|
|
Commentary and Opinion
Richard Austin's review of Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control System by Eric D. Knapp
NewsBits:
Announcements and correspondence from readers (please contribute!)
We have heard of the death of H.O. Lubbes, a pioneer
computer security and
assurance.Washington Post notice
Listing of academic positions available by
Cynthia Irvine
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
new calls or announcements added since Cipher E104
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
WiSec 2012 ACM Conference on Wireless Network Security, Tucson, Arizona, USA, April 16-18, 2012. (Submissions due 22 November 2011)
As wireless and mobile networking becomes ubiquitous, security and privacy become increasingly critical. The focus of the ACM Conference on Wireless Network Security (ACM WiSec) is on exploring vulnerabilities, threats, and attacks in wireless communications and the techniques needed to address them. Settings of interest include cellular, metropolitan, mesh, local-area, personal-area, home, vehicular, sensor, ad hoc, satellite, cognitive radio, RFID, and underwater networks as well as systems using non-RF wireless communication. The conference is soliciting contributions to topics including but not limited to:
SFCS 2012 1st IEEE International Workshop on Security and Forensics in Communication Systems, Held in conjunction with IEEE ICC 2012, Ottawa, Canada, June 10-15, 2012. (Submissions due 30 November 2011)
Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker's motivation for an efficient design of security solutions. In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents and generate conclusive descriptions. The SFCS 2012 Workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. Topics of interest include, but are not limited to:
Elsevier Computer Networks, Special Issue on Botnet Activity: Analysis, Detection and Shutdown, 2012, (Submission Due 1 December 2011)
Editors: Ronaldo Salles (Military Institute of Engineering, Brazil),
Guofei Gu (Texas A&M University, USA),
Thorsten Holz (Ruhr-University Bochum, Germany),
and Morton Swimmer (Trend Micro Deutschland, Germany)
Large scale attacks and criminal activities experienced in recent years have
exposed the Internet to serious security breaches, and alarmed the world
regarding cyber crime. In the center of this problem are the so called
botnets -- collections of infected zombie machines (bots) controlled by
the botmaster to perpetrate malicious activities and massive attacks.
Some recent botnets are composed of millions of infected machines,
making use of this attack vector inevitably harmfully. Hence, it is
paramount to detect, analyze and shutdown such overlay networks
before they become active. This special issue of Computer Networks is
intended to foster the dissemination of high quality research in all
aspects regarding botnet activity, detection and countermeasures. The
objective of this special issue is to publish papers presenting
detection algorithms, traffic monitoring and identification, protocols
and architectures, as well as botnet modeling, behavior, simulation,
statistics, dissemination, analysis, preventive procedures and
possible countermeasures. Only technical papers describing previously
unpublished, original, state-of-the-art research, and not currently
under review by a conference or journal will be considered. We solicit
papers in a variety of topics related to botnet research including,
but not limited to:
IFIP-CIP 2012 6th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, National Defense University, Fort McNair, Washington, DC, USA, March 19-21, 2012. (Submissions due 1 December 2011)
The IFIP Working Group 11.10 on Critical Infrastructure Protection is an active international community of researchers, infrastructure operators and policy-makers dedicated to applying scientific principles, engineering techniques and public policy to address current and future problems in information infrastructure protection. Following the success of the first five conferences, the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection will again provide a forum for presenting original, unpublished research results and innovative ideas related to all aspects of critical infrastructure protection. Papers and panel proposals are solicited. Submissions will be refereed by members of Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.10. The conference will be limited to seventy participants to facilitate interactions among researchers and intense discussions of research and implementation issues. Papers are solicited in all areas of critical infrastructure protection. Areas of interest include, but are not limited to:
ASIACCS 2012 7th ACM Symposium on Information, Computer and Communications Security, Seoul, Republic of Korea, May 1-3, 2012. (Submissions due 8 December 2011)
ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2012 include, but are not limited to:
COSADE 2012 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, May 3-4, 2012. (Submissions due 12 December 2011)
Side-channel analysis (SCA) and implementation attacks have become an important field of research at universities and in the industry. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design- and development process. This workshop provides an international platform for researchers, academics, and industry participants to present their work and their current research topics. It is an excellent opportunity to meet experts and to initiate new collaborations and information exchange at a professional level. The workshop will feature both invited presentations and contributed talks.
ICDCS-NFSP 2012 1st International Workshop on Network Forensics, Security and Privacy, Held in conjunction with ICDCS 2012, Macau, China, June 18-21, 2012. (Submissions due 8 January 2012)
Cyber space has become an integrated part of human society. At the same time, has also been providing convenient platforms for crimes, such as financial fraud, information phishing, distributed denial of service attacks, and fake message propagation. Especially, the emergence of social networks has introduced significant security and privacy issues to the public. It is a great and new challenge of fighting against criminals in the cyber space. This field involved various disciplines, such as networking, information theory, mathematical modelling, data mining, machine learning, image and voice processing, neural network, pattern recognition, cryptography and forensic criminology. Topics of interest include, but not limited to:
ICDCS-SPCC 2012 3rd International Workshop on Security and Privacy in Cloud Computing, Held in conjunction with ICDCS 2012, Macau, China, June 18-21, 2012. (Submissions due 8 January 2012)
Cloud computing has recently emerged as a new information technology infrastructure. Cloud computing has unique attributes that raise many security and privacy challenges in areas such as data security, recovery, and privacy, as well as legal issues in areas such as regulatory compliance and auditing. In contrast to traditional enterprise IT solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the servers in large data centers on the Internet, where the management of the data and services are not fully trustworthy. When clients store their data on the server without themselves possessing a copy of it, how the integrity of the data can be ensured if the server is not fully trustworthy? Will encryption solve the data confidentiality problem of sensitive data? How will encryption affect dynamic data operations such as query, insertion, modification, and deletion? Data in the cloud is typically in a shared environment alongside data from other clients. How the data segregation should be done, while data are stored, transmitted, and processed? Due to the fundamental paradigm shift in cloud computing, many security concerns have to be better understood, unanticipated vulnerabilities identified, and viable solutions to critical threats devised, before the wide deployment of cloud computing techniques can take place. We are soliciting both full papers that present relatively complete and mature research results and short position papers that report work-in-progress but inspiring and intriguing new ideas. Topics of interests include (but are not limited to) the following subject categories:
SEC 2012 27th IFIP International Information Security and Privacy Conference, Creta Maris Hotel, Heraklion, Crete, Greece, June 4-6, 2012. (Submissions due 10 January 2012)
Papers offering novel research contributions in any aspect of computer security are solicited for submission to the 27th IFIP International Information Security and Privacy Conference. The focus is on original, high quality, unpublished research and implementation experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. We encourage submissions of papers discussing industrial research and development. Papers should focus on topics which include, but are not limited to, the following:
SACMAT 2012 17th ACM Symposium on Access Control Models and Technologies, Newark, NJ, USA, June 20-22, 2012. (Submissions due 13 January 2012)
Papers offering novel research contributions in all aspects of access control are solicited for submission to SACMAT 2012. It is the premier forum for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The missions of the symposium are to share novel access control solutions that fulfill the needs of heterogeneous applications and environments and to identify new directions for future research and development. SACMAT gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of access control. Accepted papers will be presented at the symposium and published by the ACM in the symposium proceedings. Best Paper Award will be presented to the authors of the most outstanding paper at the conference. Topics of interest include but are not limited to:
ACNS 2012 10th International Conference on Applied Cryptography and Network Security, Singapore, June 26-29, 2012. (Submissions due 5 February 2012)
The conference seeks submissions from academia, industry, and government presenting novel research on all aspects of applied cryptography as well as network security and privacy. Papers describing novel paradigms, original directions, or non-traditional perspectives are also encouraged. The conference has two tracks: a research track and an industry track. Topics of interest include, but are not limited to:
PETS 2012 12th Privacy Enhancing Technologies Symposium, Vigo, Spain, July 11-13, 2012. (Submissions due 20 February 2012)
Privacy and anonymity are increasingly important in the online world. Corporations, governments, and other organizations are realizing and exploiting their power to track users and their behavior. Approaches to protecting individuals, groups, but also companies and governments, from profiling and censorship include decentralization, encryption, distributed trust, and automated policy disclosure. The 12th Privacy Enhancing Technologies Symposium addresses the design and realization of such privacy services for the Internet and other data systems and communication networks by bringing together anonymity and privacy experts from around the world to discuss recent advances and new perspectives. The symposium seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. We encourage submissions with novel technical contributions from other communities such as law, business, and data protection authorities, that present their perspectives on technological issues. As in the past, the proceedings will be published in the Springer Lecture Notes in Computer Science series, and will be available at the event. Suggested topics include but are not restricted to:
CHES 2012 IACR Workshop on Cryptographic Hardware and Embedded Systems, Leuven, Belgium, September 9-12, 2012. (Submissions due 5 March 2012)
CHES covers new results on all aspects of the design and analysis of cryptographic
hardware and software implementations. The workshop builds a bridge between the
cryptographic research community and the cryptographic engineering community.
With participants from industry, academia, and government organizations, the
number of participants has grown to over 300 in recent years. In addition to
a track of high-quality presentations, CHES 2012 will offer invited talks,
tutorials, a poster session, and a rump session. CHES 2012 especially
encourages submissions on the following two subjects: Design Methods to
Build Secure and Efficient Hardware or Software, and Leakage Resilient
Cryptography Including New Model Definitions and Analysis and the Design
of New Cryptosystems. All submitted papers will be reviewed by at least
four Program Committee members. The topics of CHES 2012 include but are
not limited to:
Cryptographic implementations, including
IEEE Internet Computing, Track Articles on Computer Crime, 2012, (Submission will be accepted for this track from 15 July 2011 to 15 July 2012)
Editors: Nasir Memon (New York University, USA) and Oliver Spatscheck (AT&T, USA)
As the Internet has grown and extended its reach into every part of people's
lives, it shouldn't be surprising that criminals have seized the opportunity
to expand their activities into this new realm. This has been fostered in
particular by the fact that the Internet was designed as an open and trusting
environment. Unfortunately many of these architectural choices are fundamental
to the Internet's success and current architecture and are therefore hard to
overcome. Computer crime ranges from rather simple crimes such as theft of
intellectual property or computer and network resources to complex cooperate
espionage or even cyber terrorism. This special track for Internet Computing
seeks original articles that cover computer crime as it relates to the
Internet. Appropriate topics include:
Staying in touch....
Who's where: recent address changes Ted Lee announced his retirement; his email address remains unchanged, the same one he has had for 25 years.
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |