![]() |
|
Conference and Workshop Announcements
Commentary and Opinion
Bill Blunden, The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System (2ed), Review by Richard Austin
NewsBits: From the media: security related news (please contribute!)
Listing of academic positions available by
Cynthia Irvine
(nothing new since Cipher E117)
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
new calls or announcements added since Cipher E117
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
IFIP-SEC 2014 29th IFIP TC-11 SEC 2014 International Conference ICT Systems Security and Privacy Protection, Marrakech, Morocco, June 2-4, 2014. (Submission Due 20 January 2014)
This conference is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 on Security and Privacy Protection in Information Processing Systems (TC-11, www.ifiptc11.org). We seek submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy protection in ICT Systems. Topics of interest include, but are not limited to:
Elsevier Information Science, Special Issue on Security, Privacy and trust in network-based Big Data, December 2014, (Submission Due 25 January 2014)
Editor: Xiaohong Jiang (Future University Hakodate, Japan),
Hua Wang (University of Southern Queensland, Australia),
and Georgios Kambourakis (University of the Aegean, Greece)
The aim of the special issue is to present leading edge work concerning
privacy protection issues and security challenges in the rapidly emerging
field of network-based Big Data. Research that addresses organisational and
enterprise solutions for privacy protection and information security in Big
Data environments will also be presented. Both papers dealing with fundamental
theory, techniques, applications, and practical experiences concerning secure
Big Data will be considered. The scope of the special issue includes
(but is not limited to):
CSF 2014 27th IEEE Computer Security Foundations Symposium, Vienna University of Technology, Vienna, Austria, July 19 - 22, 2014. (Submission Due 3 February 2014)
The Computer Security Foundations Symposium is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, e.g., formal security models, relationships between security properties and defenses, principled techniques and tools for design and analysis of security mechanisms, as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security: submissions that lack foundational aspects risk rejection. New results in computer security are welcome. Possible topics include, but are not limited to: access control, accountability, anonymity, authentication, critical infrastructure security, cryptography, data and system integrity, database security, decidability and complexity, distributed systems, electronic voting, executable content, formal methods and verification, game theory and decision theory, hardware-based security, humans and computer security, information flow, intrusion detection, language-based security, network security, novel insights on attacks, privacy, provenance, resource usage control, security for mobile computing, security models, security protocols, software security, socio-technical security, trust management, usable security, web security.
DIMVA 2014 11th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Royal Holloway London, Egham, UK, July 10-11, 2014. (Submission Due 8 February 2014)
The annual DIMVA conference serves as a premier forum for advancing the state
of the art in intrusion detection, malware detection, and vulnerability assessment.
Each year, DIMVA brings together international experts from academia, industry,
and government to present and discuss novel research in these areas. DIMVA is
organized by the special interest group "Security - Intrusion Detection and
Response" (SIDAR) of the German Informatics Society (GI). The conference
proceedings will appear as a volume in the Springer Lecture Notes in Computer
Science (LNCS) series (approval pending). DIMVA encourages submissions
from the following broad areas:
Intrusion Detection
PETS 2014 14th Privacy Enhancing Technologies Symposium, Amsterdam, Netherlands, July 16-18, 2014. (Submission Due 10 February 2014)
The Privacy Enhancing Technologies Symposium (PETS) aims to advance the state of the art and foster a world-wide community of researchers and practitioners to discuss innovation and new perspectives. Suggested topics include but are not restricted to:
IWCC 2014 International Workshop on Cyber Crime, Held in conjunction with the IEEE CS Security & Privacy Workshops (SPW 2014), Fairmont Hotel, San Jose, CA, USA, May 17-18, 2014. (Submission Due 10 February 2014)
Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals. Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders. This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies. The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches. Topics of interest include, but are not limited to:
DASec 2014 1st International Workshop on Big Data Analytics for Security, Held in conjunction with ICDCS 2014, Madrid, Spain, June 30 - July 3, 2014. (Submission Due 10 February 2014)
In the last 10 years we have witnessed a strong integration of several human activities with computers and digital networks. This has led to an interconnected economy, where interactions occur through the mediation of networked devices. The openness of this scenario was instrumental in creating new business opportunities. However, it has also paved the way to new forms of criminal activities that, while happening in the cyber domain, have strong implications in the real world. The current trend towards an Internet of Things will possibly worsen this scenario. In this context, private companies and public bodies struggle to defend their businesses against a deluge of attacks spanning from complex online frauds to malicious scanning activities of their IT infrastructures. As attacks continue to grow in complexity, classic "border-control" approaches to system security quickly prove to be ineffective, calling for an investigation into new methodologies and solutions. At the same time, ongoing research efforts on "Big Data" systems are devising new and innovative methodologies to manage and analyze large amounts of data with the aim of recognizing specific patterns and behaviors. The First International Workshop on Big Data Analytics for Security aims to bring together people from both academia and industry to present their most recent work related to trust, security and privacy issues in big data analytics, together with application of big data technologies in the field of security. The purpose is to establish if and how large-scale data analytics technologies can help in creating new security solutions for today's complex IT infrastructures.
SACMAT 2014 19th ACM Symposium on Access Control Models and Technologies, London, Ontario, Canada, June 25-27, 2014. (Submission Due 13 February 2014)
Papers offering novel research contributions in all aspects of access control are solicited for submission to the 19th ACM Symposium on Access Control Models and Technologies (SACMAT 2014). We have expanded the scope to include several new topics that have relevance to access control. These include cyber-physical systems, applications, systems, hardware, cloud computing, and usability. The Program Committee for this year reflects this expanded scope.
IEEE Internet of Things Journal, Special Issue on Security for IoT: the State of the Art, October 2014, (Submission Due 15 February 2014)
Editor: Kui Ren (University at Buffalo, USA), Pierangela Samarati
(University of Milan, Italy), Peng Ning (NCSU, Raleigh & Samsung Mobile, USA),
Marco Gruteser (Rutgers University, USA),
and Yunhao Liu (Tsinghua University, China)
The Internet is becoming more and more ubiquitous. One central element of
this trend is the existence of a massive network of interconnected wired/wireless
physical objects/things/sensors/devices, which can interact in a rich set of
manners through a worldwide communication and information infrastructure and
provide value added services. The vision of such an Internet of Things (IoT)
system, supported by industrial companies and governments globally, has the
potential to mark an evolution that will surely have a great impact on our
environments and our lives. Yet, the realization of a ubiquitous IoT also
poses a number of challenges where security is among the top concerns. The
globally interconnected physical objects inevitably result in a potentially
enormous attack surface that can be easily exploited if without adequate
protection. To enable strong security foundations for the ubiquitous IoT,
plenty of factors need to be taken into account. Examples are data security,
privacy, access control, information assurance, trust management, secure
services interoperability, seamless integration, system heterogeneity,
scalability, and mobility. This special issue solicits high-quality original
research results about IoT that pertain to state-of-the-art security and
privacy issues in various pervasive and ubiquitous scenarios. We encourage
submissions on theoretical, practical, as well as experimental studies, from
both academia and industry, related to all aspects of security for IoT.
Topics of interests include (but are not limited to) the following categories:
WEIS 2014 13th Annual Workshop on the Economics of Information Security, Pennsylvania State University, PA, USA, June 23-24, 2014. (Submission Due 28 February 2014)
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security and privacy, combining expertise from the fields of economics, social science, business, law, policy, and computer science. Prior workshops have explored the role of incentives between attackers and defenders of information systems, identified market failures surrounding Internet security, quantified risks of personal data disclosure, and assessed investments in cyber-defense. The 2014 workshop will build on past efforts using empirical and analytic tools not only to understand threats, but also to strengthen security and privacy through novel evaluations of available solutions. We encourage economists, computer scientists, legal scholars, business school researchers, security and privacy specialists, as well as industry experts to submit their research and participate by attending the workshop. Suggested topics include (but are not limited to) empirical and theoretical studies of:
SOUPS 2014 Symposium On Usable Privacy and Security, In-cooperation with USENIX, Menlo Park, CA, USA, July 9-11, 2014. (Submission Due 28 February 2014)
The 2014 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. The program will feature technical papers, a poster session, panels and invited talks, lightning talks and demos, and workshops and tutorials. This year SOUPS will be held at Facebook in Menlo Park, CA. We invite authors to submit original papers describing research or experience in all areas of usable privacy and security. Topics include, but are not limited to:
Journal of Cyber Security and Mobility, Special issue on Next generation mobility network security, July 2014, (Submission Due 1 March 2014)
Editor: Roger Piqueras Jover (AT&T Security Research Center)
The Long Term Evolution (LTE) is the newly adopted standard technology to offer
enhanced capacity and coverage for mobility networks, providing advanced
multimedia services beyond traditional voice and short messaging traffic
for billions of users. This new cellular communication system introduces a
substantial redesign of the network architecture resulting in the new
eUTRAN (Enhanced Universal Terrestrial Radio Access Network) and the EPC
(Enhanced Packet Core). In this context, the LTE Radio Access Network
(RAN) is built upon a redesigned physical layer and based on an
Orthogonal Frequency Division Multiple Access (OFDMA) modulation, features
robust performance in challenging multipath environments and substantially
improves capacity. Moreover, a new all-IP core architecture is designed to
be more flexible and flatter. In parallel, the cyber-security landscape
has changed drastically over the last few years. It is now characterized
by large scale security threats such as massive Distributed Denial of
Service Attacks (DDoS), the advent of the Advanced Persistent Threat
(APT) and the surge of mobile malware and fraud. These new threats
illustrate the importance of strengthening the resiliency of mobility
networks against security attacks, ensuring this way full mobility
network availability. In this context, however, the scale of the threat
is not the key element anymore and traditionally overlooked low range
threats, such as radio jamming, should also be included in security
studies. This special issue of the Journal of Cyber Security and
Mobility addresses research advances in mobility threats and new
security applications/architectures for next generation mobility
networks. The main topics of interest of this issue include, but are
not limited to, the following:
IEEE Pervasive Computing, Special issue on Pervasive Privacy and Security, January-March 2015, (Submission Due 1 March 2014)
Editor: Sunny Consolvo (Google, USA),
Jason Hong (Carnegie Mellon University, USA),
and Marc Langheinrich (University of Lugano, Switzerland)
Society is increasingly relying on pervasive computing technologies in all
domains. However, with the growing adoption of these technologies, we are also
seeing more and more issues related to privacy and security. The aim of this
special issue is to explore technologies related to all aspects of privacy
and security in pervasive computing. Relevant topics for this special issue
include, but are not limited to, the following:
RFIDSec 2014 10th Workshop on RFID Security, Co-located with ACM WiSec 2014, Oxford, United Kingdom, July 21-23, 2014. (Submission Due 1 March 2013)
RFIDsec is the premier workshop devoted to security and privacy in Radio Frequency Identification (RFID) with participants throughout the world. RFIDsec brings together researchers from academia and industry for topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers through invited talks and contributed presentations. Topics of interest include:
WiSec 2014 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Oxford, United Kingdom, July 21-25, 2014. (Submission Due 3 March 2013)
ACM WiSec has been broadening its scope and seeks to present high quality research papers exploring security and privacy aspects of wireless communications, mobile networks, and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the security and privacy of mobile software platforms, usable security and privacy, biometrics and the increasingly diverse range of mobile or wireless applications. The conference welcomes both theoretical as well as systems contributions. Topics of interest include, but are not limited to:
MOST 2014 Mobile Security Technologies Workshop, An event of the IEEE Computer Society's Security and Privacy Workshops (SPW 2014), Co-located with the 34th IEEE Symposium on Security and Privacy (IEEE S&P 2014), San Jose, CA, USA, May 17, 2014. (Submission Due 3 March 2014)
Mobile Security Technologies (MoST) brings together researchers, practitioners, policy makers, and hardware and software developers of mobile systems to explore the latest understanding and advances in the security and privacy for mobile devices, applications, and systems. We are seeking both short position papers (2-4 pages) and longer papers (a maximum of 10 pages). The scope of MoST 2014 includes, but is not limited to, security and privacy specifically for mobile devices and services related to:
CNS 2014 2nd IEEE Conference on Communications and Network Security, San Francisco, CA, USA, October 29-31, 2014. (Submission Due 7 March 2014)
IEEE Conference on Communications and Network Security (CNS) is a new conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cyber security. IEEE CNS is a spin-off of IEEE INFOCOM, the premier ComSoc conference on networking. The goal of CNS is to provide an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security. Building on the success of last year's inaugural conference, IEEE CNS 2014 seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, all the way from the physical layer to the various network layers to the variety of applications reliant on a secure communication substrate. Submissions with main contribution in other areas, such as information security, software security, system security, or applied cryptography, will also be considered if a clear connection to secure communications/networking is demonstrated.
WISTP 2014 8th Workshop in Information Security Theory and Practice, Heraklion, Greece, June 23-25, 2014. (Submission Due 7 March 2014)
Future ICT technologies, such as the concepts of Ambient Intelligence,
Cyber-physical Systems and Internet of Things provide a vision of the Information
Society in which: a) people and physical systems are surrounded with intelligent
interactive interfaces and objects, and b) environments are capable of recognising
and reacting to the presence of different individuals or events in a seamless,
unobtrusive and invisible manner. The success of future ICT technologies will
depend on how secure these systems may be, to what extent they will protect
the privacy of individuals and how individuals will come to trust them. WISTP 2014
aims to address security and privacy issues of smart devices, networks,
architectures, protocols, policies, systems, and applications related to Internet
of Things, along with evaluating their impact on business, individuals, and the
society. The workshop seeks original submissions from academia and industry
presenting novel research on all theoretical and practical aspects of security
and privacy of Internet of Things, as well as experimental studies of fielded
systems, the application of security technology, the implementation of systems,
and lessons learned. We encourage submissions from other communities such as
law, business, and policy that present these communities' perspectives on
technological issues. Topics of interest include, but are not limited to:
Security and Privacy in Smart Devices
IEEE Security & Privacy, Special issue on Key Trends in Cryptography, January/February 2015, (Abstract Due 15 March 2014, and Final Submission Due 1 May 2014)
Editor: Hilarie Orman (purplestreak.com, USA) and
Charles Pfleeger (pfleeger.com, USA)
Cryptography has advanced from an arcane craft to a mathematical discipline
with established principles, widely-accepted standards, and daily use in
Internet and many other computer applications. Yet its actual utility and
future are clouded topics that hit at two widely separated poles: the limits
of computation and the role of government. Articles for this special issue of
IEEE Security & Privacy magazine will cover recent research trends in cryptology
and their implications for emerging computing techniques (such as cloud
computing), collaboration between researchers and governments in defining
cryptographic standards, how physics and mathematics shape and limit
cryptology, and how cryptology implements privacy and security in an
interconnected world. Potential articles for this issue might address:
TGC 2014 9th Symposium on Trustworthy Global Computing, Co-located with Concur 2014, Rome, Italy, September 5-6, 2014. (Submission Due 2 May 2014)
The Symposium on Trustworthy Global Computing is an international annual venue dedicated to secure and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems, and cloud computing. The TGC series focuses on providing frameworks, tools, algorithms, and protocols for rigorously designing, verifying, and implementing open-ended, large-scaled applications. The related models of computation incorporate code and data mobility over distributed networks that connect heterogeneous devices and have dynamically changing topologies. We solicit papers in all areas of global computing, including (but not limited to):
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TCSP | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |