|
|
Commentary and Opinion
Review of the Symposium on Security & Privacy (Claremont Hotel Resort and Spa, Berkeley, CA, May 17-20, 2009) by Martin Szydlowski
Richard Austin's review of Chained Exploits: Advanced Hacking Attacks from Start to Finish by A. Whitaker, K. Evans and J. Voth
NewsBits: Announcements and correspondence from readers (please contribute!)
(the calls-for-papers and the calendar announcements may differ slightly in content or time of update):
ASIACRYPT 2009 15th Annual International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. (Submissions due 29 May 2009)
Original research papers on all technical aspects of cryptology are solicited for submission to ASIACRYPT 2009, the annual International Conference on Theory and Application of Cryptology and Information Security. The conference is sponsored by the International Association for Cryptologic Research (IACR) in cooperation with Technical Group on Information Security (ISEC) of the Institute of Electronics, Information and Communication Engineers (IEICE).
STC 2009 4th Annual Workshop on Scalable Trusted Computing, Held in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, IL, USA, November 13, 2009. (Submissions due 30 May 2009)
The workshop focuses on fundamental technologies of trusted computing (in a broad sense, with or without TPMs) and its applications in large-scale systems -- those involving large number of users and parties with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues. Topics of interest include, but not limited to:
InSPEC 2009 2nd International Workshop on Security and Privacy in Enterprise Computing, Held in conjunction with the 13th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2009), Auckland, New Zealand, August 31 - September 4, 2009. (Submissions due 31 May 2009)
In recent years several technologies have emerged for enterprise computing. Workflows are now widely adopted by industry and distributed workflows have been a topic of research for many years. Today, services are becoming the new building blocks of enterprise systems and service-oriented architectures are combining them in a flexible and novel way. In addition, with wide adoption of e-commerce, business analytics that exploits multiple, heterogeneous data sources have become an important field. Ubiquitous computing technologies, such as RFID or sensor networks change the way business systems interact with their physical environment, such as goods in a supply chain or machines on the shop floor. All these technological trends are accompanied also by new business trends due to globalization that involve innovative forms of collaborations such as virtual organizations. Further, the increased speed of business requires IT systems to become more flexible and highly dynamic. All of these trends bring with them new challenges to the security and privacy of enterprise computing. New concepts for solving these challenges require the combination of many disciplines from computer science and information systems, such as cryptography, networking, distributed systems, process modeling and design, access control, privacy etc. The goal of this workshop is to provide a forum for exchange of novel research in these areas among the experts from academia and industry. Completed work as well as research in progress is welcome, as we want to foster the exchange of novel ideas and approaches.
TSP 2009 IEEE International Symposium on Trust, Security and Privacy for Pervasive Applications, Held in conjunction with the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2009), Macau SAR, China, October 12-14, 2009. (Submissions due 31 May 2009)
TSP 2009 aims at bringing together researchers and practitioners in the world working on trust, security, privacy, and related issues such as technical, social and cultural implications for pervasive devices, services, networks, applications and systems, and providing a forum for them to present and discuss emerging ideas and trends in this highly challenging research area. Topics of interest include, but are not limited to:
CANS 2009 8th International Conference on Cryptography and Network Security, Kanazawa, Ishikawa, Japan, December 12-14, 2009. (Submissions due 1 June 2009)
The main goal of this conference is to promote research on all aspects of network security, as well as to build a bridge between research on cryptography and on network security. We therefore welcome scientific and academic papers with this focus. Areas of interest for CANS 2009 include, but are not limited to:
ACSAC 2009 25th Annual Computer Security Applications Conference, Honolulu, Hawaii, USA, December 7-11, 2009. (Submissions due 1 June 2009)
We solicit papers offering novel contributions in computer and application security. Papers should present techniques or applications with practical experience. Papers are encouraged on technologies and methods that have been demonstrated to improve information systems security and that address lessons from actual application. We are especially interested in papers that address the application of security technology, the implementation of systems, and lessons learned. Suggested topics:
EUROPKI 2009 6th European Workshop on Public Key Services, Applications and Infrastructures, Pisa, Tuscany, Italy, September 9-11, 2009. (Submissions due 1 June 2009)
EuroPKI aims at covering all research aspects of Public Key Services, Applications and Infrastructures. In particular, we want to encourage also submissions dealing with any innovative applications of public key cryptography. Submitted papers may present theory, applications or practical experiences on topics including, but not limited to:
SETOP 2009 International Workshop on Autonomous and Spontaneous Security, Held in conjunction with ESORICS 2009, Saint Malo, Britany, France, September 24-25, 2009. (Submissions due 1 June 2009)
With the need for evolution, if not revolution, of current network architectures and the Internet, autonomous and spontaneous management will be a key feature of future networks and information systems. In this context, security is an essential property. It must be thought at the early stage of conception of these systems and designed to be also autonomous and spontaneous. Future networks and systems must be able to automatically configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. Those networks and systems should interoperate securely when their respective security policies are heterogeneous and possibly conflicting. They must be able to autonomously evaluate the impact of an intrusion in order to spontaneously select the appropriate and relevant response when a given intrusion is detected. Autonomous and spontaneous security is a major requirement of future networks and systems. Of course, it is crucial to address this issue in different wireless and mobile technologies available today such as RFID, Wifi, Wimax, 3G, etc. Other technologies such as ad hoc and sensor networks, which introduce new type of services, also share similar requirements for an autonomous and spontaneous management of security. The SETOP Workshop seeks submissions that present research results on all aspects related to spontaneous and autonomous security. Submissions by PhD students are encouraged. Topics of interest include, but are not limited to the following:
IWNS 2009 International Workshop on Network Steganography, Held in conjunction with the International Conference on Multimedia Information Networking and Security (MINES 2009), Wuhan, Hubei, China, November 18-20, 2009. (Submissions due 1 June 2009)
Network steganography is part of information hiding focused on modern networks and is a method of hiding secret data in users' normal data transmissions, ideally, so it cannot be detected by third parties. Steganographic techniques arise and evolve with the development of network protocols and mechanisms, and are expected to used in secret communication or information sharing. Now, it becomes a hot topic due to the wide spread of information networks, e.g., multimedia service networks and social networks. The workshop is dedicated to capture such areas of research as steganography, steganalysis, and digital forensics in the meaning of network covert channels, investigate the potential applications, and discuss the future research topics. Research themes of workshop will include:
CSET 2009 Workshop on Cyber Security Experimentation and Test, Held in conjunction with the USENIX Security Symposium (USENIX-Security 2009), Montreal, Canada, August 10, 2009. (Submissions due 1 June 2009)
CSET '09 is bringing together researchers and testbed developers to share their experiences and define a forward-looking agenda for the development of scientific, realistic evaluation approaches for security threats and defenses; it provides an important community forum for the exploration of transformational advances in the field of cyber security experimentation and test. While we particularly invite papers that deal with security experimentation, we are also interested in papers that address general testbed/ experiment issues that have implications on security experimentation such as: traffic and topology generation, large-scale experiment support, experiment automation, etc. We are further interested in educational efforts that involve security experimentation.
SecPri-WiMob 2009 International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications, Held in the 5th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2009), Marrakech, Morocco, October 12, 2009. (Submissions due 7 June 2009)
The objectives of the SecPri_WiMob 2009 Workshop are to bring together researchers from research communities in Wireless and Mobile Computing, Networking and Communications, Security and Privacy, with the goal of fostering interaction. Topics of interest may include one or more of the following (but are not limited to) themes:
DPM 2009 4th International Workshop on Data Privacy Management, Saint Malo, Britany, France, September 24, 2009. (Submissions due 10 June 2009)
DPM 2009 Workshop aims at discussing and exchanging ideas related to privacy data management. We invite papers from researchers and practitioners working in privacy, security, trustworthy data systems and related areas to submit their original papers in this workshop. The main topics, but not limited to, include:
SWS 2009 ACM Workshop on Secure Web Services, Held in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, IL, USA, November 13, 2009. (Submissions due 12 June 2009)
Basic security protocols for Web Services, such as XML Security, the WS-* series of proposals, SAML, and XACML are the basic set of building blocks enabling Web Services and the nodes of GRID architectures to interoperate securely. While these building blocks are now firmly in place, a number of challenges are still to be met for Web services and GRID nodes to be fully secured and trusted, providing for secure communications between cross-platform and cross-language Web services. Also, the current trend toward representing Web services orchestration and choreography via advanced business process metadata is fostering a further evolution of current security models and languages, whose key issues include setting and managing security policies, inter-organizational (trusted partner) security issues and the implementation of high level business policies in a Web services environment. The SWS workshop explores these challenges, ranging from the advancement and best practices of building block technologies such as XML and Web services security protocols to higher level issues such as advanced metadata, general security policies, trust establishment, risk management, and service assurance. The workshop provides a forum for presenting research results, practical experiences, and innovative ideas in web services security. Topics of interest include, but are not limited to, the following:
SPIMACS 2009 ACM Workshop on Security and Privacy in Medical and Home-Care Systems, Held in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, IL, USA, November 13, 2009. (Submissions due 12 June 2009)
The goal of the proposed workshop is to bring together a range of computer and social scientists to develop a more complete understanding of the interaction of individuals and computer security technologies as they are associated with critical care, continuing care and monitoring of the frail. The goals include but go beyond traditional vulnerability and usability critiques to include evaluations of use of security technologies in homes and in health care. The Health Information Technology for Economic Clinical Health Act, signed on 2/17/09, brings this issue strongly to the fore. SPIMACS (pronounced spy-max) seeks to bring together the people and expertise that will be required to address the challenges of securing the intimate digital spaces of the most vulnerable. Therefore the scope of this workshop includes but is not uniquely limited to:
ARO-DF 2009 ARO Workshop on Digital Forensics, Washington DC., USA, September 10-11, 2009. (Submissions due 15 June 2009)
The possibility of becoming a victim of cyber crime is the number one fear of billions of people online. In the years of fighting against cyber-crimes and cyber-enabled crimes, we have seen that digital evidence may often be available for a very short period of time and/or involve huge volumes of data that are found locally on a single digital device or spread globally across dispersed public and proprietary platforms. The field of Digital Forensics faces many challenges and difficult problems. The goal of this workshop is to identify important and hard digital forensic challenges and problems, and to stimulate community efforts on the development of scientific foundation for digital forensics and new theories and practical techniques towards addressing these problems. We invite one-page short statement of ideas addressing the problems and topics of interest for the workshop. The workshop discussions will be initiated by presentations from invited speakers, each representing a different perspective related to digital forensics and views from law enforcement, military, industry, and academia. These presentations will be used to form the basis of the workshop discussions to follow. The remainder of the workshop will be devoted to group discussions led by group coordinators on a selected list of important topics in digital forensics. Topics of relevance include, but are not limited to:
ICPADS 2009 15th IEEE International Conference on Parallel and Distributed Systems, Shenzhen, China, December 8-11, 2009. (Submissions due 15 June 2009)
Following the previous successful events, ICPADS 2009 will be held in Shenzhen, China. The conference provides an international forum for scientists, engineers, and users to exchange and share their experiences, new ideas, and latest research results on all aspects of parallel and distributed systems. Topics of particular interest include, but are not limited to:
