|
|
Commentary and Opinion
NewsBits: Announcements and correspondence from readers (please contribute!)
Listing of academic positions available by
Cynthia Irvine
(nothing new since Cipher E136)
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
Requests for inclusion in the list should sent per instructions.
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
TrustBus 2017 14th International Conference on Trust, Privacy, and Security in Digital Business, Lyon, France, August 28-31, 2017. (Submission Due 22 March 2017)
TrustBus'2017 will bring together researchers from different disciplines, developers, and users all interested in the critical success factors of digital business systems. We are interested in papers, work-in-progress reports, and industrial experiences describing advances in all areas of digital business applications related to trust and privacy, including, but not limited to:
RAID 2017 20th International Symposium on Research in Attacks, Intrusions and Defenses, Atlanta, GA, USA, September 18-20, 2017. (Submission Due 28 March 2017)
Over the last 20 years, the International Symposium on Research in Attacks, Intrusions and Defenses (RAID) has established itself as a venue where leading researchers and practitioners from academia, industry, and the government are given the opportunity to present novel research in a unique venue to an engaged and lively community. The conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity. RAID features a traditional poster session with a walking dinner on the first evening to encourage the presentation of work in progress and the active participation of younger members of the community. In this special year, the 20th anniversary of RAID's creation, we are soliciting research papers on topics covering all well-motivated security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons. Specific topics of interest to RAID include:
DSC 2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 7-10, 2017. (Submission Due 31 March 2017)
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems.
CUING 2017 1st International Workshop on Criminal Use of Information Hiding, Held in conjunction with the 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, August 29 - September 1, 2017. (Submission Due 4 April 2017)
With the constant rise of the number of Internet users, available bandwidth and an increasing number of services shifting into the connected world, criminals are increasingly active in the virtual world. With improving defensive methods cybercriminals have to utilize more and more sophisticated ways to perform their malicious activities. While protecting the privacy of users, many technologies used in current malware and network attacks have been abused in order to allow criminals to carry out their activities undetected. The aim of the First International Workshop on Criminal Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding (e.g. steganography, covert channels), obfuscation techniques and underground networks (darknets) in order to present novel research regarding the use of data and communication hiding methods in criminal environments and discuss ideas for fighting misuse of privacy enhancing technologies.
NSPW 2017 New Security Paradigms Workshop, Islamorada, FL, USA, October 2-4, 2017. (Submission Due 14 April 2017)
Since 1992, the New Security Paradigms Workshop (NSPW) has offered a unique forum for information security research involving high-risk, high-opportunity paradigms, perspectives, and positions. The workshop itself is highly interactive with presentations by authors prepared for in-depth discussions, and ample opportunity to exchange views with open-minded peers. NSPW is also distinguished by its deep-rooted tradition of positive feedback, collegiality, and encouragement. NSPW seeks embryonic, disruptive, and unconventional ideas that benefit from early feedback. The ideas are almost always not yet proven, and sometimes infeasible to validate to the extent expected in traditional forums. NSPW seeks ideas pushing the boundaries of science and engineering beyond what would typically be considered mainstream; papers that would be strong candidates in "conventional" information security venues are, as a rule of thumb, a poor fit for NSPW. We welcome papers with perspectives that augment traditional information security, both from computer science and other disciplines that study adversarial relationships (e.g., biology, economics, the social sciences). Submissions typically address current limitations of information security, directly challenge long-held beliefs or the very foundations of security, or view problems from an entirely novel angle leading to new solutions. In 2016, more than 50% of the presenters had never attended NSPW before. We are actively trying to continue this trend, and therefore we encourage submissions from new NSPW authors.
CNS 2017 5th IEEE Conference on Communications and Network Security, Las Vegas, Nevada, USA, October 9-11, 2017. (Submission Due 14 April 2017)
IEEE Conference on Communications and Network Security (CNS) is a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security. The conference seeks submissions from academia, government, and industry presenting novel research results in all practical and theoretical aspects of communications and network security.
