|
|
Conference and Workshop Announcements
Commentary and Opinion
Richard Austin's review of Cyber War Will Not Take Place by Thomas Rid
News Bits: From the media, and also announcements and correspondence from readers (please contribute!)
Listing of academic positions available by
Cynthia Irvine
New:
Posted Oct 2013
Department of Computer Science, TU, Darmstadt
Darmstadt, Germany
Multiple Ph.D. and PostDoc positions in Mobile Software Security and Security Engineering
Application deadline for all positions: 08 Nov 2013. However, applications will be considered until the positions are filled.
http://www.mais.informatik.tu-darmstadt.de/Positions.html
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
new calls or announcements added since Cipher E116
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
IEEE Computers, Special Issue on Methodologies and Solutions for Mobile Application Security, June 2014, (Submission Due 15 December 2013)
Editors: Ying-Dar Lin (National Chiao Tung University, Hsinchu, Taiwan),
Chun-Ying Huang (National Taiwan Ocean University, Taiwan),
Matthew Wright (University of Texas at Arlington),
and Georgios Kambourakis (University of the Aegean, Greece)
With the ubiquitous use of mobile devices, mobile application security has
become an important research topic. Compared with personal computers or servers,
mobile devices store much more sensitive personal information and are thus
attractive targets for attackers seeking financial gain. Because these
devices are always online and have a restricted user interface, it is
easier for attackers to hide their malicious activities. This special
issue aims to present high-quality articles describing security
algorithms, protocols, policies, and frameworks for applications
running on modern mobile platforms such as Android, iOS, and Windows
Mobile. Only submissions describing previously unpublished,
original, state-of-the-art research that are not currently under
review by a conference or journal will be considered. Appropriate
topics include, but are not limited to, the following:
Journal of Cyber Security and Mobility, Special issue on Next generation mobility network security, July 2014, (Submission Due 15 December 2013)
Editor: Roger Piqueras Jover (AT&T Security Research Center)
The Long Term Evolution (LTE) is the newly adopted standard technology to offer
enhanced capacity and coverage for mobility networks, providing advanced
multimedia services beyond traditional voice and short messaging traffic
for billions of users. This new cellular communication system introduces a
substantial redesign of the network architecture resulting in the new
eUTRAN (Enhanced Universal Terrestrial Radio Access Network) and the EPC
(Enhanced Packet Core). In this context, the LTE Radio Access Network
(RAN) is built upon a redesigned physical layer and based on an
Orthogonal Frequency Division Multiple Access (OFDMA) modulation, features
robust performance in challenging multipath environments and substantially
improves capacity. Moreover, a new all-IP core architecture is designed to
be more flexible and flatter. In parallel, the cyber-security landscape
has changed drastically over the last few years. It is now characterized
by large scale security threats such as massive Distributed Denial of
Service Attacks (DDoS), the advent of the Advanced Persistent Threat
(APT) and the surge of mobile malware and fraud. These new threats
illustrate the importance of strengthening the resiliency of mobility
networks against security attacks, ensuring this way full mobility
network availability. In this context, however, the scale of the threat
is not the key element anymore and traditionally overlooked low range
threats, such as radio jamming, should also be included in security
studies. This special issue of the Journal of Cyber Security and
Mobility addresses research advances in mobility threats and new
security applications/architectures for next generation mobility
networks. The main topics of interest of this issue include, but are
not limited to, the following:
COSADE 2014 5th International Workshop on Constructive Side-Channel Analysis and Secure Design, Paris, France, April 14-15, 2014. (Submission Due 15 December 2013)
Side-channel analysis (SCA) and implementation attacks have become an important field of research at universities and in the industry. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design and development process. Since 2010, COSADE provides an international platform for researchers, academics, and industry participants to present their work and their current research topics. It is an excellent opportunity to exchange on new results with international experts and to initiate new collaborations and information exchange at a professional level. The workshop will feature both invited presentations and contributed talks. The topics of COSADE 2014 include, but are not limited to:
IEEE Security and Privacy Magazine, Special Issue on Security for Energy Sector Control Systems, November/December 2014, (Submission Due 1 January 2014)
Editor: Sean Peisert (Lawrence Berkeley National Laboratory and University of
California, Davis, USA) and Jonathan Margulies (National Institute of
Standards and Technology, USA)
Control systems used in the energy sector present unusual security and reliability
challenges: The installed base is often decades old, systems are commonly installed
in adverse physical conditions, bandwidth and communication reliability can be very
low, with tight performance timelines, and, most important, failure can result in
destruction of critical physical systems or loss of life. This special issue seeks
articles that can help lead to solutions that can be shown to improve the security
and reliability of power systems, including control systems related to generation,
transmission, distribution, and consumption or use, such as in industrial plant
operations, commercial buildings, or homes. Such solutions might be purely
technical, or could be social, policy-related, or some combination. Articles
should address questions such as:
IFIP-SEC 2014 29th IFIP TC-11 SEC 2014 International Conference ICT Systems Security and Privacy Protection, Marrakech, Morocco, June 2-4, 2014. (Submission Due 20 January 2014)
This conference is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 on Security and Privacy Protection in Information Processing Systems (TC-11, www.ifiptc11.org). We seek submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy protection in ICT Systems. Topics of interest include, but are not limited to:
DIMVA 2014 11th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Royal Holloway London, Egham, UK, July 10-11, 2014. (Submission Due 8 February 2014)
The annual DIMVA conference serves as a premier forum for advancing the state
of the art in intrusion detection, malware detection, and vulnerability assessment.
Each year, DIMVA brings together international experts from academia, industry,
and government to present and discuss novel research in these areas. DIMVA is
organized by the special interest group "Security - Intrusion Detection and
Response" (SIDAR) of the German Informatics Society (GI). The conference
proceedings will appear as a volume in the Springer Lecture Notes in Computer
Science (LNCS) series (approval pending). DIMVA encourages submissions
from the following broad areas:
Intrusion Detection
RFIDSec 2014 10th Workshop on RFID Security, Co-located with ACM WiSec 2014, Oxford, United Kingdom, July 21-23, 2014. (Submission Due 1 March 2013)
RFIDsec is the premier workshop devoted to security and privacy in Radio Frequency Identification (RFID) with participants throughout the world. RFIDsec brings together researchers from academia and industry for topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers through invited talks and contributed presentations. Topics of interest include:
WiSec 2014 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Oxford, United Kingdom, July 21-25, 2014. (Submission Due 3 March 2013)
ACM WiSec has been broadening its scope and seeks to present high quality research papers exploring security and privacy aspects of wireless communications, mobile networks, and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the security and privacy of mobile software platforms, usable security and privacy, biometrics and the increasingly diverse range of mobile or wireless applications. The conference welcomes both theoretical as well as systems contributions. Topics of interest include, but are not limited to:
WISTP 2014 8th Workshop in Information Security Theory and Practice, Heraklion, Greece, June 23-25, 2014. (Submission Due 7 March 2014)
Future ICT technologies, such as the concepts of Ambient Intelligence,
Cyber-physical Systems and Internet of Things provide a vision of the Information
Society in which: a) people and physical systems are surrounded with intelligent
interactive interfaces and objects, and b) environments are capable of recognising
and reacting to the presence of different individuals or events in a seamless,
unobtrusive and invisible manner. The success of future ICT technologies will
depend on how secure these systems may be, to what extent they will protect
the privacy of individuals and how individuals will come to trust them. WISTP 2014
aims to address security and privacy issues of smart devices, networks,
architectures, protocols, policies, systems, and applications related to Internet
of Things, along with evaluating their impact on business, individuals, and the
society. The workshop seeks original submissions from academia and industry
presenting novel research on all theoretical and practical aspects of security
and privacy of Internet of Things, as well as experimental studies of fielded
systems, the application of security technology, the implementation of systems,
and lessons learned. We encourage submissions from other communities such as
law, business, and policy that present these communities' perspectives on
technological issues. Topics of interest include, but are not limited to:
Security and Privacy in Smart Devices
Staying in touch....
Who's where: recent address changes
Ted Lee has announced a new email address.
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TCSP | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |