/SAE AWI 8477 Cybersecurity Verification and Validation: Insights into the ISO/SAE AWI 8477 standard and its role in verifying and validating cybersecurity measures in automotive systems.
  • Cybersecurity for Motorcycles: Discussions on unique cybersecurity challenges and solutions specific to motorcycle systems and infrastructure.


We accept:

Program Committee 2024

  • Dr. Jetzabel Serna, CYBER4PEOPLE
  • John Heldreth, Automotive Security Research Group
  • Sergej Weber, UL
  • Mario Hoffmann, ARRK
  • Prof. Dr. Marc Stöttinger, Rhein Main Hochschule
  • Prof. Dr. Joern Eichler, Volkswagen Passenger Vehicles
  • Prof. Dr. Christoph Krauß, Darmstadt University of Applied Sciences
  • Dr. Sebastian Pape, Continental Teves
  • Dr. Christian Zimmermann, Robert Bosch GmbH
  • Dr. Ioannis Krontiris, Huawei Technologies
  • Dr. Thomas Wagner, Mercedes Benz
  • Dr. Cosimo Senni Guidotti Magnani, Stellantis
  • Dr. Fabian Lanze, Huf Hülsbeck & Fürst GmbH & Co. KG
  • David Balenson, USC Information Sciences Institute
  • Janine Funke, UL
  • Jitendra Kumar Sharma, Harman Connected Services
  • Kartheek Lade, ASRG
  • Johana Constante TÜV SÜD
  • Kemal Bayrakceken, Rappel Cybersécurité
  • Krishna Teja Medam, Navistar Inc
  • Michael Golosovsky, CYMOTIVE
  • Naresh Neelakantan, Glownexus
  • Sindu Nadiger, Elektrobit


Submit paper / idea / presentation for review. Content must not be complete at this time, however an abstract must be submitted.
[Submission Ready] All submissions will be reviewed by the CFP Review Committee.
During the review process, non-compliant submissions will be notified of non-compliance when reviewed.
Notification of acceptance
[Live-Ready] Submission of updated and complete Presentation files



  • EXTENDED! | Submission of Papers: 17 May 2024, 23:59 CEST
  • Acceptance Notification: 17 June 2024
  • Submission of Final Presentation: 19 July 2024


  • Submissions must have a real name, no aliases.
  • Disclosure presentations in which the affected companies have not been informed, will not be considered. The reason for this conference is not fame, but to inform.
  • Submissions may only be entered by researchers/speakers (no submissions from PR firms/marketing representatives).
  • Product or vendor-related pitches can only take place in Sponsor Booths.
  • Submissions must clearly detail concepts, ideas, findings, and solutions a researcher or speaking team plans to present.
  • Submissions that highlight new research, tools, vulnerabilities, etc. will be given priority.
  • Submissions that include White Papers are highly encouraged and will also be given priority.
  • Incomplete Submissions will not be considered.
  • Individuals may submit more than one proposal, but each proposal must be submitted via a separate submission form.
  • Each submission must include detailed biographies of the proposed speaking team.
  • Submitters will be contacted directly if Review Board members have any questions about a submission.
  • Presentations and videos will be published sometime after the conference unless the submitter requests specifically not to be published.
  • To request work not to be published after the conference must be done at the time of submission or per email before the conference. Requests after the conference will not be considered.
  • No video introductions or other video content which is not a demonstration or test case.

Pre-Recorded Videos

Since this conference is international and the worldwide infrastructure and scheduling issues can have an impact on the quality of the presented content at the conference, we require that all presentations be pre-recorded.  Presentations can be also live, however, a pre-recorded video is still required.

Videos must be at least HD quality.


Why do I need to record my presentation before?

Based on our experience from last year, we need to have a back-up incase technical issues, sickness, etc. that prevent the presentation being performed live.

Where do I submit my paper / presentation?

We use EasyChair to manage all of the submissions which are then reviewed by our experts to ensure the quality of SOS content.  

You can submit your presentation or paper at the link below.