WCSF 2017 3rd IEEE International Workshop on Cloud Security and Forensics, Held in conjunction with the 16th IEEE International Conference on Trust, Security And Privacy in Computing And Communications (TrustCom2017), Sydney, Australia, August 1-4, 2017. (Submission Due 15 April 2017)
Cloud computing offers utility oriented Information and Communications Technology (ICT) services to corporate and consumer-level users all over the world. The evolution of cloud computing is driving the design of datacenters by architecting them as networks of virtual services; this enables users to access and run applications from anywhere in the world. As the prevalence and usage of networked cloud computer systems increases, the security of these systems can pose significant security concerns and the likelihood of these systems being used for criminal behaviour also increases. Thus, this new computing evolution has a direct effect on, and creates challenges for, cyber security and digital forensic practitioners. The field of digital forensics has grown rapidly over the last decade due to the rise of the Internet and associated crimes. However, while the theory is well established, the practical application of the discipline is still relatively new and constantly developing. Law enforcement agencies can no longer rely on traditional digital forensic methods of data acquisition through device seizure to gather relevant evidence pertaining to an investigation from cloud sources. Using traditional digital forensic methods will lead to the loss or overlooking of valuable evidential material hosted on cloud-based infrastructures. Cloud computing and its impact on digital forensics will continue to grow and traditional digital forensics methods are inadequate for cloud forensic investigations. High quality, previously unpublished submissions are solicited in the areas of cloud security and cloud forensics.
ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017. (Submission Due 19 April 2017)
This symposium, the annual European research event in Computer Security, started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Topics of interest include, but are not limited to:
DASC 2017 15th IEEE International Conference on Dependable, Autonomic and Secure Computing, Orlando, Florida, USA, November 6-10, 2017. (Submission Due 10 May 2017)
IEEE DASC 2017 aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems. Topics of particular interests include the following tracks, but are not limited to:
PST 2017 15th Conference on Privacy, Security and Trust, Calgary, Alberta, Canada, August 28-30, 2017. (Submission Due 15 May 2017)
PST2017 provides a forum for researchers and practitioners to present their latest research results, developments and ideas in areas of privacy, security and trust. PST 2017 topics are inter-disciplinary across privacy, security and trust. Technologies of interest include, but are not limited to:
ACM CCS 2017 24th ACM Conference on Computer and Communication Security, Dallas, TX, USA, October 30 - November 3, 2017. (Submission Due 19 May 2017)
The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users from all over the world to explore cutting-edge ideas and results. It provides an environment to conduct intellectual discussions. From its inception, CCS has established itself as a high-standard research conference in its area.
ACSAC 2017 33rd Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 4-8, 2017. (Submission Due 1 June 2017)
The Annual Computer Security Applications Conference (ACSAC) is an internationally recognized forum where practitioners, researchers, and developers in information and system security meet to learn and to exchange practical ideas and experiences. If you are developing, researching, or implementing practical security solutions, consider sharing your experience and expertise at ACSAC. We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Some example topics are:
Security and Communication Networks journal, Special Issue on Emerging and Unconventional: New Attacks and Innovative Detection Techniques, (Submission Due 28 July 2017)
Guest Editors: Luca Caviglione (National Research Council of Italy,Italy),
Wojciech Mazurczyk (Warsaw University of Technology & FernUniversität in Hagen,
Poland), Steffen Wendzel (Fraunhofer FKIE, Germany),
and Sebastian Zander (Murdoch University, Australia).
In the last years, advancements of the information and communication technologies
have spawned a variety of innovative paradigms, such as cloud and fog computing,
the Internet of Things (IoT), or complex vehicle-to-vehicle frameworks. As a
consequence, the cybersecurity panorama is now getting populated with complex,
emerging, and unconventional attacks, which require deep investigation and
proper understanding. For example, the diffusion of online social networks
brought social engineering to the next level, while IoT led to a completely
new set of hazards also endangering the user at a physical level. Modern
threats also exploit a variety of advanced methods to increase their
stealthiness in order to remain unnoticed for long periods, as well as
reduce the effectiveness of many digital forensics techniques and detection
tools. Therefore, new and emerging technologies changed the modern
cybersecurity landscape, which nowadays is populated by novel attacks
and also requires innovative detection and prevention methods. In this
perspective, the special issue aims at investigating the most advanced and
innovative forms of attacks and scenarios, for instance, considering automotive
or building automation settings. To complete the picture, a relevant attention
will be given to works dealing with innovative forms of detection and forensics
analysis, which are mandatory to counteract sophisticated malware able to hide
or take advantage of unconventional and complex scenarios. This issue accepts
high quality papers containing novel original research results and review
articles of exceptional merit covering the most cutting-edge cybersecurity
threats and countermeasures. Potential topics include but are not limited to
the following:
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TCSP (or other TCs) | Open Access Proceedings | |
Cipher past issues archive | ||
IEEE Computer Society | Cipher Privacy Policy |