|
|
Conference and Workshop Announcements
Commentary and Opinion
Richard Austin's review of Linux Malware incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data by Cameron Malin, Eoghan Casey and James Aquilina
News Items:
Announcements and correspondence from readers (please contribute!)
Listing of
new academic positions available by
Cynthia Irvine
Department of Computer Science, KU Leuven
Leuven Belgium
Multiple PhD positions in Secure Software
Announcement closes August 31, 2013
https://distrinet.cs.kuleuven.be/jobs
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
new calls or announcements added since Cipher E114
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
SADFE 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering, Hong Kong, November 21-22, 2013. (Submissions due 16 July 2013)
We invite you to SADFE-2013, the eighth international conference on Systematic Approaches to Digital Forensic Engineering to be held in Hong Kong, China, November 21-22, 2013. SADFE-2013 investigates the application of digital forensic engineering expertise to advance a variety of goals, including criminal and corporate investigations, as well as documentation of individual and organizational activities. We believe digital forensic engineering is vital to security, the administration of justice and the evolution of culture. We welcome previously unpublished papers on digital forensics, security and preservation as to civil, criminal and national security investigations for use within a court of law, the execution of national policy or to aid in understanding the past and digital knowledge in general. Potential topics to be addressed by submissions include, but are not limited to:
PROOFS 2013 2nd International Workshop on Security Proofs for Embedded Systems, Santa Barbara, California, USA, August 24, 2013. (Submissions due 20 July 2013)
Formal methods are used to increase the confidence level in system designs. They are customarily used for safety and dependability testing. The focus of the PROOFS workshop is the study of formal methods applied at the design stage with a view to preventing implementation-level attacks. As analog devices (random number generation, physically unclonable functions, etc.) are involved in some protection schemes, their experimental security proof are also emerging as a hot topic. Thus the workshop welcomes contributions in the following fields:
TClouds 2013 Workshop on Trustworthy Clouds, Co-located with ESORICS 2013, Egham, U.K, September 12-13, 2013. (Submissions due 21 July 2013)
The workshop aims at bringing together researchers and practitioners working in cryptography, security, and distributed systems, from academia and industry, who are interested in the security and resilience of cloud computing. Security and resilience are widely regarded as a key concern for cloud-service providers, who want to protect their platforms and isolate tenants, as well as for cloud-customers, who want to minimize exposure of their data and computations. The goal is to create a dialogue about common goals and to discuss solutions for security problems in cloud computing, relying on operating system techniques, secure distributed protocols, cryptographic methods, and the trusted computing paradigm. Topics include cryptographic protocols, secure virtualization mechanisms, resilient distributed protocols, privacy and integrity for outsourced data, trusted computing etc.
VizSec 2013 10th International Symposium on Visualization for Cyber Security, Atlanta GA, USA, October 14, 2013. (Submissions due 22 July 2013)
The 10th International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization and analysis techniques. VizSec will provide an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics. Important research problems often lie at the intersection of disparate domains. Our focus is to explore effective, scalable visual interfaces for security domains, where visualization may provide a distinct benefit, including computer forensics, reverse engineering, insider threat detection, cryptography, privacy, preventing 'user assisted' attacks, compliance management, wireless security, secure coding, and penetration testing in addition to traditional network security. Human time and attention are precious resources. We are particularly interested in visualization and interaction techniques that effectively capture human analyst insights so that further processing may be handled by machines, freeing the analyst for other tasks. For example, a malware analyst might use a visualization system to analyze a new piece of malicious software and then facilitate generating a signature for future machine processing. When appropriate, research that incorporates multiple data sources, such as network packet captures, firewall rule sets and logs, DNS logs, web server logs, and/or intrusion detection system logs, is particularly desirable.
SPSM 2013 3rd Workshop on Security and Privacy in Smartphones and Mobile Devices, Held in conjunction with the ACM CCS 2013, Berlin, Germany, November 8, 2013. (Submissions due 22 July 2013)
The SPSM workshop intends to provide a venue for interested researchers and practitioners to get together and exchange ideas. The workshop will deepen our understanding of various security and privacy issues on smartphones. As with the two very well received previous editions, the topics of interest to SPSM 2013 include (but are not limited to) the following subject categories:
TrustED 2013 3rd International Workshop on Trustworthy Embedded Devices, Collocated with the ACM Conference on Computer & Communications Security (CCS) 2013, Berlin, Germany, November 4, 2013. (Submissions due 22 July 2013)
In this workshop we consider selected aspects of cyber physical systems and their environments. We aim to bring together experts from academia, research institutions, industry, and government to discuss problems, challenges, and some recent scientific and technological developments in this field. In particular, we are keenly interested in the participation of industry representatives. The workshop topics include, but are not limited to:
NDSS 2014 21st Annual Network and Distributed System Security Symposium, San Diego, California, USA, February 23-26, 2014. (Submissions due 5 August 2013)
The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technologies. Submissions are solicited in, but not limited to, the following areas:
ATC 2013 10th IEEE International Conference on Autonomic and Trusted Computing, Sorrento Peninsula, Italy, December 18-21, 2013. (Submissions due 15 August 2013)
Computing systems including hardware, software, communication, and networks are growing towards an ever-increasing scale and heterogeneity, becoming overly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, Autonomic Computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-x operations to the maximum extent possible without human intervention or guidance. Organic Computing (OC) additionally addresses adaptivity, robustness, and controlled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/Trustworthy Computing (TC) aims at making computing and communication systems as well as services available, predictable, traceable, controllable, assessable, sustainable, dependable, persistent, security/privacy protectable, etc. ATC 2013 will offer a forum for researchers to exchange ideas and experiences in the most innovative research and development in these challenging areas and includes all technical aspects related to autonomic/organic computing (AC/OC) and trusted computing (TC).
ESSOS 2014 6th International Symposium on Engineering Secure Software and Systems, Munich, Germany, February 26-28, 2014. (Submissions due 6 September 2013)
Trustworthy, secure software is a core ingredient of the modern world. So is the Internet. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software's security properties. The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to):
SAC-SEC 2014 29th ACM Symposium on Applied Computing, Computer Security track, Gyeongju, Korea, March 24-28, 2014. (Submissions due 13 September 2013)
For the past twenty-eight years, the ACM Symposium on Applied Computing has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the world. The Security Track reaches its thirteenth edition this year, thus appearing among the most established tracks in the Symposium. The list of issues remains vast, ranging from protocols to work-flows. Topics of interest include but are not limited to:
IFIP119-DF 2014 10th Annual IFIP WG 11.9 International Conference on Digital Forensics, Vienna University of Technology, Vienna, Austria, January 8-10, 2014. (Submissions due 15 September 2013)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately sixty participants to facilitate interactions between researchers and intense discussions of critical research issues. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
POST 2014 3rd Conference on Principles of Security and Trust, Grenoble, France, April 7-11, 2014. (Submissions due 4 October 2013)
Principles of Security and Trust is a broad forum related to the theoretical and foundational aspects of security and trust. Papers of many kinds are welcome: new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems. We seek submissions proposing theories to clarify security and trust within computer science; submissions establishing new results in existing theories; and also submissions raising fundamental concerns about existing theories. We welcome new techniques and tools to automate reasoning within such theories, or to solve security and trust problems. Case studies that reflect the strengths and limitations of foundational approaches are also welcome, as are more exploratory presentations on open questions. Areas of interest include:
IEEE Transactions on Reliability, Special Section on Trustworthy Computing, 2014, (Submission Due 1 November 2013)
Editors: Shiuhpyng Winston Shieh (National Chiao Tung University, Taiwan)
Trustworthy Computing (TC) has been applied to software-enabled computing systems
and networks that are inherently secure, private, available, and reliable. As the
fast growing mobile cloud computing emerges to cover smart phones, tablets,
smart TV, and cloud computing platforms, these ubiquitous computing devices
poses new challenges to trustworthy computing. Cloud computing offers
organizations of all sizes the ability to embrace and implement new applications
at far less cost than traditional approaches. Organizations that move workloads
to the cloud take advantage of the capabilities of their cloud providers to
ensure continuous availability of services. However, the ever-growing complexity
of such systems and the software that controls them not only makes it much more
difficult to guarantee their quality, but also introduces more vulnerability for
malicious attacks, intrusion, and data loss. To address these needs, this
special section calls for novel applications of emerging techniques for
trustworthy computing of information, software, systems, networks. Reviews
and case studies which address state-of-art research and state-of-practice
industry experiences are also welcomed. The topics of interest include,
but are not limited to:
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TCSP | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |