logo
Workshop on Semantic Computing and Security (WSCS)

The Westin Hotel
San Francisco, CA USA
May 24, 2012

Sponsored by
The IEEE Computer Society's Technical Committees:

Keynote Speaker: Jeannette Wing
President's Professor of Computer Science and Department Head, Computer Science Department, Carnegie Mellon University

  • 8:30 - Welcome
  • 8:35-9:20 Keynote Address: Jeannette Wing.
  • 9:20-10:00 - Session I
    • 9:20 - Matthew Burkholder and Rachel Greenstadt. Privacy in Online Review Sites.
    • 9:40 - Sharon Paradesi, Oshani Seneviratne and Lalana Kagal. Policy Aware Social Miner.
  • 10:00 - Coffee Break
  • 10:30-12:00 - Session II
    • 10:30 - Mathieu Jaume. Semantic comparison of security policies: from access control policies to flow properties.
    • 10:50 - Christopher Griffin and Kathleen Moore. A Framework for Modeling Decision Making and Deception with Semantic Information
    • 11:10 - Sumit More, Mary Mathews, Anupam Joshi and Tim Finin. A Knowledge-Based Approach To Intrusion Detection Modeling
    • 11:30 - Dibyajyoti Ghosh, Anupam Joshi, Tim Finin and Pramod Jagtap. Privacy control in smart phones using semantically rich reasoning and context modeling
  • 12:00 - Lunch
  • 13:30-15:00 - Session III
    • 13:30 - Hilarie Orman. Towards a Semantics of Phish.
    • 13:50 - Jim Blythe and Jean Camp. Implementing Mental Models
    • 14:10 - Hao Zhang, William Banick, Danfeng Yao and Naren Ramakrishnan. User Intention-Based Traffic Dependence Analysis For Anomaly Detection.
    • 14:30 - Christopher Griffin and Anna Squicciarini. Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results.
  • 15:00 - Coffee Break
  • 15:30-15:50 Session IV
    • 15:30 - Jesus Navarro, Enrique Naudon and Daniela Oliveira. Bridging the Semantic Gap to Mitigate Kernel-level Keyloggers.
  • 15:50-17:00 - Panel, Embedding Social Trust Policies in Operating Systems or Browsers - Daniela Oliveira (chair, Rachel Greenstadt, Jedidiah Crandall, Felix Wu
  • 17:00 - End of Workshop

This workshop follows the successful September 2011 workshop at the International Semantic Computing Symposium. This new workshop will explore additional topics and allow semantic computing researchers to have more opportunity to interact with security researchers.

Semantic Computing technologies derive and use semantics from content, where “content” is wide-ranging: video, audio, text, conversation, software, devices, actions, behavior, etc. Security technology encompasses the specification of secure behavior as well as the detection of insecure behavior over computer networks. The two disciplines come together in this new and interesting combination, in a synergy-seeking, cutting-edge workshop. The delimited notions of semantics used within Security and Privacy provide a well-defined and as yet unstudied domain for semantic modeling, automated semantic interpretation, and inference, with clear practical uses and opportunities for novel and imaginative research.

The workshop on Semantic Computing and Security addresses:
  • deriving semantics from data used for security and privacy research;
  • semantic verification of network activity; and
  • inferring the semantics of malicious free-form data, such as email and web pages.
Topics of interest include but are not limited to:
  • Network dataset curation through semantic derivation
  • Semantic MediaWiki for vulnerability sharing and detecting emergent security properties
  • Network security semantics, dynamic classification
  • Inferred semantics of malicious code
  • Semantic verification of network operations
  • Semantic specification and analysis of security experiment design
  • Semantic analysis of access control policies
  • Semantics of data acquisition and computation provenance
  • Semantic analysis of malware communication
  • Semantics-aware trust management
SUBMISSIONS AND REGISTRATION

Authors are invited to submit Regular Papers (maximum 8 pages) or Short Papers (maximum 4 pages) using EasyChair. Regular papers will be evaluated according to normal research conference criteria with respect to relevance, originality, and quality of the methodology and writing. Work that is highly novel, controversial, or preliminary can be submitted as a short paper.

Papers accepted by the workshop will be published by the IEEE Computer Society Press. Electronic media with the proceedings will be distributed to attendees.

IMPORTANT DATES
  • Regular & Short Paper Submission deadline: February 28, 2012 (by 11:59 PM, Pacific Standard time)
  • Notification to authors: March 31, 2012
  • Camera-Ready copy due: April 17, 2012
  • Registration: early bird rates end April 20, 2012
  • Workshop: May 24, 2012
ORGANIZING COMMITTEE
  • Alessandro Armando (co-chair), University of Genova & Fondazione Bruno Kessler
  • Hilarie Orman (co-chair), Purple Streak
PROGRAM COMMITTEE
  • Terry Benzel, Information Sciences Institute, University of Southern California
  • L. Jean Camp, Indiana University
  • Bruno Crispo, University of Trento
  • Grit Denker, SRI International
  • Eduard Hovy, Information Sciences Institute, University of Southern California
  • Alefiya Hussain, Information Sciences Institute, University of Southern California
  • Lalana Kagal, CSAIL, MIT
  • Daniela Oliveira, Bowdoin College
  • Pierangela Samarati, University of Milano
CONTACT
Hilarie Orman, hilarie @ purplestreak.com Alessandro Armando, armando @ fbk.eu