SECMCS 2009 Workshop on Secure Multimedia Communication and Services, Held in conjunction with the 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), Wuhan, China, November 1820, 2009. (Submissions due 15 June 2009)
This workshop covers various aspects of secure multimedia communication in emerging services. The services may work in the following environment: Internet, mobile TV, IPTV, IMS, VoIP, P2P, sensor network, network convergence, etc. The paper may focus on architecture construction, algorithm designing or hardware implementation. Both review paper and technical paper are expected. The topics include but are not limited to:
IS 2009 4th International Symposium on Information Security, Vilamoura, Algarve-Portugal, November 1-6, 2009. (Submissions due 15 June 2009)
The goal of this symposium is to bring together researchers from the academia and practitioners from the industry in order to address information security issues. The symposium will provide a forum where researchers shall be able to present recent research results and describe emerging technologies and new research problems and directions related to them. The symposium seeks contributions presenting novel research in all aspects of information security. Topics of interest may include one or more of the following (but are not limited to) themes:
HICSS-DF 2010 43rd Hawaii International Conference on System Sciences, Digital Forensics Minitrack, Koloa, Kauai, Hawaii, January 5-8, 2010. (Submissions due 15 June 2009)
This is a call for "original" papers addressing the area of digital forensics - to include research endeavors, industrial experiences and pedagogy . This minitrack is attempting to bring together an international collection of papers from academia, industry and law enforcement which address current directions in digital forensics. Digital forensics includes the use of software, computer science, software engineering, and criminal justice procedures to explore and or investigate digital media with the objective of finding evidence to support a criminal or administrative case. It involves the preservation, identification, extraction, and documentation of computer or network evidence. This minitrack is interested in a wide variety of papers which address the following areas as well as others:
CCSW 2009 ACM Cloud Computing Security Workshop, Held in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, IL, USA, November 13, 2009. (Submissions due 19 June 2009)
Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. It is essential that our community becomes involved at this early stage. The CCSW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including:
STM 2009 5th International Workshop on Security and Trust Management, Held in conjunction with ESORICS 2009, Saint Malo, France, September 24-25, 2009. (Submissions due 21 June 2009)
STM (Security and Trust Management) is a established working group of ERCIM (European Research Consortium in Informatics and Mathematics). Topics of interest include, but are not limited to:
ICISS 2009 5th International Conference on Information Systems Security, Kolkata, India, December 14-18, 2009. (Submissions due 15 July 2009)
The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating the latest research results in information and systems security. The ICISS 2009 encourages submissions addressing theoretical and practical problems in information and systems security and related areas. We especially like to encourage papers in domains that have not been represented much in the past at the conference, such as database security/privacy, usability aspects of security, operating systems security, and sensor networks security. Papers that introduce and address unique security challenges or present thought-provoking ideas are also welcome.
INTRUST 2009 The International Conference on Trusted Systems, Beijing, P. R. China, December 17-19, 2009. (Submissions due 1 August 2009)
INTRUST 2009 is the first International Conference on the theory, technologies and applications of trusted systems. It is devoted to all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. INTRUST 2009 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trustworthy systems and general trust issues in modern computing systems. The conference will have an academic track and an industrial track. This call for papers is for contributions to both of the tracks. Submissions to the academic track should emphasize theoretical and practical research contributions to general trusted system technologies, while submissions to the industrial track may focus on experiences on the implementation and deployment of real-world systems. Topics of relevance include but are not limited to:
Information Systems Frontiers, Special Issue on Security Management and Technologies for Protecting Against Internal Data Leakages Spring or Summer 2010. (Submission Due 14 August 2009)
Guest editor: David Chadwick (University of Kent, UK),
Hang Bae Chang (Daejin University, South Korea),
Ilsun You (Korean Bible University, South Korea),
and Seong-Moo Yoo (University of Alabama in Huntsville, USA)
During the past decades, information security developments have been mainly
concerned with preventing illegal attacks by outsiders, such as hacking,
virus propagation, and spyware. However, according to a recent Gartner
Research Report, information leakage caused by insiders who are legally
authorized to have access to some corporate information is increasing
dramatically. These leakages can cause significant damages such as
weakening the competitiveness of companies (and even countries).
Information leakage caused by insiders occurs less frequently than
information leakage caused by outsiders, but the financial damage is
much greater. Countermeasures in terms of physical, managerial, and
technical aspects are necessary to construct an integral security
management system to protect companies' major information assets
from unauthorized internal attackers. The objective of this special
issue is to showcases the most recent challenges and advances in
security technologies and management systems to prevent leakage of
organizations' information caused by insiders. It may also include
state-of-the-art surveys and case analyses of practical significance.
We expect that the special issue will be a trigger for further research
and technology improvements related to this important subject.
Topics(include but are not limited to):
IFIP-DF 2010 6th Annual IFIP WG 11.9 International Conference on Digital Forensics, University of Hong Kong, Hong Kong, January 3-6, 2010. (Submissions due 15 August 2009)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in the emerging field of digital forensics. The Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
International Journal of Communication Networks and Information Security, Special Issue on Composite and Integrated Security Solutions for Wireless Sensor Networks Spring 2010. (Submission Due 1 September 2009)
Guest editor: Riaz Ahmed Shaikh (Kyung Hee University, Korea),
Al-Sakib Khan Pathan (Kyung Hee University, Korea),
and Jaime Lloret (Polytechnic University of Valencia, Spain)
This special issue is devoted to composite and integrated security solutions
for Wireless Sensor Networks (WSNs). In WSNs, researchers have so far focused
on the individual aspects (cryptography, privacy or trust) of security that are
capable of providing protection against specific types of attacks. However, efforts
on achieving completeness via a composite and integrated solution are lacking.
That is ultimately necessary to attain because of its wide applicability in
various sensitive applications, such as health-care, military, habitat monitoring,
etc. The objective of this special issue is to gather recent advances in the area
of composite and integrated security solutions of wireless sensor networks.
This special issue covers topics that include, but are not limited to:
SAC-DF 2010 25th ACM Symposium on Applied Computing, Computer Forensics Track, Sierre, Switzerland, March 22-26, 2010. (Submissions due 8 September 2009)
With the exponential growth of computer users, the number of criminal activities that involves computers has increased tremendously. The field of Computer Forensics has gained considerable attention in the past few years. It is clear that in addition to law enforcement agencies and legal personnel, the involvement of computer savvy professionals is vital for any digital incident investigation. Unfortunately, there are not many well-qualified computer crime investigators available to meet this demand. An approach to solve this problem is to develop state-of-the-art research and development tools for practitioners in addition to creating awareness among computer users. The primary goal of this track will be to provide a forum for researchers, practitioners, and educators interested in Computer Forensics in order to advance research and educational methods in this increasingly challenging field. We expect that people from academia, industry, government, and law enforcement will share their previously unpublished ideas on research, education, and practice through this track. We solicit original, previously unpublished papers in the following general (non-exhaustive) list of topics:
SAC-TRECK 2010 25th ACM Symposium on Applied Computing, Trust, Reputation, Evidence and other Collaboration Know-how Track (TRECK), Sierre, Switzerland, March 22-26, 2010. (Submissions due 8 September 2009)
Computational models of trust and online reputation mechanisms have been gaining momentum. The goal of the ACM SAC 2010 TRECK track remains to review the set of applications that benefit from the use of computational trust and online reputation. Computational trust has been used in reputation systems, risk management, collaborative filtering, social/business networking services, dynamic coalitions, virtual organisations and even combined with trusted computing hardware modules. The TRECK track covers all computational trust/reputation applications, especially those used in real-world applications. The topics of interest include, but are not limited to:
NDSS 2010 17th Annual Network & Distributed System Security Symposium, San Diego, CA, USA, February 28 - March 3, 2010. (Submissions due 11 September 2009)
The Network and Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security services. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. Submissions are solicited in, but not limited to, the following areas:
Listing of academic positions available by
Cynthia Irvine
Posted April 2009
Technische Universität Darmstadt
Computer Science Department
Darmstadt, Germany
PostDocs and PhD students
Open until filled
http://www.mais.informatik.tu-darmstadt.de/Positions.html
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |